[go: up one dir, main page]

CN105354465B - One kind application securely achieves method, system and mobile terminal - Google Patents

One kind application securely achieves method, system and mobile terminal Download PDF

Info

Publication number
CN105354465B
CN105354465B CN201510705534.9A CN201510705534A CN105354465B CN 105354465 B CN105354465 B CN 105354465B CN 201510705534 A CN201510705534 A CN 201510705534A CN 105354465 B CN105354465 B CN 105354465B
Authority
CN
China
Prior art keywords
mobile terminal
currently
application
judge
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510705534.9A
Other languages
Chinese (zh)
Other versions
CN105354465A (en
Inventor
李宗树
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Lianjian Technology Co ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510705534.9A priority Critical patent/CN105354465B/en
Publication of CN105354465A publication Critical patent/CN105354465A/en
Application granted granted Critical
Publication of CN105354465B publication Critical patent/CN105354465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of application and securely achieves method, and applied to mobile terminal, the application securely achieves method and comprised the following steps:When the mobile terminal enters application model, whether the currently used person for verifying the mobile terminal is owner;If it is not, then alarming in a predefined manner, execution is default to apply safety operation;If so, then when the mobile terminal enters service stage, judge that the mobile terminal applies safety operation with the presence or absence of non-, if so, then being alarmed with the predetermined way, if it is not, then making currently used person continue mobile terminal described in normal use.Application of the present invention securely achieves method, system and mobile terminal and make use of iris recognition technology to identify owner; prevent the personal information of mobile terminal user from losing; more prevent other people from stealing a glance at, prevent from being taken on the sly; the secret file on mobile terminal is prevented to be forwarded; prevent chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing, so as to preferably protect privacy of user.

