WO2017071268A1 - Safety verification method and safety verification device - Google Patents

Safety verification method and safety verification device Download PDF

Info

Publication number
WO2017071268A1
WO2017071268A1 PCT/CN2016/087270 CN2016087270W WO2017071268A1 WO 2017071268 A1 WO2017071268 A1 WO 2017071268A1 CN 2016087270 W CN2016087270 W CN 2016087270W WO 2017071268 A1 WO2017071268 A1 WO 2017071268A1
Authority
WO
WIPO (PCT)
Prior art keywords
condition
signal
state
preset
security verification
Prior art date
Application number
PCT/CN2016/087270
Other languages
French (fr)
Chinese (zh)
Inventor
湛长兰
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2017071268A1 publication Critical patent/WO2017071268A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Definitions

  • the present application relates to the field of terminals, and in particular, to a security verification method and a security verification apparatus.
  • the embodiment of the present application provides a security verification method and a security verification apparatus, which can prevent a user's personal privacy from being leaked.
  • the embodiment of the present application provides a security verification method, including:
  • the mobile terminal When detecting that the object satisfies the preset condition, the mobile terminal sets the object to a first state, where the first state is a hidden state or a failed state;
  • the mobile terminal When it is determined that the signal satisfies the unlock condition, the mobile terminal switches the object from the first state to a second state, wherein the second state is a display and an operational state.
  • the embodiment of the present application further provides a security verification apparatus, including:
  • a first receiving module configured to receive a setting for an unlocking condition
  • a detecting module configured to detect whether the object meets a preset condition
  • a locking module configured to: when detecting that the object satisfies the preset condition, set the object to a first state, where the first state is a hidden state or a failed state;
  • a second receiving module configured to receive a signal
  • a determining module configured to determine whether the signal meets the unlocking condition
  • an unlocking module configured to switch the object from the first state to a second state when determining that the signal satisfies the unlocking condition, wherein the second state is a display and an operable state.
  • the mobile terminal when it is detected that the object satisfies a preset condition, for example, when the operation is ended, the mobile terminal sets the object to a hidden state or a failed state. In this way, even if the other person obtains the mobile terminal, the content of the object in the mobile terminal cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked.
  • the mobile terminal receives the optical signal that satisfies the first condition and/or receives the acoustic signal that satisfies the second condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the information of the user. Safety.
  • FIG. 1 is a flow chart of an embodiment of a security verification method of the present application
  • FIG. 2 is a flow chart of an embodiment of a security verification method of the present application
  • FIG. 3 is a flow chart of an embodiment of a security verification method of the present application.
  • FIG. 4 is a flow chart of an embodiment of a security verification method of the present application.
  • FIG. 5 is a schematic structural diagram of an embodiment of a mobile terminal according to the present application.
  • FIG. 6 is a schematic structural diagram of an embodiment of a mobile terminal according to the present application.
  • the embodiment of the present application provides a security verification method and a security verification apparatus, which can prevent a user's personal privacy from being leaked.
  • the security verification method in the embodiment of the present application can be applied to various terminals, including a mobile phone, a personal computer (PC, Personal Computer), and/or a tablet computer.
  • FIG. 1 shows a security verification method of an embodiment of the present application. Please refer to Figure 1, this application
  • the security verification methods in the embodiments include:
  • the mobile terminal When detecting that the object meets the preset condition, the mobile terminal sets the object to a first state, where the first state is a hidden state or a failed state;
  • the mobile terminal switches the object from the first state to a second state, where the second state is a display and an operable state.
  • the unlocking condition includes a first condition for the optical signal, and receiving the signal, and determining whether the signal satisfies the unlocking condition includes: receiving the optical signal, determining whether the optical signal meets the first A condition.
  • the unlocking condition includes a second condition for the acoustic signal, and receiving the signal, and determining whether the signal satisfies the unlocking condition comprises: receiving an acoustic signal, determining whether the acoustic signal satisfies the Second condition.
  • the mobile terminal when it is detected that the object satisfies the preset condition, for example, when the operation ends, the mobile terminal sets the object to a hidden state or a failed state. In this way, even if the other person obtains the mobile terminal, the content of the object in the mobile terminal cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked.
  • the mobile terminal receives the optical signal that satisfies the first condition and/or receives the acoustic signal that satisfies the second condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the information of the user. Safety.
  • FIG. 2 shows a security verification method of an embodiment of the present application. Please refer to Figure 2, this application
  • the security verification method in the embodiment includes:
  • the first condition is used to determine the optical signal.
  • the first condition can be specifically exemplified in a variety of situations.
  • the first condition includes at least one of the following three items: a wavelength of the optical signal is within a preset range; a light intensity of the optical signal is within a preset range; and the optical signal is s-polarized or It is p-polarized light.
  • a display page is displayed on the display screen of the mobile terminal, wherein the setting page is provided with at least one of a wavelength, a light intensity, and a polarization for the user to select at least one of them, and at the same time, the setting page further provides There is an input box corresponding to each option, so that the user inputs a corresponding range of values in the input box corresponding to the selected option.
  • the mobile terminal receives the range of values and uses the range of values as the preset range.
  • the preset area of the mobile terminal receives the light beam, and the mobile terminal acquires at least one of a wavelength, a light intensity, and a polarization of the light beam, and uses a range that is not more than a predetermined value from a specific value of the parameter as the predetermined Set the range.
  • the first condition includes at least one of the following: an optical signal area formed in a preset area of the mobile terminal is within a preset range; an optical signal is in the The number of spots formed in the preset area of the mobile terminal is within a preset range; the illumination duration of the optical signal in the preset area of the mobile terminal reaches a preset duration; the optical signal is in a preset area of the mobile terminal The illumination frequency reaches the preset frequency.
  • a display page is displayed on the display screen of the mobile terminal, wherein the setting page provides the area or the number of spots, or is provided with an illumination duration or an illumination frequency for the user to select at least one of the options, and the setting An input box corresponding to each option is also provided on the page for the user to select the selected one. Enter the corresponding range of values in the corresponding input box.
  • the mobile terminal receives the range of values and uses the range of values as the preset range.
  • the illumination frequency refers to the number of times the light beam hits the preset area of the mobile terminal in a unit time.
  • the object is a preset object.
  • the preset object may include image information and/or text information stored by the mobile terminal.
  • the text information may include at least one of a short message, a mail, a chat record, a document, a memo, and an address book stored in the mobile terminal.
  • the preset object includes an application (Application, APP) installed in the mobile terminal. There are no restrictions here.
  • the preset object can be preset in the mobile terminal.
  • the mobile terminal can also receive settings for the preset object.
  • the setting page of the mobile terminal includes a setting page of the preset object, on which a plurality of options are displayed, and the preset object is determined by accepting the user's selection of each option.
  • the above is merely an example and is not limiting.
  • the preset condition includes the end of the preset object, that is, the user exits the use of the preset object.
  • the preset condition includes that the preset object does not receive the operation continuously for a preset duration when it is running, or the preset condition includes that the preset object is locked after the mobile terminal enters the lock screen state during operation.
  • the above is only an example description of the preset conditions, and is not limited herein.
  • the mobile terminal When detecting that the object satisfies a preset condition, the mobile terminal sets the object to a hidden state or a failed state.
  • the mobile terminal may be a mobile phone, a tablet computer, or other mobile terminal, and is not limited herein.
  • the hidden state refers to that the mobile terminal does not display the icon of the preset object on the display page; moreover, the mobile terminal does not display the running page of the preset object.
  • the failure state refers to the mobile terminal The operation of the preset object is prohibited, that is, the mobile terminal does not run the preset object when receiving the instruction to run the preset object.
  • the mobile terminal After the mobile terminal sets the object to a hidden state or a stale state, the user cannot run the object. In order to be able to run the object, the object's hidden state or invalid state needs to be removed.
  • the hidden state or the failed state of the object is released by an optical signal that satisfies a certain condition.
  • a sensor may be disposed in the mobile terminal for receiving the optical signal. When it is desired to release the hidden or failed state of the object, the user can illuminate the sensor with a particular beam of light such that the sensor receives the optical signal.
  • the mobile terminal switches the object to a normal state.
  • the mobile terminal determines that the received optical signal satisfies the first condition, the locking of the object is released, and the object is restored to a normal state, so that the object can be normally displayed and operated.
  • the mobile terminal when it is detected that the object satisfies the preset condition, for example, when the operation ends, the mobile terminal sets the object to a hidden state or a failed state. In this way, even if the other person obtains the mobile terminal, the content of the object in the mobile terminal cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked. Moreover, in the present application, the mobile terminal receives the optical signal that satisfies the first condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the information security of the user.
  • the first condition is stored in the mobile terminal.
  • the mobile terminal may further store the first condition in the network side or the server.
  • the optical signal and the first condition are compared by a network side or a server. That is, the mobile terminal sends the information of the received optical signal to the network side or the server, by the network. The side or server compares the results and sends the result to the mobile terminal.
  • the mobile terminal uses the optical signal that satisfies the first condition as the unlock password for the object.
  • the mobile terminal may also use the acoustic signal of the second condition as the unlocking password for the object.
  • FIG. 3 shows a security verification method of an embodiment of the present application.
  • the security verification method in the embodiment of the present application includes:
  • the second condition may specifically have multiple situations. Correspondingly, there may be multiple cases for receiving the setting of the second condition.
  • the mobile terminal when receiving the setting of the second condition, receives and stores the first acoustic signal; and determines a second condition, where the second condition includes the acoustic signal received by the mobile terminal and the first acoustic signal The difference is less than the preset value.
  • the received acoustic signal when the difference between the acoustic signal received by the mobile terminal and the first acoustic signal is less than a preset value, the received acoustic signal can be regarded as the first acoustic signal, thereby releasing the hidden state or the invalid state of the object.
