WO2017166775A1 - 一种安全防护方法、装置及智能终端 - Google Patents

一种安全防护方法、装置及智能终端 Download PDF

Info

Publication number
WO2017166775A1
WO2017166775A1 PCT/CN2016/101876 CN2016101876W WO2017166775A1 WO 2017166775 A1 WO2017166775 A1 WO 2017166775A1 CN 2016101876 W CN2016101876 W CN 2016101876W WO 2017166775 A1 WO2017166775 A1 WO 2017166775A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint information
smart terminal
current user
stored
user
Prior art date
Application number
PCT/CN2016/101876
Other languages
English (en)
French (fr)
Inventor
陈建如
Original Assignee
乐视控股(北京)有限公司
乐视移动智能信息技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 乐视控股(北京)有限公司, 乐视移动智能信息技术(北京)有限公司 filed Critical 乐视控股(北京)有限公司
Publication of WO2017166775A1 publication Critical patent/WO2017166775A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Definitions

  • the present application relates to the field of human-computer interaction technologies, and in particular, to a security protection method, device, electronic device, and intelligent terminal.
  • smart terminals such as smart phones to query materials, shop online, video with friends and family, take photos and share them on social platforms, watch videos, etc. It can be said that smart terminals have become essential in people's lives. Part of it, which often stores a large number of personal information of intelligent terminal users.
  • the smart terminal user In order to prevent others from entering the application interface of the smart terminal, the smart terminal user usually sets a password protection, and only enters the correct password to unlock the application interface of the smart terminal, thereby protecting personal privacy. However, if the user cracks the password, the password protection will be invalid.
  • the technical problem to be solved by the present application is to overcome the problem that other people in the prior art can enter the application interface of the smart terminal by cracking the password, resulting in the lack of password protection function.
  • the trap provides a safe and secure method, device, electronic device and intelligent terminal.
  • the embodiment of the present application provides a security protection method for an intelligent terminal, including the following steps:
  • the unlocking is switched to the smart terminal application interface.
  • the process returns the fingerprint information of the current user of the smart terminal, re-acquires the fingerprint information of the current user of the smart terminal, and records the number of times the fingerprint information of the current user of the smart terminal is compared with the fingerprint information stored in advance;
  • the embodiment of the present application further provides a security protection device for an intelligent terminal, including the following steps:
  • a detecting unit configured to detect whether an intelligent terminal operation instruction is received
  • a fingerprint information acquiring unit configured to acquire fingerprint information of a current user of the smart terminal after receiving an operation instruction of the smart terminal
  • the unlocking unit is configured to unlock and switch to the smart terminal application interface when the current user's fingerprint information is consistent with the pre-stored fingerprint information.
  • the fingerprint information acquiring unit re-acquires the fingerprint information of the current user of the smart terminal when the fingerprint information of the current user is inconsistent with the fingerprint information stored in advance;
  • a number recording unit configured to record the number of times the fingerprint information of the current user of the smart terminal is compared with the fingerprint information stored in advance;
  • a determining unit configured to determine whether the number of times exceeds a preset number of times threshold
  • an alarm unit configured to issue an alarm instruction when the number of times exceeds the preset number of times threshold.
  • a facial image information acquiring unit configured to start capturing in a silent state to acquire facial image information of a current smart terminal user when the number of times exceeds the preset number of times threshold;
  • a sending unit configured to send the facial image information to a preset phone number and/or a mailbox.
  • the embodiment of the present application further provides an intelligent terminal, including the foregoing security protection device and fingerprint information collection device;
  • the fingerprint information collecting device is configured to collect fingerprint information of a current user of the smart terminal and transmit the fingerprint information to the security protection device.
  • An embodiment of the present application further provides an electronic device including at least one processor; and a memory communicably coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor The instruction is executed by the at least one processor, so that the at least one processor can: detect whether the smart terminal operation instruction is received; if received, acquire the fingerprint information of the current user of the smart terminal; The fingerprint information is compared with the pre-stored fingerprint information; if they are consistent, the unlocking is switched to the smart terminal application interface.
  • the at least one processor is further configured to: if not, return the fingerprint information of the current user of the smart terminal, re-acquire the fingerprint information of the current user of the smart terminal, and record the current user of the smart terminal. The number of times the fingerprint information is compared with the pre-stored fingerprint information; whether the number of times exceeds a preset number of thresholds; if not, an alarm command is issued.
  • the at least one processor is further configured to: if exceeded, initiate shooting in a silent state to acquire facial image information of a current smart terminal user; and send the facial image information to a preset telephone number and/or Or in the mailbox.
  • the embodiment of the present application further provides a non-transitory computer readable storage medium, where the storage
  • the computer-executable instructions for storing the computer-executable instructions when executed by the electronic device, enable the electronic device to: detect whether the smart terminal operation instruction is received; if received, acquire the fingerprint information of the current user of the smart terminal; The fingerprint information of the current user of the terminal is compared with the fingerprint information stored in advance; if they are consistent, the unlocking is switched to the smart terminal application interface.