Description

One kind application securely achieves method, system and mobile terminal
Technical field
The invention belongs to technical field of mobile terminals, and method, system and shifting are securely achieved more particularly to one kind application Dynamic terminal.
Background technology
Contemporary communication science and technology is more and more flourishing, and electronic equipment is also increasingly advanced, especially with the hair of the communication technology Open up, the mobile terminal in electronic equipment, be based particularly on 3rd generation mobile communication technology (3G), fourth generation mobile communication technology Hardware configuration is stronger and stronger in the mobile terminal of (4G) and long evolving system (LTE), and application of function is more and more various to make it As the necessity of nowadays people's life and work.
Due to use degree more and more higher of the modern to intelligent terminal, and because intelligent terminal and caused by the leakage of a state or party secret when There is generation:
If you chat with your friend or household's net, but are stolen a glance at by bystander's either inadvertent or intentional, just in case net Merely content very secret, and the people for sniffing your chat contents is a people for disrespecting other people privacies, help diffusion everywhere Your chat content, whether you can feel very indignant
If your chat content at that time is taken on the sly by people, whether can be gone mad once you are aware of
If your mobile phone is not intended to or is seen intentionally by people the unlocking pattern, password, this sicko or crime Person by your photograph album secret photo forwarding either your some chat contents by people's sectional drawing so as to forward, if you know , your personal document, which is passed, to be dissipated, and you take legal means to protect the privacy of oneself, but can file be recovered or one It is individual unknown.
Therefore, how a kind of application is provided and securely achieves method, system and mobile terminal, with solve in the prior art without The privacy of the comprehensive protection user of method causes many disadvantages such as privacy of user leakage, real urgently to have been solved as practitioner in the art Technical problem certainly.
The content of the invention
In view of the above the shortcomings that prior art, it is an object of the invention to provide one kind to apply the side of securely achieving Method, system and mobile terminal, for solve in the prior art can not be comprehensive the privacy of protection user cause privacy of user to let out The problem of dew.
In order to achieve the above objects and other related objects, one aspect of the present invention provides a kind of application and securely achieves method, Applied to mobile terminal, the application securely achieves method and comprised the following steps:Enter application model in the mobile terminal When, whether the currently used person for verifying the mobile terminal is owner;If it is not, then alarming in a predefined manner, and perform default Using safety operation;If so, then perform next step;When the mobile terminal enters service stage, judge described mobile whole Safety operation is applied in end with the presence or absence of non-, if so, then being alarmed with the predetermined way, if it is not, then making currently used person continue just Often use the mobile terminal.
In one embodiment of the invention, verify the mobile terminal currently used person whether be owner checking foundation It is according to the owner's iris information being pre-stored in inside the mobile terminal.
In one embodiment of the invention, verify the step of whether currently used person of the mobile terminal is owner it Before, the application securely achieves the iris information that method also includes capturing the currently used person of the mobile terminal, and with it is pre- There is the iris information inside the mobile terminal to be matched to verify whether the currently used person of the mobile terminal is machine It is main, if matching, then it represents that the currently used person is owner;If mismatch, then it represents that the currently used person is non-owner.
In one embodiment of the invention, the non-application safety operation is non-including the first non-security application operating and second Using safety operation;Judge that the mobile terminal also includes judging the movement eventually with the presence or absence of the step of non-application safety operation End whether there is the first non-security application operating, if so, then being alarmed with the predetermined way;If it is not, then continue to judge the shifting Dynamic terminal whether there is the second non-security application operating, if so, then being alarmed with the predetermined way, make the mobile terminal direct Into resting state, if it is not, then making currently used person continue mobile terminal described in normal use.
In one embodiment of the invention, the first non-security application operating there is currently stolen for the mobile terminal The situation seen;The second non-security application operating is that the mobile terminal there is currently the situation taken on the sly.
In one embodiment of the invention, judge that the mobile terminal whether there is the judgement of the first non-security application operating Foundation is to judge whether the mobile terminal currently captures multiple iris informations, if, then it represents that the mobile terminal is currently deposited In the situation stolen a glance at;If not, then it represents that the mobile terminal there is currently no the situation stolen a glance at, and continue to judge the movement Terminal whether there is the second non-security application operating.
In one embodiment of the invention, judge that the mobile terminal whether there is the judgement of the second non-security application operating Foundation is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters, if, then it represents that it is described mobile whole End there is currently the situation taken on the sly;If not, then it represents that the mobile terminal there is currently no the situation taken on the sly, and order currently makes User continues mobile terminal described in normal use
Another aspect of the present invention also provides a kind of application and securely achieves system, applied to mobile terminal, the application peace Complete realizes that system includes:Authentication module, for when the mobile terminal enters application model, verifying the mobile terminal Whether currently used person is owner;If it is not, then call for alarming in a predefined manner, and perform default using safety operation Alarm module;If so, then call for when the mobile terminal enters service stage, judging that the mobile terminal whether there is The non-judge module using safety operation, if so, then calling the alarm module to be alarmed with the predetermined way, if it is not, then adjusting With for making currently used person continue the command output module of mobile terminal described in normal use.
In one embodiment of the invention, the non-application safety operation is non-including the first non-security application operating and second Using safety operation;The judge module includes:First judge module unit, for judging the mobile terminal with the presence or absence of non- Using the step of safety operation also include judge that the mobile terminal whether there is the first non-security application operating, if so, then adjusting Alarmed with the alarm module with the predetermined way;Second judging unit, it is non-for being not present first in the mobile terminal When safety applications operate, judge that the mobile terminal whether there is the second judging unit of the second non-security application operating, if so, Then call the alarm module to be alarmed with the predetermined way, and call for making the mobile terminal be directly entered resting state Control unit, if it is not, then call the command output module be used to making currently used person continue described in normal use it is mobile eventually End.
In one embodiment of the invention, the application, which securely achieves system, also to be included being connected with the authentication module, Trapping module for the iris information of the currently used person that captures the mobile terminal.
Another aspect of the invention also provides a kind of mobile terminal, and the mobile terminal includes:Touch display screen, for using Family is clicked on predetermined number of clicks so that the mobile terminal enters application model;Processor, it is connected with the touch display screen, For when the mobile terminal enters application model, whether the currently used person for verifying the mobile terminal to be owner;If it is not, Then alarm in a predefined manner, and perform and default apply safety operation;If so, then enter service stage in the mobile terminal When, judge that the mobile terminal applies safety operation with the presence or absence of non-, if so, then being alarmed with the predetermined way, if it is not, then making Currently used person continues mobile terminal described in normal use
As described above, the application of the present invention securely achieves method, system and mobile terminal, have the advantages that:
Application of the present invention securely achieves method, system and mobile terminal and make use of iris recognition technology cognitron It is main, prevent the personal information of mobile terminal user from losing, more prevent other people from stealing a glance at, prevent from being taken on the sly, prevent on mobile terminal Secret file be forwarded, prevent chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing, so as to preferably Protect privacy of user.
Brief description of the drawings
Fig. 1 is shown as the schematic perspective view of the mobile terminal of the present invention.
The application that Fig. 2 is shown as the present invention securely achieves schematic flow sheet of the method in an embodiment.