  • whether the sound signal received by the mobile terminal is the first sound signal may be determined from multiple aspects, that is, the difference between the sound signal received by the mobile terminal and the first sound signal may include Many differences.
  • the difference includes a difference in content included in the acoustic signal, such that the first acoustic signal is a voice password set by the user, and only the difference between the content of the acoustic signal received by the mobile terminal and the content of the first acoustic signal is less than a preset value.
  • the voice spoken by the user is determined to be the set voice password, the mobile terminal releases the hidden state or the invalid state of the object.
  • the difference may include a difference in voiceprints.
  • the difference between the voiceprints of different people is determined by analyzing whether the difference between the voiceprint of the acoustic signal received by the mobile terminal and the voiceprint of the first acoustic signal is less than a preset value, and the received acoustic signal and the first acoustic signal are determined. Whether it is from the same person. When it is determined that the same person is from the same person, the mobile terminal releases the hidden state or the invalid state of the object.
  • the mobile terminal When detecting that the object satisfies a preset condition, the mobile terminal sets the object to a hidden state or a failed state.
  • Steps 302 and 303 can be specifically referred to the description of the embodiment shown in FIG. 2.
  • the mobile terminal After the mobile terminal sets the object to a hidden state or a stale state, the user cannot run the object. In order to be able to run the object, the object's hidden state or invalid state needs to be removed.
  • the hidden state or the failed state of the object is released by an acoustic signal that satisfies a certain condition. Specifically, when it is necessary to release the hidden state or the invalid state of the object, the user can issue or play a specific sound to the mobile terminal to cause the sensor to receive the acoustic signal.
  • the mobile terminal switches the object to a normal state.
  • the mobile terminal when it is detected that the object satisfies the preset condition, for example, when the operation ends, the mobile terminal sets the object to a hidden state or a failed state. In this way, even if the other person obtains the mobile terminal, the content of the object in the mobile terminal cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked. Moreover, in the present application, the mobile terminal receives the acoustic signal that satisfies the second condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the information security of the user.
  • the mobile terminal uses the acoustic signal that satisfies the second condition as the unlock password for the object.
  • the mobile terminal may also use both the optical signal satisfying the first condition and the acoustic signal satisfying the second condition as the unlock password for the object.
  • FIG. 4 shows a security verification method of an embodiment of the present application.
  • the security verification method in the embodiment of the present application includes:
  • the mobile terminal When detecting that the object satisfies a preset condition, the mobile terminal sets the object to a hidden state or a failed state.
  • the mobile terminal switches the object to a normal state.
  • the security verification method in the embodiment of the present application has been described above.
  • the security verification apparatus in the embodiment of the present application is described below.
  • FIG. 5 is a schematic structural diagram of a security verification apparatus according to an embodiment of the present application.
  • the security verification apparatus 500 in this embodiment may be used to perform the security verification method in the embodiment shown in FIG. 1.
  • the security verification apparatus 500 in the embodiment of the present application includes:
  • a first receiving module 501 configured to receive a setting for an unlocking condition
  • the detecting module 502 is configured to detect whether the object meets a preset condition
  • the locking module 503 is configured to: when detecting that the object meets the preset condition, set the object to a first state, where the first state is a hidden state or a failed state;
  • a second receiving module 504 configured to receive a signal
  • the determining module 505 is configured to determine whether the signal meets the unlocking condition
  • the unlocking module 506 is configured to switch the object from the first state to a second state when determining that the signal satisfies the unlocking condition, wherein the second state is a display and an operable state.
  • the unlocking condition includes a first condition for an optical signal
  • the The second receiving module 504 is configured to receive an optical signal
  • the determining module 505 is configured to determine whether the optical signal meets the first condition.
  • the unlocking condition includes a second condition for the acoustic signal
  • the second receiving module 504 is configured to receive the acoustic signal
  • the determining module 505 is configured to determine whether the acoustic signal meets the second condition.
  • the security verification device may be a mobile terminal, including a mobile phone, a personal computer (PC, Personal Computer), and/or a tablet computer.
  • a mobile terminal including a mobile phone, a personal computer (PC, Personal Computer), and/or a tablet computer.
  • the security verification apparatus when it is detected that the object satisfies the preset condition, for example, when the operation is ended, the security verification apparatus sets the object to a hidden state or a failure state. In this way, even if the other person obtains the security verification device, the content in the object in the security verification device cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked.
  • the security verification device receives the optical signal that satisfies the first condition and/or receives the acoustic signal that satisfies the second condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the user's Information security.
  • the first condition includes at least one of the following three items:
  • the wavelength of the optical signal is within a preset range
  • the light intensity of the optical signal is within a preset range
  • the optical signal is s-polarized or p-polarized.
  • the first condition includes at least one of the following:
  • the spot area formed by the optical signal in the preset area of the security verification device is within a preset range
  • the number of spots formed by the optical signal in the preset area of the security verification device is in a preset range Inside
  • the duration of the illumination of the optical signal in the preset area of the security verification device reaches a preset duration
  • the illumination frequency of the optical signal in the preset area of the security verification device reaches a preset frequency.
  • the second receiving module 504 is specifically configured to receive and store a first acoustic signal; the first receiving module 501 determines a second condition, where the second condition includes the received The difference between the acoustic signal and the first acoustic signal is less than a preset value.
  • the object includes at least one of text information, picture information, and an application APP stored by the security verification device.
  • FIG. 6 is a block diagram showing a part of the structure of a mobile terminal related to an embodiment of the present application.
  • the mobile terminal includes: a radio frequency (RF) circuit 610, a memory 620, an input unit 630, a display unit 640, a sensor 650, an audio circuit 660, a wireless fidelity (WiFi) module 670, and a processor. 680, and power supply 690 and other components.
  • RF radio frequency
  • the RF circuit 610 can be used for transmitting and receiving information or during a call, receiving and transmitting signals, and in particular, receiving downlink information of the base station and processing it to the processor 680; The data is sent to the base station.
  • RF circuit 610 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 610 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • the memory 620 can be used to store software programs and modules, and the processor 680 executes various functional applications and data processing of the mobile terminal by running software programs and modules stored in the memory 620.
  • the memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile terminal (such as audio data, phone book, etc.).
  • memory 620 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 630 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile terminal.
  • the input unit 630 can be configured to receive a user's setting of an unlock condition.
  • the input unit 630 can include a touch panel 631 and other input devices 632.
  • the touch panel 631 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 631 or near the touch panel 631. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 631 can include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user and detects Touching the signal from the operation, transmitting the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, sends it to the processor 680, and can receive the processor 680 The order is executed and executed.
  • the touch panel 631 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 630 may also include other input devices 632.
  • other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 640 can be used to display information input by the user or information provided to the user as well as various menus of the mobile terminal.
  • the display unit 640 can be used to display a setting page provided with a wavelength, light intensity, polarization, etc., to the user for selection by the user.
  • the display unit 640 can include a display panel 641.
  • the display panel 641 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 631 can cover the display panel 641.
  • the touch panel 631 When the touch panel 631 detects a touch operation on or near it, the touch panel 631 transmits to the processor 680 to determine the type of the touch event, and then the processor 680 according to the touch event.
  • the type provides a corresponding visual output on display panel 641.
  • the touch panel 631 and the display panel 641 are two independent components to implement the input and input functions of the mobile terminal, in some embodiments, the touch panel 631 and the display panel 641 may be Integrate to realize the input and output functions of the mobile terminal.
  • the mobile terminal can also include at least one type of sensor 650, such as a light sensor, motion sensor, and other sensors.
  • the light sensor can receive a particular beam of light to receive the light signal.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the attitude of the mobile terminal (such as horizontal and vertical screen switching, Related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as well as other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which can be configured in mobile terminals, No longer.
  • An audio circuit 660, a speaker 661, and a microphone 662 can provide an audio interface between the user and the mobile terminal.
  • the audio circuit 660 can transmit the converted electrical data of the received audio data to the speaker 661 for conversion to the sound signal output by the speaker 661; on the other hand, the microphone 662 converts the collected sound signal into an electrical signal by the audio circuit 660. After receiving, it is converted into audio data, and then processed by the audio data output processor 680, transmitted via the RF circuit 610, or outputted to the memory 620 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile terminal can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 670, which provides wireless broadband Internet access for users.
  • FIG. 6 shows the WiFi module 670, it can be understood that it does not belong to the essential configuration of the mobile terminal, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 680 is the control center of the mobile terminal, connecting various portions of the entire mobile terminal using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 620, and recalling data stored in the memory 620.
  • the mobile terminal performs various functions and processing data to perform overall monitoring on the mobile terminal.
  • the processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 680.
  • the mobile terminal also includes a power source 690 (such as a battery) that supplies power to the various components.
  • a power source 690 such as a battery
  • the power source can be logically coupled to the processor 680 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile terminal may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the processor 680 included in the mobile terminal further has an implementation.
  • the function of the method flow is not limited to
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

Disclosed in the embodiments of the present application are a safety verification method and a safety verification device. A method of an embodiment of the present application comprises: receiving settings for an unlocking condition; detecting whether an object satisfies a preset condition; when it is detected that the object satisfies the preset condition, a mobile terminal setting the object into a hidden state or a failed state; receiving a signal; determining whether the signal satisfies the unlocking condition; and when the signal satisfies the unlocking condition, the mobile terminal switching the object into a normal state.