  • the foregoing storage medium preferably enables the electronic device to: if not, return the fingerprint information of the current user of the smart terminal, re-acquire the fingerprint information of the current user of the smart terminal, and record the fingerprint of the current user of the smart terminal. The number of times the information is compared with the pre-stored fingerprint information; whether the number of times exceeds a preset number of thresholds; if not, an alarm command is issued.
  • the storage medium is configured to enable the electronic device to: if exceeded, initiate shooting in a silent state to acquire facial image information of a current intelligent terminal user; and send the facial image information to a preset telephone number and/or a mailbox. in.
  • the embodiment of the present application further provides a computer program product, the computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instruction is used by a computer When executed, the computer is caused to perform the aforementioned method.
  • the embodiment of the present application provides a security protection method, device, and electronic device. After detecting an operation instruction of the intelligent terminal, the method obtains the fingerprint information of the current user of the intelligent terminal, and the fingerprint information of the current user of the smart terminal and the pre-stored fingerprint information. For comparison, the switch to the smart terminal application interface is only unlocked when it is consistent. Because the fingerprint information is unique to each person, it cannot be copied. By using the user fingerprint information as the only way to unlock, the other party can avoid the password. Entering the application interface of the intelligent terminal, resulting in the occurrence of a password protection function, and improving the security protection performance of the intelligent terminal.
  • FIG. 1 is a flowchart of a specific example of a security protection method in Embodiment 1 of the present application
  • FIG. 2 is a schematic block diagram of a specific example of a security protection device according to Embodiment 2 of the present application;
  • FIG. 3 is a schematic block diagram of a specific example of an intelligent terminal in Embodiment 3 of the present application.
  • FIG. 4 is a schematic structural diagram of hardware of an electronic device according to Embodiment 4 of the present application.
  • connection or integral connection; may be mechanical connection or electrical connection; may be directly connected, may also be indirectly connected through an intermediate medium, or may be internal communication of two components, may be wireless connection, or may be wired connection.
  • connection or integral connection; may be mechanical connection or electrical connection; may be directly connected, may also be indirectly connected through an intermediate medium, or may be internal communication of two components, may be wireless connection, or may be wired connection.
  • This embodiment provides a security protection method for a smart terminal, where the smart terminal includes, but is not limited to, a smart phone, a pad, a notebook computer, a desktop computer, and the like.
  • the security protection method in this embodiment includes the following steps:
  • step S1 Detect whether the smart terminal operation instruction is received. If yes, go to step S2, if not, repeat step S1. Specifically, any touch, power on, button, etc. can be touched to the smart terminal. Related operations are considered to receive intelligent terminal operation instructions.
  • the user fingerprint information may be collected by the fingerprint collection device installed on the smart terminal, and the collected fingerprint information is transmitted to the smart terminal MCU.
  • step S3 Comparing the fingerprint information of the current user of the smart terminal with the fingerprint information stored in advance. If they match, the process goes to step S4, and if they do not match, the process goes to step S5.
  • the security protection method in this embodiment detects the fingerprint information of the current user of the smart terminal after receiving the operation instruction of the smart terminal, and compares the fingerprint information of the current user of the smart terminal with the pre-stored fingerprint information. Unlock to switch to the smart terminal application interface. Because the fingerprint information is unique to each person, it cannot be copied. By using the user fingerprint information as the only way to unlock, the other party can avoid entering the application interface of the smart terminal by cracking the password, resulting in the occurrence of the password protection function being invalid. Improve the security protection performance of smart terminals.
  • step S5 re-acquiring the fingerprint information of the current user of the smart terminal, and recording the number of times the fingerprint information of the current user of the smart terminal is compared with the fingerprint information stored in advance.
  • step S6 Whether the number of judgments exceeds a preset number threshold. If it is exceeded, the process proceeds to step S7, and if it is not exceeded, step S6 is repeated.
  • the fingerprint information of the user may not be clear when it is not clear. By setting the threshold of the preset number of times, the user may be given the opportunity to re-enter the fingerprint information several times. Unclear fingerprint collection leads to users not being able to The situation of frequent use occurs.
  • the silent state is that during the process of turning on the mobile phone camera, the flash, the focus sound effect, and the shutter sound effect are not turned on, and the process of taking the picture is also performed in the memory without being displayed on the screen of the mobile phone, and the whole shooting process is Completed in silence. In this way, the collection of facial image information can be completed without the ignorance of the illegal user, and the extra-segmentation can be avoided.
  • This embodiment provides a security protection device for a smart terminal, where the smart terminal includes, but is not limited to, a smart phone, a pad, a notebook computer, a desktop computer, and the like.
  • the safety protection device in this embodiment as shown in FIG. 2, includes:
  • the detecting unit 1 is configured to detect whether a smart terminal operation instruction is received.
  • the fingerprint information acquiring unit 2 is configured to acquire fingerprint information of the current user of the smart terminal after receiving the operation instruction of the smart terminal.
  • Comparing unit 3 the fingerprint information of the current user of the smart terminal and the pre-stored fingerprint information are Line comparison.
  • the unlocking unit 4 is configured to unlock and switch to the smart terminal application interface when the current user's fingerprint information is consistent with the pre-stored fingerprint information.