Fig. 3 is shown as the schematic flow sheet that application of the invention securely achieves step S3 in method.
The application that Fig. 4 is shown as the present invention securely achieves theory structure schematic diagram of the system in an embodiment.
Fig. 5 is shown as theory structure schematic diagram of the mobile terminal of the present invention in an embodiment.
Component label instructions
1 mobile terminal
10 touch display screens
11 memories
12 processors
20 applications securely achieve system
200 trapping modules
201 authentication modules
202 alarm modules
203 judge modules
204 command output modules
2031 first judging units
2032 second judging units
2033 control units
S1~S3 steps
S31~S33 steps
Embodiment
Illustrate embodiments of the present invention below by way of specific instantiation, those skilled in the art can be by this specification Disclosed content understands other advantages and effect of the present invention easily.The present invention can also pass through specific realities different in addition The mode of applying is embodied or practiced, the various details in this specification can also be based on different viewpoints with application, without departing from Various modifications or alterations are carried out under the spirit of the present invention.It should be noted that in the case where not conflicting, following examples and implementation Feature in example can be mutually combined.
It should be noted that the diagram provided in following examples only illustrates the basic structure of the present invention in a schematic way Think, only show the component relevant with the present invention in schema then rather than according to component count, shape and the size during actual implement Draw, kenel, quantity and the ratio of each component can be a kind of random change during its actual implementation, and its assembly layout kenel It is likely more complexity.
The technical principle that application of the present invention securely achieves method, system and mobile terminal is as follows:
Some application is assumed to be opens safe handling function using A, selection, now when using some application:
1. anti-steal a glance at:The typing body iris of oneself is eyeball information to user in advance, during using A is applied, If detecting the iris of non-user, mobile phone is prompted (such as to user:Screen flicker several times, or sends the alarm tone of drop drop Deng)
2. anti-take on the sly:User detects situation about taking on the sly, then provides user during the application A using mobile phone Prompting is (such as:Direct dormancy of screen etc.)
3. prevent sectional drawing, prevent from propagating outside associated documents:At application A interfaces, user or other people when using sectional drawing function, Sectional drawing fails, using file or folder in A file etc. using bluetooth, the work(such as WLAN is direct-connected, multimedia message or QQ, wechat It can not send success
Embodiment one
The present embodiment provides a kind of application and securely achieves method, and applied to mobile terminal, the application securely achieves Method includes following steps:
When the mobile terminal enters application model, whether the currently used person for verifying the mobile terminal is owner; If it is not, then alarm in a predefined manner, and perform and default apply safety operation;If so, then perform next step;
When the mobile terminal enters service stage, judge that the mobile terminal applies safety operation with the presence or absence of non-, If so, then alarmed with the predetermined way, if it is not, then making currently used person continue mobile terminal described in normal use.
Method is securely achieved below with reference to diagram to the application described in the present embodiment to be described in detail.The application Securely achieve method and be applied to mobile terminal, the mobile terminal is in the implementation of reality, including is smart mobile phone, flat Plate computer, notebook computer etc. have the electronic equipment of screen, referring to Fig. 1, being shown as the schematic perspective view of mobile terminal.Such as Shown in Fig. 1, the mobile terminal 1, i.e. smart mobile phone 1 include touch display screen 10, in the implementation of reality, the electronics Device is, for example, the electronic equipment 1 that smart mobile phone, tablet personal computer, notebook computer etc. have screen.Wherein, it is described to touch display Screen 10 provides output interface and input interface simultaneously between equipment and user.Touch display screen controller reception/transmission from/ Go to the electric signal of touch display screen 10.The touch display screen 10 then shows visual output to user.This visual output can be with Including text, figure, video and its any combination.Some or all visual outputs can be corresponding with user-interface object, under Its more details will be described in text.
Touch display screen 10 receives the input of user also based on tactile and/or tactile contact.The shape of touch display screen 10 The touch sensitive surface for receiving user's input into one.The touch display screen 10 and touch display screen controller are (together with memory In any associated module and/or instruction set together) (and the touch is any for contact in detection touch display screen 10 It is mobile or interrupt), and by the contact transformation detected into including such as one or more soft in touch display screen 10 The interaction of the user interface object of button etc.In one exemplary embodiment, connecing between touch display screen 10 and user Contact corresponds to one or more fingers of user.The touch display screen 10 can use LCD (liquid crystal display) technologies or LPD (light emitting polymer displays) technology, but other Display Techniques can be used in other embodiments.Touch display screen 10 and touch Displaying screen controller can detect contact and its mobile or interruption using any one of a variety of Touch technologies, and these are touch-sensitive Technology includes but is not limited to electric capacity, resistance, infrared and surface acoustic wave techniques, and other proximity sensor arrays, or for true The other technologies of the fixed one or more points being in contact with touch display screen 10.User can use any appropriate object or match somebody with somebody Part, such as instruction pen, finger etc., to contact touch display screen 10.
Described contact/motion module detects the contact with touch display screen 10 together with touch display screen controller. Contact/the motion module includes being used to perform the various soft of the associated various operations of the detection of the contact with touch display screen 10 Part component, the operation for example, determine whether to be in contact, and determine whether the contact moves, and in tracking touch display screen 10 Movement, and determine whether the contact is interrupted (whether stopping contacting).Determining the operation of contact point movement can be included really Determine the speed (amplitude), speed (amplitude and direction) and/or acceleration (including amplitude and/or direction) of contact point.In some realities Apply in example, contact/motion module also detects the contact on touch pad with touch display screen controller.
In the present embodiment, illustrated exemplified by the mobile terminal 1 smart mobile phone that for example, Fig. 1 is presented.It is described Smart mobile phone be, for example, install Android operation system either iOS operating systems or Palm OS, Symbian (Saipan) or The smart mobile phone of the operating systems such as person Black Berry (blackberry, blueberry) OS 6.0, Windows Phone 8.
Referring to Fig. 2, it is shown as using method schematic flow sheet in an embodiment is securely achieved, as shown in Fig. 2 institute State and comprise the following steps using securely achieving method:
S1, when the mobile terminal enters application model, capture the iris letter of the currently used person of the mobile terminal Breath, and the iris information with being pre-stored in inside the mobile terminal is matched to verify the currently used person of the mobile terminal Whether it is owner;If it is not, step S2 is then performed, if it is not, then performing step S3.In the present embodiment, the mobile terminal enters Application model refers to what is exported in touch display screen of the currently used person of the mobile terminal by clicking on the mobile terminal The application program shown on graphical user interface, then represent that mobile terminal enters when user clicks on the application program and apply mould Formula, while also illustrate that safety verification pattern is applied in the mobile terminal triggering.The application program for example, QQ, wechat, Fetion, Mobile banking, Alipay etc. include the application program of owner's privacy.In the present embodiment, the current of the mobile terminal is verified Whether user is that the checking foundation of owner is owner's iris information that basis is pre-stored in inside the mobile terminal.In this implementation Matched in example with the iris information being pre-stored in inside the mobile terminal to verify the currently used person of the mobile terminal Whether it is owner, if matching, then it represents that the currently used person is owner;If mismatch, then it represents that the currently used person is Non- owner.Why the present embodiment is used as using iris information is verified foundation, is because iris is located at the sclera and pupil of eyes Between, it is made up of many gland nests, gauffer, pigmented spots etc., contains extremely abundant texture information.With other biological identification technologies Compare, iris recognition has the advantage in terms of the physiology that can not substitute:
(1) identical two irises can not possibly occur in uniqueness-nature, even scientific experiment shows double born of the same parents Tire, the iris image of same people's right and left eyes also differ;
(2) stability-iris just stable molding after people is born 8 months, unless the special circumstances such as lesion occur, The iris texture of people among all one's life all without change, and by perform the operation change iris texture risk it is also very high;