Description

安全验证方法和安全验证装置Safety verification method and safety verification device
本申请要求于2015年10月29日提交中国专利局、申请号为201510716557.X、发明名称为“安全验证方法和安全验证装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to Chinese Patent Application No. 201510716557.X, entitled "Safety Verification Method and Safety Verification Device", filed on October 29, 2015, the entire contents of which are incorporated herein by reference. In the application.
技术领域Technical field
本申请涉及终端领域,尤其涉及一种安全验证方法和安全验证装置。The present application relates to the field of terminals, and in particular, to a security verification method and a security verification apparatus.
背景技术Background technique
随着手机的发展,用户的日常生活越来越离不开手机。随着技术的发展,手机的存储功能越来越强大,因此用户的手机中往往存储着用户的大量个人信息。那么,在用户的手机丢失时,其他人可以从该手机中获取到用户的个人隐私,造成用户的个人信息泄露。With the development of mobile phones, the daily life of users is increasingly inseparable from mobile phones. With the development of technology, the storage function of mobile phones is becoming more and more powerful, so the user's mobile phone often stores a large amount of personal information of the user. Then, when the user's mobile phone is lost, other people can obtain the user's personal privacy from the mobile phone, causing the user's personal information to leak.
发明内容Summary of the invention
本申请实施例提供了一种安全验证方法和安全验证装置,能够避免用户的个人隐私泄露。The embodiment of the present application provides a security verification method and a security verification apparatus, which can prevent a user's personal privacy from being leaked.
本申请实施例提供了一种安全验证方法,包括:The embodiment of the present application provides a security verification method, including:
接收对解锁条件的设置;Receive settings for unlock conditions;
检测对象是否满足预置条件;Check whether the object meets the preset condition;
当检测到对象满足预置条件时,移动终端将所述对象设置为第一状态,其中所述第一状态为隐藏状态或失效状态;When detecting that the object satisfies the preset condition, the mobile terminal sets the object to a first state, where the first state is a hidden state or a failed state;
接收信号; receive signal;
判断所述信号是否满足所述解锁条件;Determining whether the signal satisfies the unlocking condition;
当确定所述信号满足所述解锁条件时,所述移动终端将所述对象从所述第一状态切换为第二状态,其中所述第二状态为显示且可运行状态。When it is determined that the signal satisfies the unlock condition, the mobile terminal switches the object from the first state to a second state, wherein the second state is a display and an operational state.
本申请实施例还提供了一种安全验证装置,包括:The embodiment of the present application further provides a security verification apparatus, including:
第一接收模块,用于接收对解锁条件的设置;a first receiving module, configured to receive a setting for an unlocking condition;
检测模块,用于检测对象是否满足预置条件;a detecting module, configured to detect whether the object meets a preset condition;
锁定模块,用于当检测到所述对象满足所述预置条件时,将所述对象设置为第一状态,其中所述第一状态为隐藏状态或失效状态;a locking module, configured to: when detecting that the object satisfies the preset condition, set the object to a first state, where the first state is a hidden state or a failed state;
第二接收模块,用于接收信号;a second receiving module, configured to receive a signal;
判断模块,用于判断所述信号是否满足所述解锁条件;a determining module, configured to determine whether the signal meets the unlocking condition;
解锁模块,用于当确定所述信号满足所述解锁条件时,将所述对象从所述第一状态切换为第二状态,其中所述第二状态为显示且可运行状态。And an unlocking module, configured to switch the object from the first state to a second state when determining that the signal satisfies the unlocking condition, wherein the second state is a display and an operable state.
本申请中,当检测到对象满足预置条件,例如,结束运行时,所述移动终端将所述对象设置为隐藏状态或失效状态。这样,他人即使拿到移动终端也无法看到移动终端内的该对象的内容,避免了用户的隐私泄露。而且,由于该对象处于隐藏状态或失效状态,他人会认为该对象出现故障或者根本察觉不到该对象的存在,大大降低了该对象的密码被破解的可能性。而且,本申请中,将移动终端接收到满足第一条件的光信号和/或接收到满足第二条件的声信号作为验证密码,大大降低了验证密码被破解的可能性,提高了用户的信息安全度。In the present application, when it is detected that the object satisfies a preset condition, for example, when the operation is ended, the mobile terminal sets the object to a hidden state or a failed state. In this way, even if the other person obtains the mobile terminal, the content of the object in the mobile terminal cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked. Moreover, in the present application, the mobile terminal receives the optical signal that satisfies the first condition and/or receives the acoustic signal that satisfies the second condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the information of the user. Safety.
附图说明DRAWINGS
图1为本申请安全验证方法的一个实施例的流程图;1 is a flow chart of an embodiment of a security verification method of the present application;
图2为本申请安全验证方法的一个实施例的流程图;2 is a flow chart of an embodiment of a security verification method of the present application;
图3为本申请安全验证方法的一个实施例的流程图; 3 is a flow chart of an embodiment of a security verification method of the present application;
图4为本申请安全验证方法的一个实施例的流程图;4 is a flow chart of an embodiment of a security verification method of the present application;
图5为本申请的移动终端的一个实施例的结构示意图;以及FIG. 5 is a schematic structural diagram of an embodiment of a mobile terminal according to the present application;
图6为本申请的移动终端的一个实施例的结构示意图。FIG. 6 is a schematic structural diagram of an embodiment of a mobile terminal according to the present application.
具体实施方式detailed description
本申请实施例提供了一种安全验证方法和安全验证装置,能够避免用户的个人隐私泄露。The embodiment of the present application provides a security verification method and a security verification apparatus, which can prevent a user's personal privacy from being leaked.
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本申请保护的范围。The technical solutions in the embodiments of the present application are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present application. It is an embodiment of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope shall fall within the scope of the application.
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,本申请的说明书和权利要求书及上述附图中的术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、系统、产品或设备固有的其它步骤或单元。The terms "first", "second", "third", "fourth", etc. (if present) in the specification and claims of the present application and the above figures are used to distinguish similar objects, and are not necessarily used for Describe a specific order or order. It is to be understood that the data so used may be interchanged where appropriate so that the embodiments described herein can be implemented in a sequence other than what is illustrated or described herein. Furthermore, the terms "comprises" and "comprising" and "comprising", and any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process comprising a series of steps or units. The method, system, product, or device is not necessarily limited to those steps or units that are clearly listed, but may include other steps or units that are not explicitly listed or inherent to such processes, methods, systems, products, or devices.
需要说明的是,本申请实施例中的安全验证方法可以应用于各种终端,包括手机、个人计算机(PC,Personal Computer)和/或平板电脑等设备。It should be noted that the security verification method in the embodiment of the present application can be applied to various terminals, including a mobile phone, a personal computer (PC, Personal Computer), and/or a tablet computer.
图1示出了本申请实施例的一种安全验证方法。请参阅图1,本申请 实施例中的安全验证方法包括:FIG. 1 shows a security verification method of an embodiment of the present application. Please refer to Figure 1, this application The security verification methods in the embodiments include:
101、接收对解锁条件的设置;101. Receive a setting for an unlocking condition;
102、检测对象是否满足预置条件;102. Check whether the object satisfies a preset condition;
103、当检测到所述对象满足所述预置条件时,移动终端将所述对象设置为第一状态,其中所述第一状态为隐藏状态或失效状态;103. When detecting that the object meets the preset condition, the mobile terminal sets the object to a first state, where the first state is a hidden state or a failed state;
104、接收信号;104. Receive a signal;
105、判断所述信号是否满足所述解锁条件;105. Determine whether the signal meets the unlocking condition.
106、当确定所述信号满足所述解锁条件时,所述移动终端将所述对象从所述第一状态切换为第二状态,其中所述第二状态为显示且可运行状态。106. When it is determined that the signal satisfies the unlocking condition, the mobile terminal switches the object from the first state to a second state, where the second state is a display and an operable state.
在一个实现方式中,所述解锁条件包括针对光信号的第一条件,以及,接收信号,判断所述信号是否满足所述解锁条件包括:接收光信号,判断所述光信号是否满足所述第一条件。In an implementation manner, the unlocking condition includes a first condition for the optical signal, and receiving the signal, and determining whether the signal satisfies the unlocking condition includes: receiving the optical signal, determining whether the optical signal meets the first A condition.
在另一个实现方式中,所述解锁条件包括针对声信号的第二条件,以及,接收信号,判断所述信号是否满足所述解锁条件包括:接收声信号,判断所述声信号是否满足所述第二条件。In another implementation, the unlocking condition includes a second condition for the acoustic signal, and receiving the signal, and determining whether the signal satisfies the unlocking condition comprises: receiving an acoustic signal, determining whether the acoustic signal satisfies the Second condition.
本实施例中,当检测到对象满足预置条件,例如,结束运行时,所述移动终端将所述对象设置为隐藏状态或失效状态。这样,他人即使拿到移动终端也无法看到移动终端内的该对象的内容,避免了用户的隐私泄露。而且,由于该对象处于隐藏状态或失效状态,他人会认为该对象出现故障或者根本察觉不到该对象的存在,大大降低了该对象的密码被破解的可能性。而且,本申请中,将移动终端接收到满足第一条件的光信号和/或接收到满足第二条件的声信号作为验证密码,大大降低了验证密码被破解的可能性,提高了用户的信息安全度。In this embodiment, when it is detected that the object satisfies the preset condition, for example, when the operation ends, the mobile terminal sets the object to a hidden state or a failed state. In this way, even if the other person obtains the mobile terminal, the content of the object in the mobile terminal cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked. Moreover, in the present application, the mobile terminal receives the optical signal that satisfies the first condition and/or receives the acoustic signal that satisfies the second condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the information of the user. Safety.
图2示出了本申请实施例的一种安全验证方法。请参阅图2,本申请 实施例中安全验证方法包括:FIG. 2 shows a security verification method of an embodiment of the present application. Please refer to Figure 2, this application The security verification method in the embodiment includes:
201、接收对第一条件的设置。201. Receive a setting of the first condition.
本实施例中,该第一条件用于对光信号进行判断。第一条件具体可以有多种情况。In this embodiment, the first condition is used to determine the optical signal. The first condition can be specifically exemplified in a variety of situations.
在一种实现方式中,所述第一条件包括以下三项中的至少一项:光信号的波长在预置范围内;光信号的光强在预置范围内;光信号为s偏振光或者为p偏振光。In an implementation manner, the first condition includes at least one of the following three items: a wavelength of the optical signal is within a preset range; a light intensity of the optical signal is within a preset range; and the optical signal is s-polarized or It is p-polarized light.