  • the security protection device in this embodiment detects the fingerprint information of the current user of the smart terminal after receiving the operation instruction of the smart terminal, and compares the fingerprint information of the current user of the smart terminal with the pre-stored fingerprint information. Unlock to switch to the smart terminal application interface. Because the fingerprint information is unique to each person, it cannot be copied. By using the user fingerprint information as the only way to unlock, the other party can avoid entering the application interface of the smart terminal by cracking the password, resulting in the occurrence of the password protection function being invalid. Improve the security protection performance of smart terminals.
  • the fingerprint information acquiring unit 2 re-acquires the fingerprint information of the current user of the smart terminal when the fingerprint information of the current user is inconsistent with the fingerprint information stored in advance.
  • the number recording unit 5 is configured to record the number of times the fingerprint information of the current user of the smart terminal is compared with the fingerprint information stored in advance.
  • the determining unit 6 is configured to determine whether the number of times exceeds a preset number of times threshold.
  • the alarm unit 7 is configured to issue an alarm command when the number of times exceeds a preset number of times threshold.
  • the facial image information acquiring unit 8 is configured to start capturing in the silent state to acquire facial image information of the current smart terminal user when the number of times exceeds the preset number of times threshold.
  • the sending unit 9 is configured to send the facial image information to the preset telephone number and/or the mailbox. Pass Sending the current user, that is, the facial image information of the illegal user to a preset telephone number and/or mailbox, helps to lock and discover the illegal user in time.
  • This embodiment provides an intelligent terminal, where the smart terminal includes but is not limited to a smart phone, a pad, a notebook computer, a desktop computer, and the like. As shown in FIG. 3, the smart terminal in this embodiment includes the security protection device 11 and the fingerprint information collection device 12 in Embodiment 2.
  • the fingerprint information collecting device 12 is configured to collect fingerprint information of the current user of the smart terminal and transmit the fingerprint information to the security protection device 11.
  • the smart terminal in this embodiment detects the fingerprint information of the current user of the smart terminal through the security protection device 11, and compares the fingerprint information of the current user of the smart terminal with the pre-stored fingerprint information. Only when the agreement is reached, the switch to the smart terminal application interface is unlocked. Because the fingerprint information is unique to each person, it cannot be copied. By using the user fingerprint information as the only way to unlock, the other party can avoid entering the application interface of the smart terminal by cracking the password, resulting in the occurrence of the password protection function being invalid. Improve the security protection performance of smart terminals.
  • an embodiment of the present application further provides an electronic device including at least one processor 810; and a memory 800 communicably connected to the at least one processor 810; wherein the memory 800 is stored An instruction executed by the at least one processor 810, the instructions being executed by the at least one processor 810 to enable the at least one processor 810 to: Detecting whether the smart terminal operation instruction is received; if received, obtaining the fingerprint information of the current user of the smart terminal; comparing the fingerprint information of the current user of the smart terminal with the pre-stored fingerprint information; if consistent, the unlocking is switched to the smart terminal application interface.
  • the electronic device also includes an input device 830 and an output device 840 that are electrically coupled to the memory 800 and the processor, the electrical connections preferably being connected by a bus.
  • the at least one processor is further configured to: if not, return the fingerprint information of the current user of the smart terminal, re-acquire the fingerprint information of the current user of the smart terminal, and record the The number of times the fingerprint information of the current user of the smart terminal is compared with the fingerprint information stored in advance; whether the number of times exceeds a preset number of thresholds; if not, an alarm command is issued.
  • the electronic device of the embodiment is configured to enable the at least one processor to: if exceeded, initiate shooting in a silent state to acquire facial image information of a current smart terminal user; and send the facial image information to a preset Phone number and / or mailbox.
  • the embodiment of the present application also provides a non-volatile computer storage medium storing the computer-executable instructions of computer-executable instructions, when executed by an electronic device, enabling the electronic device to: detect whether it is received The smart terminal operation instruction; if received, obtains the fingerprint information of the current user of the smart terminal; compares the fingerprint information of the current user of the smart terminal with the pre-stored fingerprint information; if consistent, the unlocking is switched to the smart terminal application interface.
  • the electronic device is further configured to: if not, return to acquire the fingerprint information of the current user of the smart terminal, and re-acquire the smart terminal.
  • the current user's fingerprint information and record the number of times the fingerprint information of the current user of the smart terminal is compared with the pre-stored fingerprint information; determine whether the number of times exceeds a preset number of thresholds; if exceeded, issue an alarm command.
  • the electronic device is further enabled to: if exceeded, initiate shooting in a silent state to acquire facial image information of a current intelligent terminal user; and send the facial image information to a preset telephone number And / or in the mailbox.
  • the embodiment of the present application further provides a computer program product, the computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instruction is used by a computer When executed, the computer is caused to perform the method described in the previous embodiments.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)