(3) the non-property invaded-iris is externally visible internal, can be in the case where not contacted with collecting device Imaging;
(4) natural antifalsification-when taking in the intensity of light of pupil and changing, pupil can produce contraction or expansion And affecting iris to change, this causes iris to have natural antifalsification, can take precautions against usurping for iris.
And the iris information in the present embodiment passes through by showing including light source, imaging lens, camera, light beam separate sheet, LCD Show and completed with the trapping module of the composition such as image frame acquisitions device.In the present embodiment, the trapping module can be located at mobile whole Daugman modules or Wildes modules in end.
S2, if the currently used person of the mobile terminal is not owner, alarm in a predefined manner, and perform default answer Use safety operation.In the present embodiment, the predetermined type of alarm includes touch display screen light flash, sends drop drop alarm Sound or vibration etc., but be not limited thereto, in the application example of reality, every mode that can be used for alarm can reach The purpose of the present embodiment, is stated clearly hereby.In the present embodiment, it is described default to refer to prevent working as non-owner using safety operation Preceding user performs any operation to the mobile terminal, for example, preventing the currently used person of non-owner from using sectional drawing function, hinders Only Application Folder or file etc. are used bluetooth by the currently used person of non-owner, and WLAN is direct-connected, multimedia message, QQ, or The communication softwares such as wechat send the privacy of owner in the mobile terminal.
S3, when the mobile terminal enters service stage, judge the mobile terminal with the presence or absence of non-application safety behaviour Make, if so, then perform step S4, i.e., with the predetermined way alarm, if it is not, then perform step S5, even currently used person after Mobile terminal described in continuous normal use.In the present embodiment, the non-application safety operation includes the first non-security application operating Non- safety operation is applied with second.The first non-security application operating is that the mobile terminal there is currently the shape stolen a glance at Condition.The second non-security application operating is that the mobile terminal there is currently the situation taken on the sly.Referring specifically to Fig. 3, show It is shown as step S3 idiographic flow schematic diagram.As shown in figure 3, the step S3 includes:
S31, judge that the mobile terminal whether there is the first non-security application operating, if so, then perform step S4, i.e., with The predetermined way alarm;If it is not, then continue executing with next step.In the present embodiment, judge whether the mobile terminal is deposited It is to judge whether the mobile terminal currently captures multiple iris information (examples in the basis for estimation of the first non-security application operating Such as, the mobile terminal captures two iris informations), if, then it represents that the mobile terminal there is currently the situation stolen a glance at; If not, then it represents that the mobile terminal there is currently no the situation stolen a glance at.
S32, continue to judge that the mobile terminal whether there is the second non-security application operating, if so, then performing step S33, i.e., alarmed with the predetermined way, make the mobile terminal be directly entered resting state, if it is not, being then transferred to step S5, i.e., Currently used person is made to continue mobile terminal described in normal use.In the present embodiment, judge the mobile terminal with the presence or absence of the The basis for estimation of two non-security application operatings is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters, If, then it represents that the mobile terminal there is currently the situation taken on the sly, and make the mobile terminal be directly entered resting state; If not, then it represents that the mobile terminal there is currently no the situation taken on the sly, make currently used person continue shifting described in normal use Dynamic terminal.The working signal frequency of wireless device of taking on the sly is usually:900/1100/1200/1300/2400MHz, and mobile phone signal Frequency be mostly:900Hz, 1800HZ, 1900HZ, 2000Hz, therefore in the present embodiment, by the working signal for device of wirelessly taking on the sly Frequency setting is abnormal work frequency parameter, is arranged to 100-800MHz and 900/1100/1200/1300/2400MHz.Change Sentence, which is talked about, is exactly, if the mobile terminal captures one in 100-800MHz and 900/1100/1200/1300/2400MHz Individual or multiple frequency parameters, that is, judge the situation taken on the sly be present.
Application described in the present embodiment securely achieves method and make use of iris recognition technology to identify owner, prevents mobile whole The personal information of end subscriber is lost, and is more prevented other people from stealing a glance at, is prevented from being taken on the sly, prevents that the secret file on mobile terminal from being turned Hair, prevent chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing, so as to preferably protect privacy of user.
Embodiment two
The present embodiment provides a kind of application and securely achieves system, and applied to mobile terminal, the application securely achieves System includes:
Authentication module, for when the mobile terminal enters application model, verifying the currently used of the mobile terminal Whether person is owner;If it is not, then calling for alarming in a predefined manner, and perform the default alarm mould using safety operation Block;If so, then call for when the mobile terminal enters service stage, judging that the mobile terminal whether there is non-application The judge module of safety operation, if so, then calling the alarm module to be alarmed with the predetermined way, it is used for if it is not, then calling Currently used person is made to continue the command output module of mobile terminal described in normal use.
System is securely achieved below with reference to diagram to the application described in the present embodiment to be described in detail.The present embodiment The application securely achieves system 20 and is applied to mobile terminal, the mobile terminal in the implementation of reality, including for Smart mobile phone, tablet personal computer, notebook computer etc. have the electronic equipment of screen, referring to Fig. 1, being shown as the vertical of mobile terminal Body schematic diagram.As shown in figure 1, the mobile terminal 1, i.e. smart mobile phone 1 include touch display screen 10, in the implementation of reality In, the electronic installation is, for example, the electronic equipment 1 that smart mobile phone, tablet personal computer, notebook computer etc. have screen.Refer to Fig. 4, it is shown as with securely achieving theory structure schematic diagram of the system in an embodiment.As shown in figure 4, the application safety Realize that system 20 includes:Trapping module 200, authentication module 201, alarm module 202, judge module 203 and instruction output mould Block 204.
The trapping module 200 is used for when the mobile terminal enters application model, captures working as the mobile terminal The iris information of preceding user.Why the present embodiment is used as using iris information is verified foundation, is because iris is located at eyes Sclera and pupil between, be made up of many gland nests, gauffer, pigmented spots etc., contain extremely abundant texture information.With it is other Biological identification technology is compared, and iris recognition has the advantage in terms of the physiology that can not substitute:
(1) identical two irises can not possibly occur in uniqueness-nature, even scientific experiment shows double born of the same parents Tire, the iris image of same people's right and left eyes also differ;
(2) stability-iris just stable molding after people is born 8 months, unless the special circumstances such as lesion occur, The iris texture of people among all one's life all without change, and by perform the operation change iris texture risk it is also very high;
(3) the non-property invaded-iris is externally visible internal, can be in the case where not contacted with collecting device Imaging;
(4) natural antifalsification-when taking in the intensity of light of pupil and changing, pupil can produce contraction or expansion And affecting iris to change, this causes iris to have natural antifalsification, can take precautions against usurping for iris.
And the iris information in the present embodiment passes through by showing including light source, imaging lens, camera, light beam separate sheet, LCD Show and completed with the trapping module 200 of the composition such as image frame acquisitions device.In the present embodiment, the trapping module 200 can be located at Daugman modules or Wildes modules in mobile terminal.
The authentication module 201 being connected with the trapping module 200 is for the mobile terminal by capturing The iris information of currently used person, matched with the iris information being pre-stored in inside the mobile terminal to verify the movement Whether the currently used person of terminal is that owner verifies whether the currently used person of the mobile terminal is owner;If it is not, then call The alarm module 202, if it is not, then calling the judge module 203.In the present embodiment, the mobile terminal enters application Pattern refers to the image exported in touch display screen of the currently used person of the mobile terminal by clicking on the mobile terminal The application program shown in user interface, then represent that mobile terminal enters application model when user clicks on the application program, Also illustrate that safety verification pattern is applied in the mobile terminal triggering simultaneously.The application program is for example, QQ, wechat, Fetion, mobile phone Bank, Alipay etc. include the application program of owner's privacy.In the present embodiment, the authentication module 201 verifies the shifting Whether the currently used person of dynamic terminal is that the checking foundation of owner is owner's iris that basis is pre-stored in inside the mobile terminal Information.That is, the iris information of the currently used person captured and the iris being pre-stored in inside the mobile terminal are believed Breath is matched to verify whether the currently used person of the mobile terminal is owner, if matching, then it represents that described currently used Person is owner;If mismatch, then it represents that the currently used person is non-owner.
