One kind application securely achieves method, system and mobile terminal
Technical field
The invention belongs to technical field of mobile terminals, and method, system and shifting are securely achieved more particularly to one kind application
Dynamic terminal.
Background technology
Contemporary communication science and technology is more and more flourishing, and electronic equipment is also increasingly advanced, especially with the hair of the communication technology
Open up, the mobile terminal in electronic equipment, be based particularly on 3rd generation mobile communication technology (3G), fourth generation mobile communication technology
Hardware configuration is stronger and stronger in the mobile terminal of (4G) and long evolving system (LTE), and application of function is more and more various to make it
As the necessity of nowadays people's life and work.
Due to use degree more and more higher of the modern to intelligent terminal, and because intelligent terminal and caused by the leakage of a state or party secret when
There is generation:
If you chat with your friend or household's net, but are stolen a glance at by bystander's either inadvertent or intentional, just in case net
Merely content very secret, and the people for sniffing your chat contents is a people for disrespecting other people privacies, help diffusion everywhere
Your chat content, whether you can feel very indignant
If your chat content at that time is taken on the sly by people, whether can be gone mad once you are aware of
If your mobile phone is not intended to or is seen intentionally by people the unlocking pattern, password, this sicko or crime
Person by your photograph album secret photo forwarding either your some chat contents by people's sectional drawing so as to forward, if you know
, your personal document, which is passed, to be dissipated, and you take legal means to protect the privacy of oneself, but can file be recovered or one
It is individual unknown.
Therefore, how a kind of application is provided and securely achieves method, system and mobile terminal, with solve in the prior art without
The privacy of the comprehensive protection user of method causes many disadvantages such as privacy of user leakage, real urgently to have been solved as practitioner in the art
Technical problem certainly.
The content of the invention
In view of the above the shortcomings that prior art, it is an object of the invention to provide one kind to apply the side of securely achieving
Method, system and mobile terminal, for solve in the prior art can not be comprehensive the privacy of protection user cause privacy of user to let out
The problem of dew.
In order to achieve the above objects and other related objects, one aspect of the present invention provides a kind of application and securely achieves method,
Applied to mobile terminal, the application securely achieves method and comprised the following steps:Enter application model in the mobile terminal
When, whether the currently used person for verifying the mobile terminal is owner;If it is not, then alarming in a predefined manner, and perform default
Using safety operation;If so, then perform next step;When the mobile terminal enters service stage, judge described mobile whole
Safety operation is applied in end with the presence or absence of non-, if so, then being alarmed with the predetermined way, if it is not, then making currently used person continue just
Often use the mobile terminal.
In one embodiment of the invention, verify the mobile terminal currently used person whether be owner checking foundation
It is according to the owner's iris information being pre-stored in inside the mobile terminal.
In one embodiment of the invention, verify the step of whether currently used person of the mobile terminal is owner it
Before, the application securely achieves the iris information that method also includes capturing the currently used person of the mobile terminal, and with it is pre-
There is the iris information inside the mobile terminal to be matched to verify whether the currently used person of the mobile terminal is machine
It is main, if matching, then it represents that the currently used person is owner;If mismatch, then it represents that the currently used person is non-owner.
In one embodiment of the invention, the non-application safety operation is non-including the first non-security application operating and second
Using safety operation;Judge that the mobile terminal also includes judging the movement eventually with the presence or absence of the step of non-application safety operation
End whether there is the first non-security application operating, if so, then being alarmed with the predetermined way;If it is not, then continue to judge the shifting
Dynamic terminal whether there is the second non-security application operating, if so, then being alarmed with the predetermined way, make the mobile terminal direct
Into resting state, if it is not, then making currently used person continue mobile terminal described in normal use.
In one embodiment of the invention, the first non-security application operating there is currently stolen for the mobile terminal
The situation seen;The second non-security application operating is that the mobile terminal there is currently the situation taken on the sly.
In one embodiment of the invention, judge that the mobile terminal whether there is the judgement of the first non-security application operating
Foundation is to judge whether the mobile terminal currently captures multiple iris informations, if, then it represents that the mobile terminal is currently deposited
In the situation stolen a glance at;If not, then it represents that the mobile terminal there is currently no the situation stolen a glance at, and continue to judge the movement
Terminal whether there is the second non-security application operating.
In one embodiment of the invention, judge that the mobile terminal whether there is the judgement of the second non-security application operating
Foundation is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters, if, then it represents that it is described mobile whole
End there is currently the situation taken on the sly;If not, then it represents that the mobile terminal there is currently no the situation taken on the sly, and order currently makes
User continues mobile terminal described in normal use
Another aspect of the present invention also provides a kind of application and securely achieves system, applied to mobile terminal, the application peace
Complete realizes that system includes:Authentication module, for when the mobile terminal enters application model, verifying the mobile terminal
Whether currently used person is owner;If it is not, then call for alarming in a predefined manner, and perform default using safety operation
Alarm module;If so, then call for when the mobile terminal enters service stage, judging that the mobile terminal whether there is
The non-judge module using safety operation, if so, then calling the alarm module to be alarmed with the predetermined way, if it is not, then adjusting
With for making currently used person continue the command output module of mobile terminal described in normal use.