Abstract

一种安全防护方法、装置(11)、电子设备及智能终端,涉及人机交互技术领域。其中安全防护方法检测收到智能终端操作指令后,获取智能终端当前用户的指纹信息,并将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对,只有一致时才解锁切换至智能终端应用界面。因为指纹信息是每个人所独有的,无法仿制,通过将用户指纹信息作为解锁的唯一途径,避免了他人通过破解密码的方式进入智能终端的应用界面,导致密码保护功能形同虚设的情况的发生,提升了智能终端的安全防护性能。

Description

一种安全防护方法、装置及智能终端
交叉引用
本申请要求在2016年4月1日提交中国专利局、申请号为201610203537.7、发明名称为“一种安全防护方法、装置及智能终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及人机交互技术领域,具体涉及一种安全防护方法、装置、电子设备及智能终端。
背景技术
随着通讯技术的发展,人们可以通过智能终端,比如智能手机查询资料、网上购物、与亲朋视频、拍照并分享到社交平台、观看视频等等,可以说智能终端已经成为人们生活中必不可少的一部分,其内往往存储有大量智能终端用户的个人信息。为了防止他人进入智能终端的应用界面,智能终端用户通常会设置密码保护,只有输入正确的密码才能解锁进入智能终端的应用界面,以此来保护个人隐私。但如果用户破解掉密码,就会导致密码保护形同虚设。
发明内容
因此,本申请要解决的技术问题在于克服现有技术中他人可以通过破解密码的方式进入智能终端的应用界面,导致密码保护功能形同虚设的缺 陷,从而提供一种安全性能高的安全防护方法、装置、电子设备及智能终端。
为此,本申请提供了如下技术方案:
本申请实施例提供了一种安全防护方法,用于智能终端,包括如下步骤:
检测是否收到智能终端操作指令;
若收到,获取智能终端当前用户的指纹信息;
将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;
若一致,解锁切换至智能终端应用界面。
本申请实施例所述的方法,还包括:
若不一致,返回获取智能终端当前用户的指纹信息的步骤,重新获取智能终端当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;
判断所述次数是否超出预设次数阈值;
若超出,发出报警指令。
本申请实施例所述的方法,还包括:
若超出,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;
发送所述面部图像信息至预设电话号码和/或邮箱中。
本申请实施例还提供了一种安全防护装置,用于智能终端,包括如下步骤:
检测单元,用于检测是否收到智能终端操作指令;
指纹信息获取单元,用于在收到智能终端操作指令后获取智能终端当前用户的指纹信息;
比对单元,将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;
解锁单元,用于在当前用户的指纹信息与预先存储的指纹信息一致时解锁切换至智能终端应用界面。
本申请实施例所述的装置,所述指纹信息获取单元,在当前用户的指纹信息与预先存储的指纹信息不一致时,重新获取智能终端当前用户的指纹信息;
次数记录单元,用于记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;
判断单元,用于判断所述次数是否超出预设次数阈值;
报警单元,用于在所述次数超出所述预设次数阈值时,发出报警指令。
本申请实施例所述的装置,还包括:
面部图像信息获取单元,用于在所述次数超出所述预设次数阈值时,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;
发送单元,用于发送所述面部图像信息至预设电话号码和/或邮箱中。
本申请实施例还提供了一种智能终端,包括上述安全防护装置和指纹信息采集装置;
所述指纹信息采集装置,用于采集智能终端当前用户的指纹信息并传输至所述安全防护装置。
本申请实施例还提供了一种电子设备,包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:检测是否收到智能终端操作指令;若收到,获取智能终端当前用户的指纹信息;将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;若一致,解锁切换至智能终端应用界面。
上述的电子设备,优选地,使得所述至少一个处理器还能够:若不一致,返回获取智能终端当前用户的指纹信息的步骤,重新获取智能终端当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;判断所述次数是否超出预设次数阈值;若超出,发出报警指令。
上述的电子设备,优选地,使得所述至少一个处理器还能够:若超出,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;发送所述面部图像信息至预设电话号码和/或邮箱中。
本申请实施例还提供了一种非易失性计算机可读存储介质,所述存储 介质存储有计算机可执行指令的所述计算机可执行指令,当由电子设备执行时使得电子设备能够:检测是否收到智能终端操作指令;若收到,获取智能终端当前用户的指纹信息;将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;若一致,解锁切换至智能终端应用界面。
上述的存储介质,优选地,使得所述电子设备还能够:若不一致,返回获取智能终端当前用户的指纹信息的步骤,重新获取智能终端当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;判断所述次数是否超出预设次数阈值;若超出,发出报警指令。