If the alarm module 202 being connected with the authentication module 201 is used for the currently used person of the mobile terminal Not owner, then alarm in a predefined manner, and perform and default apply safety operation.In the present embodiment, the predetermined alarm Mode includes touch display screen light flash, sends drop drop alarm sound or vibration etc., but is not limited thereto, in reality Application example in, every mode that can be used for alarm can reach the purpose of the present embodiment, state clearly hereby.In the present embodiment In, the default currently used person for referring to prevent non-owner using safety operation performs any behaviour to the mobile terminal Make, for example, preventing the currently used person of non-owner from using sectional drawing function, prevent the currently used person of non-owner that application program is literary Part presss from both sides or file etc. uses bluetooth, and WLAN is direct-connected, multimedia message, QQ, or the communication software such as wechat is by machine in the mobile terminal Main privacy is sent.
The judge module 203 being connected with the authentication module 201 is used to enter service stage in the mobile terminal When, judge that the mobile terminal applies safety operation with the presence or absence of non-, if so, then calling the alarm module 202 with described pre- Determine mode to alarm, if it is not, then calling the command output module for making currently used person continue mobile terminal described in normal use 204.In the present embodiment, the non-application safety operation includes the first non-security application operating and the second non-application safety behaviour Make.The first non-security application operating is that the mobile terminal there is currently the situation stolen a glance at.Described second it is non-security should The situation taken on the sly is there is currently for the mobile terminal with operation.Therefore, please continue to refer to Fig. 4.As shown in figure 4, described sentence Disconnected module 203 includes:First judging unit 2031, the second judging unit 2032 and control unit 2033.
Wherein, first judging unit 2031 is used to judge the mobile terminal with the presence or absence of the first non-security application behaviour Make, if so, then calling the alarm module 202 to be alarmed with the predetermined way;If it is not, then call second judging unit 2032.In the present embodiment, judge in first judging unit 2031 mobile terminal with the presence or absence of first it is non-security should It is to judge whether the mobile terminal currently captures multiple iris informations (for example, the mobile terminal with the basis for estimation of operation Capture two iris informations), if, then it represents that the mobile terminal there is currently the situation stolen a glance at;If not, then it represents that described Mobile terminal there is currently no the situation stolen a glance at.
Second judging unit 2032 is used to judge that the mobile terminal whether there is the second non-security application operating, if It is then to call the alarm module 202 to be alarmed with the predetermined way, and calls for making the mobile terminal be directly entered not The control unit 2033 of dormancy state, currently used person is made to continue normally to make if it is not, then directly invoking the command output module 204 With the mobile terminal.In the present embodiment, judge the mobile terminal with the presence or absence of the in second judging unit 2032 The basis for estimation of two non-security application operatings is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters, If, then it represents that the mobile terminal there is currently the situation taken on the sly, and make the mobile terminal be directly entered resting state; If not, then it represents that the mobile terminal there is currently no the situation taken on the sly, make currently used person continue shifting described in normal use Dynamic terminal.The working signal frequency of wireless device of taking on the sly is usually:900/1100/1200/1300/2400MHz, and mobile phone signal Frequency be mostly:900Hz, 1800HZ, 1900HZ, 2000Hz, therefore in the present embodiment, by the working signal for device of wirelessly taking on the sly Frequency setting is abnormal work frequency parameter, is arranged to 100-800MHz and 900/1100/1200/1300/2400MHz.Change Sentence, which is talked about, is exactly, if the mobile terminal captures one in 100-800MHz and 900/1100/1200/1300/2400MHz Individual or multiple frequency parameters, that is, judge the situation taken on the sly be present.
Application described in the present embodiment securely achieves system and make use of iris recognition technology to identify owner, prevents mobile whole The personal information of end subscriber is lost, and is more prevented other people from stealing a glance at, is prevented from being taken on the sly, prevents that the secret file on mobile terminal from being turned Hair, prevent chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing, so as to preferably protect privacy of user.
Embodiment three
The present embodiment provides a kind of mobile terminal, and the mobile terminal includes:
Touch display screen, for making user be clicked on predetermined number of clicks so that the mobile terminal enters application model;
Processor, it is connected with the touch display screen, for when the mobile terminal enters application model, described in checking Whether the currently used person of mobile terminal is owner;If it is not, then alarming in a predefined manner, and perform default application safety behaviour Make;If so, then when the mobile terminal enters service stage, judge the mobile terminal with the presence or absence of non-application safety behaviour Make, if so, then being alarmed with the predetermined way, if it is not, then making currently used person continue mobile terminal described in normal use.
The mobile terminal described in the present embodiment is described in detail below with reference to diagram.Referring to Fig. 5, it is shown as moving Dynamic theory structure schematic diagram of the terminal in an embodiment.The mobile terminal includes one kind can be according to being previously set or store Instruction, automatic to carry out numerical computations and information processing, and the electronic equipment with multimedia video function, it is included but not Limiting smart mobile phone, tablet personal computer, notebook computer etc. has electronic equipment for touching screen etc..Touch display screen controller connects Transmit/receive send from/go to the electric signal of touch display screen.The touch display screen then shows visual output to user.This is visual Output can include text, figure, video and its any combination.Some or all visual outputs can be relative with user-interface object Should, its more details will be hereinafter described.As shown in figure 5, the mobile terminal 1 include touch display screen 10, The memory 11 being connected with the touch display screen 10 and the processor being connected with the touch display screen 10 and memory 11 12。
The touch display screen 10 is used to make user click on predetermined number of clicks so that the mobile terminal enters application Pattern.Predetermined number of clicks is 1 time in the present embodiment.The touch display screen 10 is received based on tactile and/or tactile contact The input of user.The touch display screen forms a touch sensitive surface for receiving user's input.The touch display screen and touch Connecing in displaying screen controller (together with any associated module and/or instruction set in memory) detection touch display screen Touch (and any movement or interruption of the touch), and by the contact transformation detected into including in touch display screen Such as one or more soft-key buttons etc user interface object interaction.In one exemplary embodiment, display is touched Contact point between screen and user corresponds to one or more fingers of user.The touch display screen can use LCD (liquid crystals Show device) technology or LPD (light emitting polymer displays) technology, but other Display Techniques can be used in other embodiments.Touch Display screen and touch display screen controller can using any one of a variety of Touch technologies come detect contact and its it is mobile or Interrupt, these Touch technologies include but is not limited to electric capacity, resistance, infrared and surface acoustic wave techniques, and other proximity transducers Array, or the other technologies of the one or more points for determining to be in contact with touch display screen.User can use any suitable When object or accessory, such as instruction pen, finger etc., to contact touch display screen.