其中,接收对第一条件的设置的方法有多种。例如,在移动终端的显示屏显示设置页面,其中,该设置页面上提供有波长、光强、偏振中的至少一个选项,以供用户对其中的至少一个选择,同时,该设置页面上还提供有各选项对应的输入框,以便用户在所选择的选项对应的输入框中输入对应的数值范围。移动终端接收该数值范围,并将该数值范围作为所述预置范围。Among them, there are various methods of receiving the setting of the first condition. For example, a display page is displayed on the display screen of the mobile terminal, wherein the setting page is provided with at least one of a wavelength, a light intensity, and a polarization for the user to select at least one of them, and at the same time, the setting page further provides There is an input box corresponding to each option, so that the user inputs a corresponding range of values in the input box corresponding to the selected option. The mobile terminal receives the range of values and uses the range of values as the preset range.
或者,移动终端的预置区域接收光束,移动终端获取该光束的波长、光强、偏振中的至少一个参数,并将与该参数的具体数值的差值不大于预定数值的范围作为所述预置范围。Alternatively, the preset area of the mobile terminal receives the light beam, and the mobile terminal acquires at least one of a wavelength, a light intensity, and a polarization of the light beam, and uses a range that is not more than a predetermined value from a specific value of the parameter as the predetermined Set the range.
在另一种实现方式中,所述第一条件包括以下各项中的至少一项:光信号在所述移动终端的预置区域内形成的光斑面积在预置范围内;光信号在所述移动终端的预置区域内形成的光斑个数在预置范围内;光信号在所述移动终端的预置区域内的照射时长达到预置时长;光信号在所述移动终端的预置区域内的照射频率达到预置频率。In another implementation, the first condition includes at least one of the following: an optical signal area formed in a preset area of the mobile terminal is within a preset range; an optical signal is in the The number of spots formed in the preset area of the mobile terminal is within a preset range; the illumination duration of the optical signal in the preset area of the mobile terminal reaches a preset duration; the optical signal is in a preset area of the mobile terminal The illumination frequency reaches the preset frequency.
其中,接收对第一条件的设置的方法有多种。例如,在移动终端的显示屏显示设置页面,其中,该设置页面上提供面积或光斑个数,或者提供有照射时长或照射频率,以供用户对其中的至少一个选项进行选择,同时,该设置页面上还提供有各选项对应的输入框,以便用户在所选择的选 项对应的输入框中输入对应的数值范围。移动终端接收该数值范围,并将该数值范围作为所述预置范围。其中,照射频率指的是在单位时间内光束打在移动终端的预置区域上的次数。Among them, there are various methods of receiving the setting of the first condition. For example, a display page is displayed on the display screen of the mobile terminal, wherein the setting page provides the area or the number of spots, or is provided with an illumination duration or an illumination frequency for the user to select at least one of the options, and the setting An input box corresponding to each option is also provided on the page for the user to select the selected one. Enter the corresponding range of values in the corresponding input box. The mobile terminal receives the range of values and uses the range of values as the preset range. The illumination frequency refers to the number of times the light beam hits the preset area of the mobile terminal in a unit time.
当然,上述描述仅为举例,并不作限制。Of course, the above description is by way of example only and not limiting.
202、检测对象是否满足预置条件。202. Check whether the object meets the preset condition.
本实施例中,所述对象为预置的对象。该预置对象可以有多种。例如,该预置对象可以包括移动终端所存储的图像信息和/或文字信息。其中,该文字信息可以包括移动终端内存储的短信、邮件、聊天记录、文档、备忘录、通信录中的至少一项。或者,该预置对象包括移动终端中所安装的应用程序(Application,APP)。在此不作限制。In this embodiment, the object is a preset object. There are a variety of preset objects. For example, the preset object may include image information and/or text information stored by the mobile terminal. The text information may include at least one of a short message, a mail, a chat record, a document, a memo, and an address book stored in the mobile terminal. Alternatively, the preset object includes an application (Application, APP) installed in the mobile terminal. There are no restrictions here.
预置对象可以是移动终端内预先设置好的。可选的,移动终端还可以接收对预置对象的设置。例如,移动终端的设置页面包括预置对象的设置页面,在该设置页面上,显示有多个选项,通过接受用户对各选项的选择来确定预置对象。当然,上述仅为举例,并不作限制。The preset object can be preset in the mobile terminal. Optionally, the mobile terminal can also receive settings for the preset object. For example, the setting page of the mobile terminal includes a setting page of the preset object, on which a plurality of options are displayed, and the preset object is determined by accepting the user's selection of each option. Of course, the above is merely an example and is not limiting.
本实施例中,预置条件可以有多种。例如,该预置条件包括预置对象结束运行,也即用户退出对该预置对象的使用。或者,该预置条件包括预置对象在运行中时连续未接收到操作的时长达到预置时长,或者,该预置条件包括预置对象在运行时移动终端进入锁屏状态后锁定。当然,上述仅为对预置条件的举例描述,在此不作限制。In this embodiment, there may be multiple preset conditions. For example, the preset condition includes the end of the preset object, that is, the user exits the use of the preset object. Alternatively, the preset condition includes that the preset object does not receive the operation continuously for a preset duration when it is running, or the preset condition includes that the preset object is locked after the mobile terminal enters the lock screen state during operation. Of course, the above is only an example description of the preset conditions, and is not limited herein.
203、当检测到所述对象满足预置条件时,移动终端将所述对象设置为隐藏状态或失效状态。203. When detecting that the object satisfies a preset condition, the mobile terminal sets the object to a hidden state or a failed state.
本实施例中,移动终端可以是手机、平板电脑或者其他移动终端,在此不作限制。In this embodiment, the mobile terminal may be a mobile phone, a tablet computer, or other mobile terminal, and is not limited herein.
隐藏状态指的是移动终端在显示页面上不显示该预置对象的图标;而且,移动终端不显示该预置对象的运行页面。失效状态指的是移动终端 禁止预置对象的运行,也即移动终端在接收到运行该预置对象的指令时,不运行该预置对象。The hidden state refers to that the mobile terminal does not display the icon of the preset object on the display page; moreover, the mobile terminal does not display the running page of the preset object. The failure state refers to the mobile terminal The operation of the preset object is prohibited, that is, the mobile terminal does not run the preset object when receiving the instruction to run the preset object.
204、接收光信号。204. Receive an optical signal.
在移动终端将对象设置为隐藏状态或失效状态后,用户无法运行该对象。为能够运行该对象,需解除该对象的隐藏状态或失效状态。本实施例中,通过满足一定条件的光信号来解除该对象的隐藏状态或失效状态。具体的,移动终端内可设置有传感器,用于接收光信号。当需要解除对象的隐藏状态或失效状态时,用户可用特定的光束照射该传感器,以使得该传感器接收到光信号。After the mobile terminal sets the object to a hidden state or a stale state, the user cannot run the object. In order to be able to run the object, the object's hidden state or invalid state needs to be removed. In this embodiment, the hidden state or the failed state of the object is released by an optical signal that satisfies a certain condition. Specifically, a sensor may be disposed in the mobile terminal for receiving the optical signal. When it is desired to release the hidden or failed state of the object, the user can illuminate the sensor with a particular beam of light such that the sensor receives the optical signal.
205、判断所述光信号是否满足第一条件。205. Determine whether the optical signal meets the first condition.
206、当确定接收到满足第一条件的光信号时,所述移动终端将所述对象切换为正常状态。206. When it is determined that the optical signal that satisfies the first condition is received, the mobile terminal switches the object to a normal state.
当移动终端确定接收到的光信号满足第一条件时,解除对该对象的锁定,将该对象恢复为正常状态,以使得该对象能够正常显示和运行。When the mobile terminal determines that the received optical signal satisfies the first condition, the locking of the object is released, and the object is restored to a normal state, so that the object can be normally displayed and operated.
本实施例中,当检测到对象满足预置条件,例如,结束运行时,所述移动终端将所述对象设置为隐藏状态或失效状态。这样,他人即使拿到移动终端也无法看到移动终端内的该对象的内容,避免了用户的隐私泄露。而且,由于该对象处于隐藏状态或失效状态,他人会认为该对象出现故障或者根本察觉不到该对象的存在,大大降低了该对象的密码被破解的可能性。而且,本申请中,将移动终端接收到满足第一条件的光信号作为验证密码,大大降低了验证密码被破解的可能性,提高了用户的信息安全度。In this embodiment, when it is detected that the object satisfies the preset condition, for example, when the operation ends, the mobile terminal sets the object to a hidden state or a failed state. In this way, even if the other person obtains the mobile terminal, the content of the object in the mobile terminal cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked. Moreover, in the present application, the mobile terminal receives the optical signal that satisfies the first condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the information security of the user.
本实施例中,第一条件存储在移动终端内。实际应用中,移动终端在接收对第一条件的设置后,还可以将该第一条件存储在网络侧或者服务器内。相对应的,由网络侧或服务器来对所述光信号和第一条件进行比对。也即移动终端将接收到的光信号的信息发送至网络侧或者服务器,由网络 侧或者服务器进行比对后将结果发送至移动终端。In this embodiment, the first condition is stored in the mobile terminal. In an actual application, after receiving the setting of the first condition, the mobile terminal may further store the first condition in the network side or the server. Correspondingly, the optical signal and the first condition are compared by a network side or a server. That is, the mobile terminal sends the information of the received optical signal to the network side or the server, by the network. The side or server compares the results and sends the result to the mobile terminal.
本实施例中,移动终端将满足第一条件的光信号作为对对象的解锁密码。在另一实施例中,移动终端还可以将第二条件的声信号作为对对象的解锁密码。In this embodiment, the mobile terminal uses the optical signal that satisfies the first condition as the unlock password for the object. In another embodiment, the mobile terminal may also use the acoustic signal of the second condition as the unlocking password for the object.
图3示出了本申请实施例的一种安全验证方法。请参阅图3,本申请实施例中安全验证方法包括:FIG. 3 shows a security verification method of an embodiment of the present application. Referring to FIG. 3, the security verification method in the embodiment of the present application includes:
301、接收对第二条件的设置。301. Receive a setting for the second condition.
本实施例中,第二条件具体可以有多种情况,相对应的,接收对第二条件的设置可以有多种情况。In this embodiment, the second condition may specifically have multiple situations. Correspondingly, there may be multiple cases for receiving the setting of the second condition.
具体举例来说,在接收对第二条件的设置时,移动终端接收并存储第一声信号;确定第二条件,所述第二条件包括移动终端接收到的声信号和所述第一声信号的差异小于预置数值。这样,当移动终端接收到的声信号和所述第一声信号的差异小于预置数值,可认为接收到的声信号为第一声信号,进而解除对象的隐藏状态或失效状态。For example, when receiving the setting of the second condition, the mobile terminal receives and stores the first acoustic signal; and determines a second condition, where the second condition includes the acoustic signal received by the mobile terminal and the first acoustic signal The difference is less than the preset value. In this way, when the difference between the acoustic signal received by the mobile terminal and the first acoustic signal is less than a preset value, the received acoustic signal can be regarded as the first acoustic signal, thereby releasing the hidden state or the invalid state of the object.