上述的存储介质,优选地,使得所述电子设备还能够:若超出,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;发送所述面部图像信息至预设电话号码和/或邮箱中。
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在非易失性计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行前述方法。
本申请技术方案,具有如下优点:
本申请实施例提供了一种安全防护方法、装置及电子设备,检测收到智能终端操作指令后,获取智能终端当前用户的指纹信息,并将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对,只有一致时才解锁切换至智能终端应用界面。因为指纹信息是每个人所独有的,无法仿制,通过将用户指纹信息作为解锁的唯一途径,避免了他人通过破解密码的方 式进入智能终端的应用界面,导致密码保护功能形同虚设的情况的发生,提升了智能终端的安全防护性能。
附图说明
为了更清楚地说明本申请具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例1中安全防护方法的一个具体实例的流程图;
图2为本申请实施例2中安全防护装置的一个具体实例的原理框图;
图3为本申请实施例3中智能终端的一个具体实例的原理框图;
图4为本申请实施例4中电子设备的硬件结构示意图。
附图标记:
1-检测单元;2-指纹信息获取单元;3-比对单元;4-解锁单元;5-次数记录单元;6-判断单元;7-报警单元;8-面部图像信息获取单元;9-发送单元;11-安全防护装置;12-指纹信息采集装置;800-存储器;810-处理器;830-输入装置;840-输出装置。
具体实施方式
下面将结合附图对本申请的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申 请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
在本申请的描述中,需要说明的是,术语“中心”、“上”、“下”、“左”、“右”、“竖直”、“水平”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本申请和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本申请的限制。此外,术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性。
在本申请的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,还可以是两个元件内部的连通,可以是无线连接,也可以是有线连接。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。
此外,下面所描述的本申请不同实施方式中所涉及的技术特征只要彼此之间未构成冲突就可以相互结合。
实施例1
本实施例提供了一种安全防护方法,用于智能终端,其中智能终端包括但不限于智能手机、Pad、笔记本电脑、台式电脑等。本实施例中的安全防护方法,如图1所示,包括如下步骤:
S1.检测是否收到智能终端操作指令。若收到,进入步骤S2,若未收到,重复步骤S1。具体地,可以将触摸、开机、按键等任何接触到智能终端的 相关操作均视为收到智能终端操作指令。
S2.获取智能终端当前用户的指纹信息。具体地,可以通过安装于智能终端的指纹采集装置采集用户指纹信息,并将采集到的指纹信息传输至智能终端MCU。
S3.将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对。若一致,进入步骤S4,若不一致,进入步骤S5。
S4.解锁切换至智能终端应用界面。
本实施例中的安全防护方法,检测收到智能终端操作指令后,获取智能终端当前用户的指纹信息,并将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对,只有一致时才解锁切换至智能终端应用界面。因为指纹信息是每个人所独有的,无法仿制,通过将用户指纹信息作为解锁的唯一途径,避免了他人通过破解密码的方式进入智能终端的应用界面,导致密码保护功能形同虚设的情况的发生,提升了智能终端的安全防护性能。
S5.返回步骤S2,重新获取智能终端当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数。
S6.判断次数是否超出预设次数阈值。若超出,进入步骤S7,若未超出,重复步骤S6。除了非法用户的指纹信息会比对失败,在采集的用户指纹信息不够清晰时也可能导致比对失败,通过设置预设次数阈值,可以多给用户几次重新输入指纹信息的机会,不会因指纹采集不清晰导致用户无法正 常使用的情况发生。
S7.发出报警指令。具体地,如果次数超出预设次数阈值,显然情况出现异常,发出报警指令启动报警,能够对非法用户起到警示作用。
S8.在静默状态下启动拍摄获取当前智能终端用户的面部图像信息。具体地,静默状态即为开启手机摄像头进行拍摄的过程中,不开启闪光灯、对焦音效以及快门音效,并且拍摄图片的处理过程也是在内存中进行而不会显示到手机屏幕上,整个拍摄过程是在静默中完成的。这样可以在非法用户毫无所觉的情况下完成对其面部图像信息的采集,避免节外生枝。
S9.发送面部图像信息至预设电话号码和/或邮箱中。通过发送当前用户,也即非法用户的面部图像信息至预先设定的电话号码和/或邮箱中,有助于及时锁定、发现该非法用户。
实施例2
本实施例提供了一种安全防护装置,用于智能终端,其中智能终端包括但不限于智能手机、Pad、笔记本电脑、台式电脑等。本实施例中的安全防护装置,如图2所示,包括:
检测单元1,用于检测是否收到智能终端操作指令。
指纹信息获取单元2,用于在收到智能终端操作指令后获取智能终端当前用户的指纹信息。
比对单元3,将智能终端当前用户的指纹信息与预先存储的指纹信息进 行比对。
解锁单元4,用于在当前用户的指纹信息与预先存储的指纹信息一致时解锁切换至智能终端应用界面。
本实施例中的安全防护装置,检测收到智能终端操作指令后,获取智能终端当前用户的指纹信息,并将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对,只有一致时才解锁切换至智能终端应用界面。因为指纹信息是每个人所独有的,无法仿制,通过将用户指纹信息作为解锁的唯一途径,避免了他人通过破解密码的方式进入智能终端的应用界面,导致密码保护功能形同虚设的情况的发生,提升了智能终端的安全防护性能。
优选地,指纹信息获取单元2,在当前用户的指纹信息与预先存储的指纹信息不一致时,重新获取智能终端当前用户的指纹信息。
次数记录单元5,用于记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数。
判断单元6,用于判断次数是否超出预设次数阈值。
报警单元7,用于在次数超出预设次数阈值时,发出报警指令。
面部图像信息获取单元8,用于在次数超出预设次数阈值时,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息。
发送单元9,用于发送面部图像信息至预设电话号码和/或邮箱中。通 过发送当前用户,也即非法用户的面部图像信息至预先设定的电话号码和/或邮箱中,有助于及时锁定、发现该非法用户。
实施例3
本实施例提供了一种智能终端,其中智能终端包括但不限于智能手机、Pad、笔记本电脑、台式电脑等。如图3所示,本实施例中的智能终端包括实施例2中的安全防护装置11和指纹信息采集装置12。
指纹信息采集装置12,用于采集智能终端当前用户的指纹信息并传输至安全防护装置11。
本实施例中的智能终端,通过安全防护装置11,检测收到智能终端操作指令后,获取智能终端当前用户的指纹信息,并将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对,只有一致时才解锁切换至智能终端应用界面。因为指纹信息是每个人所独有的,无法仿制,通过将用户指纹信息作为解锁的唯一途径,避免了他人通过破解密码的方式进入智能终端的应用界面,导致密码保护功能形同虚设的情况的发生,提升了智能终端的安全防护性能。
实施例4
如图4所示,本申请实施例还提供了一种电子设备,包括至少一个处理器810;以及,与所述至少一个处理器810通信连接的存储器800;其中,所述存储器800存储有可被所述至少一个处理器810执行的指令,所述指令被所述至少一个处理器810执行,以使所述至少一个处理器810能够: 检测是否收到智能终端操作指令;若收到,获取智能终端当前用户的指纹信息;将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;若一致,解锁切换至智能终端应用界面。所述电子设备还包括与所述存储器800和所述处理器电连接的输入装置830和输出装置840,所述电连接优选为通过总线连接。
本实施例的所述电子设备,优选地,使得所述至少一个处理器还能够:若不一致,返回获取智能终端当前用户的指纹信息的步骤,重新获取智能终端当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;判断所述次数是否超出预设次数阈值;若超出,发出报警指令。
本实施例的所述电子设备,优选地,使得所述至少一个处理器还能够:若超出,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;发送所述面部图像信息至预设电话号码和/或邮箱中。
实施例5
本申请实施例还提供了一种非易失性计算机存储介质,所述存储介质存储有计算机可执行指令的所述计算机可执行指令,当由电子设备执行时使得电子设备能够:检测是否收到智能终端操作指令;若收到,获取智能终端当前用户的指纹信息;将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;若一致,解锁切换至智能终端应用界面。
本实施例的所述存储介质,优选地,使得所述电子设备还能够:若不一致,返回获取智能终端当前用户的指纹信息的步骤,重新获取智能终端 当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;判断所述次数是否超出预设次数阈值;若超出,发出报警指令。
本实施例的所述存储介质,优选地,使得所述电子设备还能够:若超出,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;发送所述面部图像信息至预设电话号码和/或邮箱中。
实施例6
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在非易失性计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行前述实施例所述的方法。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专 用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,上述实施例仅仅是为清楚地说明所作的举例,而并非对实施方式的限定。对于所属领域的普通技术人员来说,在上述说明的基础上还可以做出其它不同形式的变化或变动。这里无需也无法对所有的实施方式予以穷举。而由此所引伸出的显而易见的变化或变动仍处于本申请的保护范围之中。