Contact/motion module detects the contact with touch display screen together with touch display screen controller.Contact/the fortune Dynamic model block includes being used for the various component softwares for performing the associated various operations of the detection of the contact with touch display screen, described Operation for example, determines whether to be in contact, and determines whether the contact moves, and the movement in tracking touch display screen, and really Whether whether the fixed contact interrupted and (stop contacting).Determine that the operation of contact point movement can include determining that the speed of contact point (amplitude), speed (amplitude and direction) and/or acceleration (including amplitude and/or direction).In certain embodiments, contact/fortune Dynamic model block also detects the contact on touch pad with touch display screen controller.In the present embodiment, the touch display screen 10 is used Clicked in making user with predetermined number of clicks to export acquisition instructions.For example, predetermined number of clicks is twice.Due to the movement Terminal 1 is bound with the vehicles, that is, is bound with the user of the vehicles, then is necessarily stored with use in mobile terminal 1 The fingerprint at family, by fingerprint recognition user, that is, by the click of user come triggering collection order.
The memory 11 being connected with the touch display screen 10 is used for the iris information for storing the owner of the mobile terminal, tests Demonstrate,prove foundation, basis for estimation etc..In the present embodiment, the memory 11 may include high-speed random access memory, and may be used also Including nonvolatile memory, such as one or more disk storage equipments, flash memory device or the storage of other nonvolatile solid states Equipment.In certain embodiments, memory can also include the memory of one or more processors, for example, via RF circuits or The network attached storage of outside port and communication network access, wherein the communication network can be internet, one or Multiple in-house networks, LAN (LAN), wide area network (WLAN), storage area network (SAN) etc. or other are appropriately combined.Memory control Access of such as CPU and interface circuit of device controllable device processed etc the other assemblies to memory.
The processor 12 being connected with the touch display screen 10 and memory 11 is used to enter application in the mobile terminal During pattern, the iris information of the currently used person of the mobile terminal, and the rainbow with being pre-stored in inside the mobile terminal are captured Film information is matched to verify whether the currently used person of the mobile terminal is owner;If it is not, then alarm in a predefined manner, And perform it is default apply safety operation, if it is not, then judging the mobile terminal when the mobile terminal enters service stage Safety operation is applied with the presence or absence of non-.In the present embodiment, the mobile terminal refers to the mobile terminal into application model Touch display screen of the currently used person by clicking on the mobile terminal on the application that shows on the graphical user interface that exports Program, then represent that mobile terminal enters application model when user clicks on the application program, while also illustrate that described mobile whole Safety verification pattern is applied in end triggering.The application program is for example, QQ, wechat, Fetion, Mobile banking, Alipay etc. are included The application program of owner's privacy.In the present embodiment, verify the mobile terminal currently used person whether be owner checking Foundation is according to the owner's iris information being pre-stored in inside the mobile terminal.In the present embodiment with being pre-stored in the movement eventually Iris information inside end is matched to verify whether the currently used person of the mobile terminal is owner, if matching, table Show that the currently used person is owner;If mismatch, then it represents that the currently used person is non-owner.Why the present embodiment is adopted It is because iris is located between the sclera and pupil of eyes, by many gland nests, gauffer, color by the use of iris information as checking foundation Plain spot etc. is formed, and contains extremely abundant texture information.Compared with other biological identification technologies, iris recognition has and can not taken Advantage in terms of the physiology in generation:
(1) identical two irises can not possibly occur in uniqueness-nature, even scientific experiment shows double born of the same parents Tire, the iris image of same people's right and left eyes also differ;
(2) stability-iris just stable molding after people is born 8 months, unless the special circumstances such as lesion occur, The iris texture of people among all one's life all without change, and by perform the operation change iris texture risk it is also very high;
(3) the non-property invaded-iris is externally visible internal, can be in the case where not contacted with collecting device Imaging;
(4) natural antifalsification-when taking in the intensity of light of pupil and changing, pupil can produce contraction or expansion And affecting iris to change, this causes iris to have natural antifalsification, can take precautions against usurping for iris.
And the iris information in the present embodiment passes through by showing including light source, imaging lens, camera, light beam separate sheet, LCD Show and completed with the trapping module of the composition such as image frame acquisitions device.In the present embodiment, the trapping module can be located at mobile whole Daugman modules or Wildes modules in end.
In the present embodiment, the predetermined type of alarm include touch display screen light flash, send drop drop alarm sound, Or vibration etc., but be not limited thereto, in the application example of reality, every mode that can be used for alarm can reach this reality The purpose of example is applied, is stated clearly hereby.In the present embodiment, it is described default to refer to prevent the current of non-owner to make using safety operation User performs any operation to the mobile terminal, for example, preventing the currently used person of non-owner from using sectional drawing function, prevents non- Application Folder or file etc. are used bluetooth by the currently used person of owner, and WLAN is direct-connected, multimedia message, QQ, or wechat The privacy of owner in the mobile terminal is sent Deng communication software.
The processor 12 judges that the mobile terminal is answered with the presence or absence of non-when the mobile terminal enters service stage With safety operation, if so, then being alarmed with the predetermined way, moved if it is not, then making described in currently used person's continuation normal use Terminal.In the present embodiment, the non-application safety operation includes the first non-security application operating and the second non-application safety behaviour Make.The first non-security application operating is that the mobile terminal there is currently the situation stolen a glance at.Described second it is non-security should The situation taken on the sly is there is currently for the mobile terminal with operation.The specific processor 12 performs following function
Judge that the mobile terminal whether there is the first non-security application operating, if so, then being alarmed with the predetermined way; If it is not, then continue to judge that the mobile terminal whether there is the second non-security application operating, if so, then with the predetermined way report It is alert, make the mobile terminal be directly entered resting state, if it is not, it is mobile whole described in normal use then to make currently used person continue End.In the present embodiment, judge that the basis for estimation that the mobile terminal whether there is the first non-security application operating is to judge institute State whether mobile terminal currently captures multiple iris informations (for example, the mobile terminal captures two iris informations), if so, then Represent that the mobile terminal there is currently the situation stolen a glance at;If not, then it represents that the mobile terminal there is currently no and be stolen a glance at Situation.In the present embodiment, judge that the basis for estimation that the mobile terminal whether there is the second non-security application operating is to sentence Whether the mobile terminal that breaks currently captures multiple abnormal work frequency parameters, if, then it represents that the mobile terminal is currently deposited In the situation taken on the sly, and the mobile terminal is made to be directly entered resting state;If not, then it represents that the mobile terminal is current not In the presence of the situation taken on the sly, currently used person is made to continue mobile terminal described in normal use.The working signal of wireless device of taking on the sly Frequency is usually:900/1100/1200/1300/2400MHz, and the frequency of mobile phone signal is mostly:900Hz、1800HZ、 1900HZ, 2000Hz, therefore in the present embodiment, the working signal frequency setting for device of wirelessly taking on the sly is joined for abnormal work frequency Number, is arranged to 100-800MHz and 900/1100/1200/1300/2400MHz.In other words, if the mobile terminal One or more of 100-800MHz and 900/1100/1200/1300/2400MHz frequency parameter are captured, that is, judges to deposit In the situation taken on the sly.
In summary, application of the present invention securely achieves method, system and mobile terminal and make use of iris recognition Technology identifies owner, prevents the personal information of mobile terminal user from losing, more prevents other people from stealing a glance at, prevents from being taken on the sly, prevent Secret file on mobile terminal is forwarded, and prevents chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing, So as to preferably protect privacy of user.So the present invention effectively overcomes various shortcoming of the prior art and has height and produce Industry value.
The above-described embodiments merely illustrate the principles and effects of the present invention, not for the limitation present invention.It is any ripe Know the personage of this technology all can carry out modifications and changes under the spirit and scope without prejudice to the present invention to above-described embodiment.Cause This, those of ordinary skill in the art is complete without departing from disclosed spirit and institute under technological thought such as Into all equivalent modifications or change, should by the present invention claim be covered.