需注意的是,本实施例中,可从多方面来判断移动终端接收到的声信号是否为所述第一声信号,也即移动终端接收到的声信号和第一声信号的差异可以包括多方面的差异。例如,该差异包括声信号所含内容的差异,这样,第一声信号为用户所设置的语音密码,只有移动终端接收到的声信号的内容和第一声信号的内容的差异小于预置数值时,可确定用户说出的语音为所设置的语音密码,移动终端才解除该对象的隐藏状态或失效状态。It should be noted that, in this embodiment, whether the sound signal received by the mobile terminal is the first sound signal may be determined from multiple aspects, that is, the difference between the sound signal received by the mobile terminal and the first sound signal may include Many differences. For example, the difference includes a difference in content included in the acoustic signal, such that the first acoustic signal is a voice password set by the user, and only the difference between the content of the acoustic signal received by the mobile terminal and the content of the first acoustic signal is less than a preset value. When the voice spoken by the user is determined to be the set voice password, the mobile terminal releases the hidden state or the invalid state of the object.
或者,该差异可以包括声纹的差异。由于不同人的声纹不同,通过分析移动终端所接收到的声信号的声纹和第一声信号的声纹的差异是否小于预置数值,来确定所接收到的声信号和第一声信号是否来自同一个人。当确定来自同一个人时,移动终端解除该对象的隐藏状态或失效状态。Alternatively, the difference may include a difference in voiceprints. The difference between the voiceprints of different people is determined by analyzing whether the difference between the voiceprint of the acoustic signal received by the mobile terminal and the voiceprint of the first acoustic signal is less than a preset value, and the received acoustic signal and the first acoustic signal are determined. Whether it is from the same person. When it is determined that the same person is from the same person, the mobile terminal releases the hidden state or the invalid state of the object.
当然,该差异也可以是其他方面的差异,在此不作限制。 Of course, the difference may also be other differences, and is not limited herein.
302、检测对象是否满足预置条件。302. Check whether the object meets the preset condition.
303、当检测到所述对象满足预置条件时,移动终端将所述对象设置为隐藏状态或失效状态。303. When detecting that the object satisfies a preset condition, the mobile terminal sets the object to a hidden state or a failed state.
步骤302和303具体可参见图2所示的实施例的描述。 Steps 302 and 303 can be specifically referred to the description of the embodiment shown in FIG. 2.
304、接收声信号。304. Receive an acoustic signal.
在移动终端将对象设置为隐藏状态或失效状态后,用户无法运行该对象。为能够运行该对象,需解除该对象的隐藏状态或失效状态。本实施例中,通过满足一定条件的声信号来解除该对象的隐藏状态或失效状态。具体地,当需要解除对象的隐藏状态或失效状态时,用户可以向移动终端发出或播放特定的声音,以使得该传感器接收到声信号。After the mobile terminal sets the object to a hidden state or a stale state, the user cannot run the object. In order to be able to run the object, the object's hidden state or invalid state needs to be removed. In this embodiment, the hidden state or the failed state of the object is released by an acoustic signal that satisfies a certain condition. Specifically, when it is necessary to release the hidden state or the invalid state of the object, the user can issue or play a specific sound to the mobile terminal to cause the sensor to receive the acoustic signal.
305、判断所述声信号是否满足第二条件。305. Determine whether the acoustic signal meets the second condition.
306、当确定接收到满足第二条件的声信号时,所述移动终端将所述对象切换为正常状态。306. When it is determined that the acoustic signal that satisfies the second condition is received, the mobile terminal switches the object to a normal state.
本实施例中,当检测到对象满足预置条件,例如,结束运行时,所述移动终端将所述对象设置为隐藏状态或失效状态。这样,他人即使拿到移动终端也无法看到移动终端内的该对象的内容,避免了用户的隐私泄露。而且,由于该对象处于隐藏状态或失效状态,他人会认为该对象出现故障或者根本察觉不到该对象的存在,大大降低了该对象的密码被破解的可能性。而且,本申请中,将移动终端接收到满足第二条件的声信号作为验证密码,大大降低了验证密码被破解的可能性,提高了用户的信息安全度。In this embodiment, when it is detected that the object satisfies the preset condition, for example, when the operation ends, the mobile terminal sets the object to a hidden state or a failed state. In this way, even if the other person obtains the mobile terminal, the content of the object in the mobile terminal cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked. Moreover, in the present application, the mobile terminal receives the acoustic signal that satisfies the second condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the information security of the user.
本实施例中,移动终端将满足第二条件的声信号作为对对象的解锁密码。在另一实施例中,移动终端还可以将满足第一条件的光信号和满足第二条件的声信号两者同时作为对对象的解锁密码。In this embodiment, the mobile terminal uses the acoustic signal that satisfies the second condition as the unlock password for the object. In another embodiment, the mobile terminal may also use both the optical signal satisfying the first condition and the acoustic signal satisfying the second condition as the unlock password for the object.
图4示出了本申请实施例的一种安全验证方法。请参阅图4,本申请实施例中安全验证方法包括: FIG. 4 shows a security verification method of an embodiment of the present application. Referring to FIG. 4, the security verification method in the embodiment of the present application includes:
401、接收对第一条件和第二条件的设置。401. Receive a setting of the first condition and the second condition.
402、检测对象是否满足预置条件。402. Check whether the object meets the preset condition.
403、当检测到所述对象满足预置条件时,移动终端将所述对象设置为隐藏状态或失效状态。403. When detecting that the object satisfies a preset condition, the mobile terminal sets the object to a hidden state or a failed state.
404、接收光信号和声信号。404. Receive an optical signal and an acoustic signal.
405、判断所述光信号是否满足所述第一条件,以及所述声信号是否满足第二条件。405. Determine whether the optical signal meets the first condition, and whether the acoustic signal satisfies a second condition.
406、当确定接收到满足第一条件的光信号以及满足第二条件的声信号时,所述移动终端将所述对象切换为正常状态。406. When it is determined that the optical signal that satisfies the first condition and the acoustic signal that satisfies the second condition are received, the mobile terminal switches the object to a normal state.
上述各步骤具体可参见第二实施例和第三实施例中的相关描述。For details of the above steps, refer to related descriptions in the second embodiment and the third embodiment.
上面对本申请实施例中的安全验证方法进行了描述。下面对本申请实施例中的安全验证装置进行描述。The security verification method in the embodiment of the present application has been described above. The security verification apparatus in the embodiment of the present application is described below.
图5为本申请实施例的安全验证装置的结构示意图。本实施例中的安全验证装置500可以用于执行图1所示实施例中的安全验证方法。本申请实施例中的安全验证装置500包括:FIG. 5 is a schematic structural diagram of a security verification apparatus according to an embodiment of the present application. The security verification apparatus 500 in this embodiment may be used to perform the security verification method in the embodiment shown in FIG. 1. The security verification apparatus 500 in the embodiment of the present application includes:
第一接收模块501,用于接收对解锁条件的设置;a first receiving module 501, configured to receive a setting for an unlocking condition;
检测模块502,用于检测对象是否满足预置条件;The detecting module 502 is configured to detect whether the object meets a preset condition;
锁定模块503,用于当检测到所述对象满足所述预置条件时,将所述对象设置为第一状态,其中所述第一状态为隐藏状态或失效状态;The locking module 503 is configured to: when detecting that the object meets the preset condition, set the object to a first state, where the first state is a hidden state or a failed state;
第二接收模块504,用于接收信号;a second receiving module 504, configured to receive a signal;
判断模块505,用于判断所述信号是否满足所述解锁条件;The determining module 505 is configured to determine whether the signal meets the unlocking condition;
解锁模块506,用于当确定所述信号满足所述解锁条件时,将所述对象从所述第一状态切换为第二状态,其中所述第二状态为显示且可运行状态。The unlocking module 506 is configured to switch the object from the first state to a second state when determining that the signal satisfies the unlocking condition, wherein the second state is a display and an operable state.
可选地,所述解锁条件包括针对光信号的第一条件,以及,所述第 二接收模块504用于接收光信号,所述判断模块505用于判断所述光信号是否满足所述第一条件。Optionally, the unlocking condition includes a first condition for an optical signal, and the The second receiving module 504 is configured to receive an optical signal, and the determining module 505 is configured to determine whether the optical signal meets the first condition.
可选地,所述解锁条件包括针对声信号的第二条件,以及,所述第二接收模块504用于接收声信号,所述判断模块505用于判断所述声信号是否满足所述第二条件。Optionally, the unlocking condition includes a second condition for the acoustic signal, and the second receiving module 504 is configured to receive the acoustic signal, and the determining module 505 is configured to determine whether the acoustic signal meets the second condition.
具体的,所述安全验证装置可以为移动终端,包括手机、个人计算机(PC,Personal Computer)和/或平板电脑等设备。Specifically, the security verification device may be a mobile terminal, including a mobile phone, a personal computer (PC, Personal Computer), and/or a tablet computer.
本实施例中,当检测到对象满足预置条件,例如,结束运行时,所述安全验证装置将所述对象设置为隐藏状态或失效状态。这样,他人即使拿到安全验证装置也无法看到安全验证装置内的该对象中的内容,避免了用户的隐私泄露。而且,由于该对象处于隐藏状态或失效状态,他人会认为该对象出现故障或者根本察觉不到该对象的存在,大大降低了该对象的密码被破解的可能性。而且,本申请中,将安全验证装置接收到满足第一条件的光信号和/或接收到满足第二条件的声信号作为验证密码,大大降低了验证密码被破解的可能性,提高了用户的信息安全度。In this embodiment, when it is detected that the object satisfies the preset condition, for example, when the operation is ended, the security verification apparatus sets the object to a hidden state or a failure state. In this way, even if the other person obtains the security verification device, the content in the object in the security verification device cannot be seen, and the privacy leakage of the user is avoided. Moreover, since the object is in a hidden state or a failed state, others may think that the object is faulty or does not perceive the existence of the object, which greatly reduces the possibility that the object's password is cracked. Moreover, in the present application, the security verification device receives the optical signal that satisfies the first condition and/or receives the acoustic signal that satisfies the second condition as the verification password, which greatly reduces the possibility that the verification password is cracked, and improves the user's Information security.
在本申请的一些可能的实施方式中,所述第一条件包括以下三项中的至少一项:In some possible implementations of the present application, the first condition includes at least one of the following three items:
光信号的波长在预置范围内;The wavelength of the optical signal is within a preset range;
光信号的光强在预置范围内;The light intensity of the optical signal is within a preset range;
光信号为s偏振光或者为p偏振光。The optical signal is s-polarized or p-polarized.
在本申请的一些可能的实施方式中,所述第一条件包括以下各项中的至少一项:In some possible implementations of the present application, the first condition includes at least one of the following:
光信号在所述安全验证装置的预置区域内形成的光斑面积在预置范围内;The spot area formed by the optical signal in the preset area of the security verification device is within a preset range;
光信号在所述安全验证装置的预置区域内形成的光斑个数在预置范 围内;The number of spots formed by the optical signal in the preset area of the security verification device is in a preset range Inside
光信号在所述安全验证装置的预置区域内的照射时长达到预置时长;The duration of the illumination of the optical signal in the preset area of the security verification device reaches a preset duration;
光信号在所述安全验证装置的预置区域内的照射频率达到预置频率。The illumination frequency of the optical signal in the preset area of the security verification device reaches a preset frequency.