Claims (14)

  1. 一种安全防护方法,用于智能终端,其特征在于,包括如下步骤:
    检测是否收到智能终端操作指令;
    若收到,获取智能终端当前用户的指纹信息;
    将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;
    若一致,解锁切换至智能终端应用界面。
  2. 根据权利要求1所述的方法,其特征在于,还包括:
    若不一致,返回获取智能终端当前用户的指纹信息的步骤,重新获取智能终端当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;
    判断所述次数是否超出预设次数阈值;
    若超出,发出报警指令。
  3. 根据权利要求2所述的方法,其特征在于,还包括:
    若超出,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;
    发送所述面部图像信息至预设电话号码和/或邮箱中。
  4. 一种安全防护装置,用于智能终端,其特征在于,包括如下步骤:
    检测单元(1),用于检测是否收到智能终端操作指令;
    指纹信息获取单元(2),用于在收到智能终端操作指令后获取智能终端当前用户的指纹信息;
    比对单元(3),将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;
    解锁单元(4),用于在当前用户的指纹信息与预先存储的指纹信息一致时解锁切换至智能终端应用界面。
  5. 根据权利要求4所述的装置,其特征在于:
    所述指纹信息获取单元(2),在当前用户的指纹信息与预先存储的指纹信息不一致时,重新获取智能终端当前用户的指纹信息;
    次数记录单元(5),用于记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;
    判断单元(6),用于判断所述次数是否超出预设次数阈值;
    报警单元(7),用于在所述次数超出所述预设次数阈值时,发出报警指令。
  6. 根据权利要求5所述的装置,其特征在于,还包括:
    面部图像信息获取单元(8),用于在所述次数超出所述预设次数阈值时,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;
    发送单元(9),用于发送所述面部图像信息至预设电话号码和/或邮箱中。
  7. 一种智能终端,其特征在于,包括权利要求4-6任一项所述的安全防护装置(11)和指纹信息采集装置(12);
    所述指纹信息采集装置(12),用于采集智能终端当前用户的指纹信息并传输至所述安全防护装置(11)。
  8. 一种电子设备,其特征在于,包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够:检测是否收到智能终端操作指令;若收到,获取智能终端当前用户的指纹信息;将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;若一致,解锁切换至智能终端应用界面。
  9. 根据权利要求8所述的电子设备,其特征在于,使得所述至少一个处理器还能够:若不一致,返回获取智能终端当前用户的指纹信息的步骤,重新获取智能终端当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;判断所述次数是否超出预设次数阈值;若超出,发出报警指令。
  10. 根据权利要求9所述的电子设备,其特征在于,使得所述至少一个处理器还能够:若超出,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;发送所述面部图像信息至预设电话号码和/或邮箱中。
  11. 一种非易失性计算机存储介质,其特征在于,所述存储介质存储有计算机可执行指令,所述计算机可执行指令当由电子设备执行时使得电子设备能够:检测是否收到智能终端操作指令;若收到,获取智能终端当前用户的指纹信息;将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对;若一致,解锁切换至智能终端应用界面。
  12. 根据权利要求11所述的存储介质,其特征在于,使得所述电子设备还能够:若不一致,返回获取智能终端当前用户的指纹信息的步骤,重新获取智能终端当前用户的指纹信息,并记录将智能终端当前用户的指纹信息与预先存储的指纹信息进行比对的次数;判断所述次数是否超出预设次数阈值;若超出,发出报警指令。
  13. 根据权利要求12所述的存储介质,其特征在于,使得所述电子设备还能够:若超出,在静默状态下启动拍摄获取当前智能终端用户的面部图像信息;发送所述面部图像信息至预设电话号码和/或邮箱中。
  14. 一种计算机程序产品,所述计算机程序产品包括存储在非易失性计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,其特征在于,当所述程序指令被计算机执行时,使所述计算机执行权利要求1-3中任一项所述的方法。
PCT/CN2016/101876 2016-04-01 2016-10-12 一种安全防护方法、装置及智能终端 WO2017166775A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610203537.7A CN105893823A (zh) 2016-04-01 2016-04-01 一种安全防护方法、装置及智能终端
CN201610203537.7 2016-04-01

Publications (1)

Publication Number Publication Date
WO2017166775A1 true WO2017166775A1 (zh) 2017-10-05

Family

ID=57012162

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/101876 WO2017166775A1 (zh) 2016-04-01 2016-10-12 一种安全防护方法、装置及智能终端

Country Status (2)

Country Link
CN (1) CN105893823A (zh)
WO (1) WO2017166775A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108880932A (zh) * 2018-05-31 2018-11-23 广东美的制冷设备有限公司 界面显示方法、终端设备及计算机可读存储介质
CN111783746A (zh) * 2020-08-07 2020-10-16 国网山东省电力公司鄄城县供电公司 输电线路塔杆的防护方法、装置及电子设备
CN112968770A (zh) * 2021-03-15 2021-06-15 北京智芯微电子科技有限公司 物联网智能终端设备指纹提取方法、装置及电子设备
CN113449324A (zh) * 2021-07-23 2021-09-28 福州博峰智能电器有限公司 一种电场感应式高电压智能电压测量仪表
CN114158027A (zh) * 2021-12-14 2022-03-08 深圳Tcl新技术有限公司 通信连接方法、装置、终端和存储介质
CN116311628A (zh) * 2023-05-23 2023-06-23 合肥智辉空间科技有限责任公司 一种智能门锁安全性能的检测方法及系统