Claims (6)

1. one kind application securely achieves method, applied to mobile terminal, it is characterised in that the application securely achieves method Comprise the following steps:
When the mobile terminal enters application model, whether the currently used person for verifying the mobile terminal is owner;If it is not, Then alarm in a predefined manner, and perform and default apply safety operation;If so, then perform next step;
When the mobile terminal enters service stage, judge that the mobile terminal applies safety operation with the presence or absence of non-, it is described Non- application safety operation include the first non-security application operating and second it is non-apply safety operation, the first non-security application is grasped The situation stolen a glance at is there is currently as the mobile terminal, the second non-security application operating is that the mobile terminal is current In the presence of the situation taken on the sly;
Judge that the mobile terminal includes judging that the mobile terminal whether there is with the presence or absence of the step of non-application safety operation First non-security application operating, judge that the basis for estimation that the mobile terminal whether there is the first non-security application operating is to judge Whether the mobile terminal currently captures multiple iris informations, if, then it represents that the mobile terminal there is currently what is stolen a glance at Situation, alarmed with the predetermined way;If not, then it represents that the mobile terminal there is currently no the situation stolen a glance at, and continue to sentence Break the mobile terminal whether there is the second non-security application operating, judge the mobile terminal with the presence or absence of second it is non-security answer It is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters with the basis for estimation of operation, if so, then table Show that the mobile terminal there is currently the situation taken on the sly, alarmed with the predetermined way, make the mobile terminal be directly entered Resting state;If not, then it represents that the mobile terminal there is currently no the situation taken on the sly, make currently used person continue normally to make With the mobile terminal.
2. application according to claim 1 securely achieves method, it is characterised in that:Verify the current of the mobile terminal Whether user is that the checking foundation of owner is owner's iris information that basis is pre-stored in inside the mobile terminal.
3. application according to claim 2 securely achieves method, it is characterised in that:Verifying working as the mobile terminal Before the step of whether preceding user is owner, the application, which securely achieves method, also to be included capturing working as the mobile terminal The iris information of preceding user, and the iris information with being pre-stored in inside the mobile terminal is matched to verify the movement Whether the currently used person of terminal is owner, if matching, then it represents that the currently used person is owner;If mismatch, then it represents that The currently used person is non-owner.
4. one kind application securely achieves system, applied to mobile terminal, it is characterised in that the application securely achieves system Including:
Authentication module, for when the mobile terminal enters application model, verifying the currently used person of the mobile terminal to be No is owner;If it is not, then calling for alarming in a predefined manner, and perform the default alarm module using safety operation;If It is then to call for when the mobile terminal enters service stage, judging the mobile terminal with the presence or absence of non-application safety The judge module of operation, if so, then calling the alarm module to be alarmed with the predetermined way, work as if it is not, then calling for making Preceding user continues the command output module of mobile terminal described in normal use;
The non-application safety operation includes the first non-security application operating and second and non-applies safety operation, the first non-peace Full application operating is that the mobile terminal there is currently the situation stolen a glance at, and the second non-security application operating is the movement Terminal there is currently the situation taken on the sly;
The judge module includes:
First judge module unit, for judging that the mobile terminal also includes sentencing with the presence or absence of the step of non-application safety operation Break the mobile terminal whether there is the first non-security application operating, judge the mobile terminal with the presence or absence of first it is non-security answer It is to judge whether the mobile terminal currently captures multiple iris informations with the basis for estimation of operation, if, then it represents that the shifting Dynamic terminal there is currently the situation stolen a glance at, and call the alarm module to be alarmed with the predetermined way;If not, then it represents that described Mobile terminal there is currently no the situation stolen a glance at;
Second judging unit, it is described mobile whole for when the first non-security application operating is not present in the mobile terminal, judging End judges that the mobile terminal is non-security with the presence or absence of second with the presence or absence of the second judging unit of the second non-security application operating The basis for estimation of application operating is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters, if so, then Represent that the mobile terminal there is currently the situation taken on the sly, call the alarm module to be alarmed with the predetermined way, and adjust With for making the mobile terminal be directly entered the control unit of resting state;If not, then it represents that the mobile terminal is current not In the presence of the situation taken on the sly, the command output module is called to be used to make currently used person continue movement described in normal use eventually End.
5. application according to claim 4 securely achieves system, it is characterised in that:The application securely achieves system Also include being connected with the authentication module, the capture mould of the iris information of the currently used person for capturing the mobile terminal Block.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
Touch display screen, for making user be clicked on predetermined number of clicks so that the mobile terminal enters application model;
Processor, it is connected with the touch display screen, for when the mobile terminal enters application model, verifying the movement Whether the currently used person of terminal is owner;If it is not, then alarm in a predefined manner, and perform and default apply safety operation;If It is then when the mobile terminal enters service stage, to judge that the mobile terminal applies safety operation with the presence or absence of non-, it is described Non- application safety operation include the first non-security application operating and second it is non-apply safety operation, the first non-security application is grasped The situation stolen a glance at is there is currently as the mobile terminal, the second non-security application operating is that the mobile terminal is current In the presence of the situation taken on the sly;
Judge that the mobile terminal includes judging that the mobile terminal whether there is with the presence or absence of the step of non-application safety operation First non-security application operating, judge that the basis for estimation that the mobile terminal whether there is the first non-security application operating is to judge Whether the mobile terminal currently captures multiple iris informations, if, then it represents that the mobile terminal there is currently what is stolen a glance at Situation, alarmed with the predetermined way;If not, then it represents that the mobile terminal there is currently no the situation stolen a glance at, and continue to sentence Break the mobile terminal whether there is the second non-security application operating, judge the mobile terminal with the presence or absence of second it is non-security answer It is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters with the basis for estimation of operation, if so, then table Show that the mobile terminal there is currently the situation taken on the sly, alarmed with the predetermined way, make the mobile terminal be directly entered Resting state;If not, then it represents that the mobile terminal there is currently no the situation taken on the sly, make currently used person continue normally to make With the mobile terminal.
CN201510705534.9A 2015-10-27 2015-10-27 One kind application securely achieves method, system and mobile terminal Active CN105354465B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510705534.9A CN105354465B (en) 2015-10-27 2015-10-27 One kind application securely achieves method, system and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510705534.9A CN105354465B (en) 2015-10-27 2015-10-27 One kind application securely achieves method, system and mobile terminal