在本申请的一些可能的实施方式中,所述第二接收模块504具体用于接收并存储第一声信号;所述第一接收模块501确定第二条件,所述第二条件包括接收到的声信号和所述第一声信号的差异小于预置数值。In some possible implementation manners of the present application, the second receiving module 504 is specifically configured to receive and store a first acoustic signal; the first receiving module 501 determines a second condition, where the second condition includes the received The difference between the acoustic signal and the first acoustic signal is less than a preset value.
在本申请的一些可能的实施方式中,所述对象包括所述安全验证装置所存储的文字信息、图片信息、应用程序APP中的至少一项。In some possible implementation manners of the present application, the object includes at least one of text information, picture information, and an application APP stored by the security verification device.
本实施例的解释说明可参考图1-4所示实施例的解释说明,在此不再赘述。For the explanation of the embodiment, reference may be made to the explanation of the embodiment shown in FIG. 1-4, and details are not described herein again.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the system, the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
图6示出了与本申请实施例相关的移动终端的部分结构的框图。参考图6,移动终端包括:射频(Radio Frequency,RF)电路610、存储器620、输入单元630、显示单元640、传感器650、音频电路660、无线保真(wireless fidelity,WiFi)模块670、处理器680、以及电源690等部件。本领域技术人员可以理解,图6中示出的移动终端的结构并不构成对移动终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 6 is a block diagram showing a part of the structure of a mobile terminal related to an embodiment of the present application. Referring to FIG. 6, the mobile terminal includes: a radio frequency (RF) circuit 610, a memory 620, an input unit 630, a display unit 640, a sensor 650, an audio circuit 660, a wireless fidelity (WiFi) module 670, and a processor. 680, and power supply 690 and other components. It will be understood by those skilled in the art that the structure of the mobile terminal shown in FIG. 6 does not constitute a limitation of the mobile terminal, and may include more or less components than those illustrated, or combine some components, or different component arrangements. .
下面结合图6对移动终端的各个构成部件进行具体的介绍:The following describes the components of the mobile terminal in detail with reference to FIG. 6:
RF电路610可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器680处理;另外,将设计上行 的数据发送给基站。通常,RF电路610包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路610还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 610 can be used for transmitting and receiving information or during a call, receiving and transmitting signals, and in particular, receiving downlink information of the base station and processing it to the processor 680; The data is sent to the base station. Generally, RF circuit 610 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 610 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
存储器620可用于存储软件程序以及模块,处理器680通过运行存储在存储器620的软件程序以及模块,从而执行移动终端的各种功能应用以及数据处理。存储器620可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据移动终端的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器620可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 620 can be used to store software programs and modules, and the processor 680 executes various functional applications and data processing of the mobile terminal by running software programs and modules stored in the memory 620. The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile terminal (such as audio data, phone book, etc.). Moreover, memory 620 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
输入单元630可用于接收输入的数字或字符信息,以及产生与移动终端的用户设置以及功能控制有关的键信号输入。例如,输入单元630可以用于接收用户对解锁条件的设置。具体的,输入单元630可包括触控面板631以及其他输入设备632。触控面板631,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板631上或在触控面板631附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板631可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测 触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器680,并能接收处理器680发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板631。除了触控面板631,输入单元630还可以包括其他输入设备632。具体地,其他输入设备632可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 630 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile terminal. For example, the input unit 630 can be configured to receive a user's setting of an unlock condition. Specifically, the input unit 630 can include a touch panel 631 and other input devices 632. The touch panel 631, also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 631 or near the touch panel 631. Operation), and drive the corresponding connecting device according to a preset program. Optionally, the touch panel 631 can include two parts: a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user and detects Touching the signal from the operation, transmitting the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, sends it to the processor 680, and can receive the processor 680 The order is executed and executed. In addition, the touch panel 631 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch panel 631, the input unit 630 may also include other input devices 632. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
显示单元640可用于显示由用户输入的信息或提供给用户的信息以及移动终端的各种菜单。例如,显示单元640可以用于向用户显示提供有波长、光强、偏振等的设置页面以供用户选择。显示单元640可包括显示面板641,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板641。进一步的,触控面板631可覆盖显示面板641,当触控面板631检测到在其上或附近的触摸操作后,传送给处理器680以确定触摸事件的类型,随后处理器680根据触摸事件的类型在显示面板641上提供相应的视觉输出。虽然在图6中,触控面板631与显示面板641是作为两个独立的部件来实现移动给终端的输入和输入功能,但是在某些实施例中,可以将触控面板631与显示面板641集成而实现移动终端的输入和输出功能。The display unit 640 can be used to display information input by the user or information provided to the user as well as various menus of the mobile terminal. For example, the display unit 640 can be used to display a setting page provided with a wavelength, light intensity, polarization, etc., to the user for selection by the user. The display unit 640 can include a display panel 641. Alternatively, the display panel 641 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like. Further, the touch panel 631 can cover the display panel 641. When the touch panel 631 detects a touch operation on or near it, the touch panel 631 transmits to the processor 680 to determine the type of the touch event, and then the processor 680 according to the touch event. The type provides a corresponding visual output on display panel 641. Although in FIG. 6, the touch panel 631 and the display panel 641 are two independent components to implement the input and input functions of the mobile terminal, in some embodiments, the touch panel 631 and the display panel 641 may be Integrate to realize the input and output functions of the mobile terminal.
移动终端还可包括至少一种传感器650,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可接受特定的光束照射,以接收到光信号。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别移动终端姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于移动终端还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。 The mobile terminal can also include at least one type of sensor 650, such as a light sensor, motion sensor, and other sensors. In particular, the light sensor can receive a particular beam of light to receive the light signal. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the attitude of the mobile terminal (such as horizontal and vertical screen switching, Related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as well as other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which can be configured in mobile terminals, No longer.
音频电路660、扬声器661,传声器662可提供用户与移动终端之间的音频接口。音频电路660可将接收到的音频数据转换后的电信号,传输到扬声器661,由扬声器661转换为声音信号输出;另一方面,传声器662将收集的声音信号转换为电信号,由音频电路660接收后转换为音频数据,再将音频数据输出处理器680处理后,经RF电路610发送,或者将音频数据输出至存储器620以进一步处理。An audio circuit 660, a speaker 661, and a microphone 662 can provide an audio interface between the user and the mobile terminal. The audio circuit 660 can transmit the converted electrical data of the received audio data to the speaker 661 for conversion to the sound signal output by the speaker 661; on the other hand, the microphone 662 converts the collected sound signal into an electrical signal by the audio circuit 660. After receiving, it is converted into audio data, and then processed by the audio data output processor 680, transmitted via the RF circuit 610, or outputted to the memory 620 for further processing.
WiFi属于短距离无线传输技术,移动终端通过WiFi模块670可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图6示出了WiFi模块670,但是可以理解的是,其并不属于移动终端的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology, and the mobile terminal can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 670, which provides wireless broadband Internet access for users. Although FIG. 6 shows the WiFi module 670, it can be understood that it does not belong to the essential configuration of the mobile terminal, and may be omitted as needed within the scope of not changing the essence of the invention.
处理器680是移动终端的控制中心,利用各种接口和线路连接整个移动终端的各个部分,通过运行或执行存储在存储器620内的软件程序和/或模块,以及调用存储在存储器620内的数据,执行移动终端的各种功能和处理数据,从而对移动终端进行整体监控。可选的,处理器680可包括一个或多个处理单元;优选的,处理器680可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器680中。The processor 680 is the control center of the mobile terminal, connecting various portions of the entire mobile terminal using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 620, and recalling data stored in the memory 620. The mobile terminal performs various functions and processing data to perform overall monitoring on the mobile terminal. Optionally, the processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like. The modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 680.
移动终端还包括给各个部件供电的电源690(比如电池),优选的,电源可以通过电源管理系统与处理器680逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile terminal also includes a power source 690 (such as a battery) that supplies power to the various components. Preferably, the power source can be logically coupled to the processor 680 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
尽管未示出,移动终端还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile terminal may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
在本申请实施例中,该移动终端所包括的处理器680还具有执行以 上方法流程的功能。In the embodiment of the present application, the processor 680 included in the mobile terminal further has an implementation. The function of the method flow.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided by the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。 The integrated unit, if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application, in essence or the contribution to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium. A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。 The above embodiments are only used to explain the technical solutions of the present application, and are not limited thereto; although the present application has been described in detail with reference to the foregoing embodiments, those skilled in the art should understand that they can still The technical solutions described in the embodiments are modified, or the equivalents of the technical features are replaced by the equivalents. The modifications and substitutions of the embodiments do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (15)