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893823A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种安全防护方法、装置及智能终端
CN109245960B (zh) * 2018-09-27 2022-03-11 平安普惠企业管理有限公司 测试终端管理方法及系统
CN113781715B (zh) * 2021-09-03 2023-05-26 深圳市丰巢网络技术有限公司 一种智能柜格口封禁方法、装置、存储介质及电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930196A (zh) * 2012-09-27 2013-02-13 东莞宇龙通信科技有限公司 图标显示方法及通信终端
CN103853957A (zh) * 2012-11-30 2014-06-11 大连宏宇科技有限公司 一种基于指纹的操作系统登陆验证方法
CN104933337A (zh) * 2015-05-22 2015-09-23 广东欧珀移动通信有限公司 一种实现指纹解锁的方法和智能终端
CN105224847A (zh) * 2015-09-23 2016-01-06 广东小天才科技有限公司 一种智能手表安全预警的方法及装置
CN105893823A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种安全防护方法、装置及智能终端

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050184855A1 (en) * 2004-02-24 2005-08-25 Burchette Robert L.Jr. Fingerprint vehicle access system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930196A (zh) * 2012-09-27 2013-02-13 东莞宇龙通信科技有限公司 图标显示方法及通信终端
CN103853957A (zh) * 2012-11-30 2014-06-11 大连宏宇科技有限公司 一种基于指纹的操作系统登陆验证方法
CN104933337A (zh) * 2015-05-22 2015-09-23 广东欧珀移动通信有限公司 一种实现指纹解锁的方法和智能终端
CN105224847A (zh) * 2015-09-23 2016-01-06 广东小天才科技有限公司 一种智能手表安全预警的方法及装置
CN105893823A (zh) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 一种安全防护方法、装置及智能终端

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108880932A (zh) * 2018-05-31 2018-11-23 广东美的制冷设备有限公司 界面显示方法、终端设备及计算机可读存储介质
CN108880932B (zh) * 2018-05-31 2022-06-03 广东美的制冷设备有限公司 界面显示方法、终端设备及计算机可读存储介质
CN111783746A (zh) * 2020-08-07 2020-10-16 国网山东省电力公司鄄城县供电公司 输电线路塔杆的防护方法、装置及电子设备
CN112968770A (zh) * 2021-03-15 2021-06-15 北京智芯微电子科技有限公司 物联网智能终端设备指纹提取方法、装置及电子设备
CN113449324A (zh) * 2021-07-23 2021-09-28 福州博峰智能电器有限公司 一种电场感应式高电压智能电压测量仪表
CN113449324B (zh) * 2021-07-23 2022-05-17 福州博峰智能电器有限公司 一种电场感应式高电压智能电压测量仪表
CN114158027A (zh) * 2021-12-14 2022-03-08 深圳Tcl新技术有限公司 通信连接方法、装置、终端和存储介质
CN114158027B (zh) * 2021-12-14 2023-07-25 深圳Tcl新技术有限公司 通信连接方法、装置、终端和存储介质
CN116311628A (zh) * 2023-05-23 2023-06-23 合肥智辉空间科技有限责任公司 一种智能门锁安全性能的检测方法及系统
CN116311628B (zh) * 2023-05-23 2023-08-11 合肥智辉空间科技有限责任公司 一种智能门锁安全性能的检测方法及系统

Also Published As

Publication number Publication date
CN105893823A (zh) 2016-08-24

Similar Documents

Publication Publication Date Title
WO2017166775A1 (zh) 一种安全防护方法、装置及智能终端
US10515203B2 (en) Method and system for improving security of a mobile terminal
CN104899490B (zh) 一种终端定位方法及用户终端
WO2016206185A1 (zh) 一种基于人脸识别的解锁方法、装置及终端、存储介质
WO2017032029A1 (zh) 一种应用程序加密方法及用户终端
WO2019101096A1 (zh) 安全验证的方法、装置及移动终端
US20190171805A9 (en) Unlocking method and apparatus, and storage medium
WO2017185658A1 (zh) 一种安全保护方法、装置、移动终端及电子设备
CN103167149A (zh) 基于人脸识别的手机安全系统及方法
CN104700050A (zh) 一种移动终端的安全定位方法及装置
WO2017201874A1 (zh) 终端丢失提示方法及装置
CN105809139A (zh) 眼球信息的采集方法及装置
SE1650416A1 (en) Secure storage of fingerprint related elements
CN105611036A (zh) 解锁验证方法、解锁验证系统和终端
WO2017000354A1 (zh) 指纹密码的验证方法、系统和终端
WO2020133500A1 (zh) 终端设备的解锁方法、设备和存储介质
WO2015085942A1 (zh) 终端状态查询方法、终端防盗方法及相应的设备
CN105306691A (zh) 一种个人信息的保护方法及终端
WO2016180234A1 (zh) 一种安全环境构建方法和装置
WO2017041358A1 (zh) 一种用户身份识别方法、装置和移动终端
CN105989265A (zh) 一种预警的方法、装置及终端设备
TWI446275B (zh) 電子裝置及其使用的監控方法
WO2018006319A1 (zh) 一种报警的方法及系统
WO2017084501A1 (zh) 终端解锁方法、装置及终端
CN108009450A (zh) 终端防盗的方法、装置及终端

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896545

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896545

Country of ref document: EP

Kind code of ref document: A1