Publications (2)

Publication Number Publication Date
CN105354465A CN105354465A (en) 2016-02-24
CN105354465B true CN105354465B (en) 2018-04-06

Family

ID=55330436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510705534.9A Active CN105354465B (en) 2015-10-27 2015-10-27 One kind application securely achieves method, system and mobile terminal

Country Status (1)

Country Link
CN (1) CN105354465B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909074B (en) * 2017-11-10 2018-10-09 广州城建职业学院 Preventing mobile phone is taken on the sly alarm system
CN108960151A (en) * 2018-07-06 2018-12-07 西北工业大学 A kind of mobile phone owner's personal identification method based on body motion information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167169A (en) * 2013-02-01 2013-06-19 北京小米科技有限责任公司 Terminal unlocking method and terminal unlocking device
CN103473494A (en) * 2013-09-03 2013-12-25 小米科技有限责任公司 Application running method, device and terminal device
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711256B2 (en) * 2006-09-01 2010-05-04 Research In Motion Limited Camera-steady focus requirements for preventing inconspicuous use of cameras on handheld mobile communication devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167169A (en) * 2013-02-01 2013-06-19 北京小米科技有限责任公司 Terminal unlocking method and terminal unlocking device
CN103473494A (en) * 2013-09-03 2013-12-25 小米科技有限责任公司 Application running method, device and terminal device
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal

Also Published As

Publication number Publication date
CN105354465A (en) 2016-02-24

Similar Documents

Publication Publication Date Title
JP6649411B2 (en) Method and apparatus for enabling a touch screen display of a mobile device
EP3232299B1 (en) Physical key component, terminal, and touch response method and device
CN106030595B (en) It is being saved for power in electronic equipment to be integrated with non-application processor function fingerprint
CN104765552B (en) Authority management method and device
CN106201292A (en) Terminal false-touch prevention method and apparatus
EP3699789A1 (en) Method and device for security verification and mobile terminal
CN105100461B (en) Mobile terminal and method for realizing automatic answering
CN104063654B (en) The monitoring method and device of application program
CN105260682A (en) Method and device for protecting user privacy
CN109324863B (en) Fingerprint identification method and device and computer readable storage medium
CN107391995A (en) Unlock operation processing method and device
CN108712554A (en) Incoming display method, mobile terminal and storage medium
CN104318185A (en) Application control method, application control equipment and mobile terminal
WO2021092769A1 (en) Security protection method and device, mobile terminal, and storage medium
CN107679377A (en) Application interface switching method, device, storage medium and electronic equipment
CN108459814A (en) Using startup method, mobile terminal and computer readable storage medium
CN105354465B (en) One kind application securely achieves method, system and mobile terminal
CN108846271A (en) Device control method, device, storage medium and electronic device
CN109325334A (en) A touch terminal control method and touch terminal
CN106778169B (en) Fingerprint unlocking method and device
CN106529264B (en) Application locking and unlocking method and device
CN107563163A (en) A kind of screen unlocked by fingerprint method and terminal
CN104750375B (en) interface display method and device
CN109768911A (en) Message treatment method, mobile terminal and storage medium
CN106325621A (en) A mobile terminal and a touch response method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201202

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201222

Address after: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee after: Bengbu Lichao Information Technology Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210315

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee before: Bengbu Lichao Information Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221128

Address after: Room 2007, No. 93, Hubin East Road, Siming District, Xiamen City, Fujian Province, 361000

Patentee after: Xiamen Lianjian Technology Co.,Ltd.

Address before: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee before: Huzhou YingLie Intellectual Property Operation Co.,Ltd.