  1. 一种安全验证方法,其特征在于,包括:A security verification method, comprising:
    接收对解锁条件的设置;Receive settings for unlock conditions;
    检测对象是否满足预置条件;Check whether the object meets the preset condition;
    当检测到所述对象满足所述预置条件时,移动终端将所述对象设置为第一状态,其中所述第一状态为隐藏状态或失效状态;When detecting that the object satisfies the preset condition, the mobile terminal sets the object to a first state, wherein the first state is a hidden state or a failed state;
    接收信号;receive signal;
    判断所述信号是否满足所述解锁条件;Determining whether the signal satisfies the unlocking condition;
    当确定所述信号满足所述解锁条件时,所述移动终端将所述对象从所述第一状态切换为第二状态,其中所述第二状态为显示且可运行状态。When it is determined that the signal satisfies the unlock condition, the mobile terminal switches the object from the first state to a second state, wherein the second state is a display and an operational state.
  2. 根据权利要求1所述的安全验证方法,其特征在于,所述解锁条件包括针对光信号的第一条件,The security verification method according to claim 1, wherein the unlocking condition comprises a first condition for an optical signal,
    接收信号,判断所述信号是否满足所述解锁条件包括:Receiving a signal, determining whether the signal satisfies the unlocking condition comprises:
    接收光信号,判断所述光信号是否满足所述第一条件。Receiving an optical signal, determining whether the optical signal satisfies the first condition.
  3. 根据权利要求1或2所述的安全验证方法,其特征在于,所述解锁条件包括针对声信号的第二条件,The security verification method according to claim 1 or 2, wherein the unlocking condition includes a second condition for an acoustic signal,
    接收信号,判断所述信号是否满足所述解锁条件包括:Receiving a signal, determining whether the signal satisfies the unlocking condition comprises:
    接收声信号,判断所述声信号是否满足所述第二条件。Receiving an acoustic signal, determining whether the acoustic signal satisfies the second condition.
  4. 根据权利要求2所述的安全验证方法,其特征在于,所述第一条件包括以下三项中的至少一项:The security verification method according to claim 2, wherein the first condition comprises at least one of the following three items:
    光信号的波长在预置范围内;The wavelength of the optical signal is within a preset range;
    光信号的光强在预置范围内;以及The light intensity of the light signal is within a preset range;
    光信号为s偏振光或者为p偏振光。The optical signal is s-polarized or p-polarized.
  5. 根据权利要求2所述的安全验证方法,其特征在于,所述第一条件包括以下各项中的至少一项:The security verification method according to claim 2, wherein the first condition comprises at least one of the following:
    光信号在所述移动终端的预置区域内形成的光斑面积在预置范围内;The spot area formed by the optical signal in the preset area of the mobile terminal is within a preset range;
    光信号在所述移动终端的预置区域内形成的光斑个数在预置范围内;The number of spots formed by the optical signal in the preset area of the mobile terminal is within a preset range;
    光信号在所述移动终端的预置区域内的照射时长达到预置时长;以及 The duration of the illumination of the optical signal in the preset area of the mobile terminal reaches a preset duration;
    光信号在所述移动终端的预置区域内的照射频率达到预置频率。The illumination frequency of the optical signal in the preset area of the mobile terminal reaches a preset frequency.
  6. 根据权利要求3所述的安全验证方法,其特征在于,接收对第二条件的设置,包括:The security verification method according to claim 3, wherein receiving the setting of the second condition comprises:
    接收并存储第一声信号;Receiving and storing the first acoustic signal;
    确定第二条件,所述第二条件包括接收到的声信号和所述第一声信号的差异小于预置数值。A second condition is determined, the second condition comprising a difference between the received acoustic signal and the first acoustic signal being less than a preset value.
  7. 根据权利要求1至6任一项所述的安全验证方法,其特征在于,所述对象包括所述移动终端所存储的文字信息、图片信息、应用程序中的至少一项。The security verification method according to any one of claims 1 to 6, wherein the object includes at least one of text information, picture information, and an application stored by the mobile terminal.
  8. 一种安全验证装置,其特征在于,包括:A security verification device, comprising:
    第一接收模块,用于接收对解锁条件的设置;a first receiving module, configured to receive a setting for an unlocking condition;
    检测模块,用于检测对象是否满足预置条件;a detecting module, configured to detect whether the object meets a preset condition;
    锁定模块,用于当检测到所述对象满足所述预置条件时,将所述对象设置为第一状态,其中所述第一状态为隐藏状态或失效状态;a locking module, configured to: when detecting that the object satisfies the preset condition, set the object to a first state, where the first state is a hidden state or a failed state;
    第二接收模块,用于接收信号;a second receiving module, configured to receive a signal;
    判断模块,用于判断所述信号是否满足所述解锁条件;a determining module, configured to determine whether the signal meets the unlocking condition;
    解锁模块,用于当确定所述信号满足所述解锁条件时,将所述对象从所述第一状态切换为第二状态,其中所述第二状态为显示且可运行状态。And an unlocking module, configured to switch the object from the first state to a second state when determining that the signal satisfies the unlocking condition, wherein the second state is a display and an operable state.
  9. 根据权利要求8所述的安全验证装置,其特征在于,所述解锁条件包括针对光信号的第一条件,The security verification device according to claim 8, wherein said unlocking condition comprises a first condition for an optical signal,
    所述第二接收模块用于接收光信号;The second receiving module is configured to receive an optical signal;
    所述判断模块用于判断所述光信号是否满足所述第一条件。The determining module is configured to determine whether the optical signal meets the first condition.
  10. 根据权利要求8或9所述的安全验证装置,其特征在于,所述解锁条件包括针对声信号的第二条件,A security verification device according to claim 8 or 9, wherein said unlocking condition comprises a second condition for an acoustic signal,
    所述第二接收模块用于接收声信号;The second receiving module is configured to receive an acoustic signal;
    所述判断模块用于判断所述声信号是否满足所述第二条件。The determining module is configured to determine whether the sound signal meets the second condition.
  11. 根据权利要求9所述的安全验证装置,其特征在于,所述第一条件包括以下三项中的至少一项:The security verification device according to claim 9, wherein the first condition comprises at least one of the following three items:
    光信号的波长在预置范围内; The wavelength of the optical signal is within a preset range;
    光信号的光强在预置范围内;以及The light intensity of the light signal is within a preset range;
    光信号为s偏振光或者为p偏振光。The optical signal is s-polarized or p-polarized.
  12. 根据权利要求9所述的安全验证装置,其特征在于,所述第一条件包括以下各项中的至少一项:The security verification device according to claim 9, wherein the first condition comprises at least one of the following:
    光信号在所述安全验证装置的预置区域内形成的光斑面积在预置范围内;The spot area formed by the optical signal in the preset area of the security verification device is within a preset range;
    光信号在所述安全验证装置的预置区域内形成的光斑个数在预置范围内;The number of spots formed by the optical signal in the preset area of the security verification device is within a preset range;
    光信号在所述安全验证装置的预置区域内的照射时长达到预置时长;以及The duration of the illumination of the optical signal in the preset area of the security verification device reaches a preset duration;
    光信号在所述安全验证装置的预置区域内的照射频率达到预置频率。The illumination frequency of the optical signal in the preset area of the security verification device reaches a preset frequency.
  13. 根据权利要求10所述的安全验证装置,其特征在于,所述第二接收模块用于接收并存储第一声信号;所述第一接收模块用于确定第二条件,所述第二条件包括接收到的声信号和所述第一声信号的差异小于预置数值。The security verification apparatus according to claim 10, wherein the second receiving module is configured to receive and store a first acoustic signal; the first receiving module is configured to determine a second condition, the second condition includes The difference between the received acoustic signal and the first acoustic signal is less than a preset value.
  14. 根据权利要求8至13任一项所述的安全验证装置,其特征在于,所述对象包括所述安全验证装置所存储的文字信息、图片信息、应用程序中的至少一项。The security verification device according to any one of claims 8 to 13, characterized in that the object includes at least one of text information, picture information, and an application stored by the security verification device.
  15. 一种非易失性计算机可读存储介质,其上存储有指令集,所述指令集由一个或多个处理器执行而执行以下步骤:A non-transitory computer readable storage medium having stored thereon a set of instructions executed by one or more processors to perform the following steps:
    接收对解锁条件的设置;Receive settings for unlock conditions;
    检测对象是否满足预置条件;Check whether the object meets the preset condition;
    当检测到所述对象满足所述预置条件时,将所述对象设置为第一状态,所述第一状态为隐藏状态或失效状态;When detecting that the object satisfies the preset condition, setting the object to a first state, the first state being a hidden state or a failed state;
    接收信号;receive signal;
    判断所述信号是否满足所述解锁条件;Determining whether the signal satisfies the unlocking condition;
    当所述信号满足所述解锁条件时,将所述对象从所述第一状态切换为第二状态,其中所述第二状态为显示且可运行状态。 The object is switched from the first state to a second state when the signal satisfies the unlocking condition, wherein the second state is a display and an operational state.
PCT/CN2016/087270 2015-10-29 2016-06-27 Safety verification method and safety verification device WO2017071268A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510716557.XA CN106657553B (en) 2015-10-29 2015-10-29 Safe verification method and safety verification device
CN201510716557.X 2015-10-29

Publications (1)

Publication Number Publication Date
WO2017071268A1 true WO2017071268A1 (en) 2017-05-04

Family

ID=58631269

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/087270 WO2017071268A1 (en) 2015-10-29 2016-06-27 Safety verification method and safety verification device

Country Status (2)

Country Link
CN (1) CN106657553B (en)
WO (1) WO2017071268A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110471564A (en) * 2019-07-31 2019-11-19 维沃移动通信有限公司 A kind of display control method and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101344827A (en) * 2008-08-22 2009-01-14 李兴文 Optical touch screen and touch pen
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012222612A (en) * 2011-04-08 2012-11-12 Nec Saitama Ltd Portable terminal
CN103226438A (en) * 2013-04-16 2013-07-31 广州长嘉电子有限公司 Method and system for desktop subject display mode based on light intensity adjustable panel terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101344827A (en) * 2008-08-22 2009-01-14 李兴文 Optical touch screen and touch pen
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110471564A (en) * 2019-07-31 2019-11-19 维沃移动通信有限公司 A kind of display control method and electronic equipment

Also Published As

Publication number Publication date
CN106657553A (en) 2017-05-10
CN106657553B (en) 2019-11-19

Similar Documents

Publication Publication Date Title
US10643000B2 (en) Access control method and terminal device
US11269981B2 (en) Information displaying method for terminal device and terminal device
CN106778175B (en) Interface locking method and device and terminal equipment
CN109194818B (en) Information processing method and terminal
CN106658489B (en) Terminal application processing method and device and mobile terminal
JP2018537027A (en) Service processing method, device and system
WO2018049881A1 (en) Data migration method and device
WO2015043338A1 (en) Identify verifying method, account acquiring method, mobile terminal, and storage medium
CN106506820B (en) Backup method and device for mobile terminal data
WO2018049893A1 (en) Data transmission method and terminal device
WO2018049912A1 (en) Data transmission method and related devices
WO2016078504A1 (en) Identity authentication method and device
CN108075966B (en) Message processing method and mobile terminal
CN104683301B (en) Password storage method and device
CN105653220B (en) Screen data display method and device in remote control
WO2019007371A1 (en) Method for preventing information from being stolen, storage device, and mobile terminal
WO2018049884A1 (en) Data migration method and device
WO2018049934A1 (en) Data migration method and terminals
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
WO2016192511A1 (en) Method and apparatus for remotely deleting information
WO2019128179A1 (en) Method and apparatus for data transmission between mobile terminals, and mobile terminal
WO2019019837A1 (en) Biological identification method and related product
TW201541337A (en) Method, device and system for displaying messages in mobile terminal
WO2019076250A1 (en) Push message management method and related products

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16858711

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/09/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16858711

Country of ref document: EP

Kind code of ref document: A1