In one embodiment of the invention, the non-application safety operation is non-including the first non-security application operating and second
Using safety operation;The judge module includes:First judge module unit, for judging the mobile terminal with the presence or absence of non-
Using the step of safety operation also include judge that the mobile terminal whether there is the first non-security application operating, if so, then adjusting
Alarmed with the alarm module with the predetermined way;Second judging unit, it is non-for being not present first in the mobile terminal
When safety applications operate, judge that the mobile terminal whether there is the second judging unit of the second non-security application operating, if so,
Then call the alarm module to be alarmed with the predetermined way, and call for making the mobile terminal be directly entered resting state
Control unit, if it is not, then call the command output module be used to making currently used person continue described in normal use it is mobile eventually
End.
In one embodiment of the invention, the application, which securely achieves system, also to be included being connected with the authentication module,
Trapping module for the iris information of the currently used person that captures the mobile terminal.
Another aspect of the invention also provides a kind of mobile terminal, and the mobile terminal includes:Touch display screen, for using
Family is clicked on predetermined number of clicks so that the mobile terminal enters application model;Processor, it is connected with the touch display screen,
For when the mobile terminal enters application model, whether the currently used person for verifying the mobile terminal to be owner;If it is not,
Then alarm in a predefined manner, and perform and default apply safety operation;If so, then enter service stage in the mobile terminal
When, judge that the mobile terminal applies safety operation with the presence or absence of non-, if so, then being alarmed with the predetermined way, if it is not, then making
Currently used person continues mobile terminal described in normal use
As described above, the application of the present invention securely achieves method, system and mobile terminal, have the advantages that:
Application of the present invention securely achieves method, system and mobile terminal and make use of iris recognition technology cognitron
It is main, prevent the personal information of mobile terminal user from losing, more prevent other people from stealing a glance at, prevent from being taken on the sly, prevent on mobile terminal
Secret file be forwarded, prevent chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing, so as to preferably
Protect privacy of user.
Brief description of the drawings
Fig. 1 is shown as the schematic perspective view of the mobile terminal of the present invention.
The application that Fig. 2 is shown as the present invention securely achieves schematic flow sheet of the method in an embodiment.
Fig. 3 is shown as the schematic flow sheet that application of the invention securely achieves step S3 in method.
The application that Fig. 4 is shown as the present invention securely achieves theory structure schematic diagram of the system in an embodiment.
Fig. 5 is shown as theory structure schematic diagram of the mobile terminal of the present invention in an embodiment.
Component label instructions
1 mobile terminal
10 touch display screens
11 memories
12 processors
20 applications securely achieve system
200 trapping modules
201 authentication modules
202 alarm modules
203 judge modules
204 command output modules
2031 first judging units
2032 second judging units
2033 control units
S1~S3 steps
S31~S33 steps
Embodiment
Illustrate embodiments of the present invention below by way of specific instantiation, those skilled in the art can be by this specification
Disclosed content understands other advantages and effect of the present invention easily.The present invention can also pass through specific realities different in addition
The mode of applying is embodied or practiced, the various details in this specification can also be based on different viewpoints with application, without departing from
Various modifications or alterations are carried out under the spirit of the present invention.It should be noted that in the case where not conflicting, following examples and implementation
Feature in example can be mutually combined.
It should be noted that the diagram provided in following examples only illustrates the basic structure of the present invention in a schematic way
Think, only show the component relevant with the present invention in schema then rather than according to component count, shape and the size during actual implement
Draw, kenel, quantity and the ratio of each component can be a kind of random change during its actual implementation, and its assembly layout kenel
It is likely more complexity.
The technical principle that application of the present invention securely achieves method, system and mobile terminal is as follows:
Some application is assumed to be opens safe handling function using A, selection, now when using some application:
1. anti-steal a glance at:The typing body iris of oneself is eyeball information to user in advance, during using A is applied,
If detecting the iris of non-user, mobile phone is prompted (such as to user:Screen flicker several times, or sends the alarm tone of drop drop
Deng)
2. anti-take on the sly:User detects situation about taking on the sly, then provides user during the application A using mobile phone
Prompting is (such as:Direct dormancy of screen etc.)
3. prevent sectional drawing, prevent from propagating outside associated documents:At application A interfaces, user or other people when using sectional drawing function,
Sectional drawing fails, using file or folder in A file etc. using bluetooth, the work(such as WLAN is direct-connected, multimedia message or QQ, wechat
It can not send success
Embodiment one
The present embodiment provides a kind of application and securely achieves method, and applied to mobile terminal, the application securely achieves
Method includes following steps:
When the mobile terminal enters application model, whether the currently used person for verifying the mobile terminal is owner;
If it is not, then alarm in a predefined manner, and perform and default apply safety operation;If so, then perform next step;
When the mobile terminal enters service stage, judge that the mobile terminal applies safety operation with the presence or absence of non-,
If so, then alarmed with the predetermined way, if it is not, then making currently used person continue mobile terminal described in normal use.
Method is securely achieved below with reference to diagram to the application described in the present embodiment to be described in detail.The application
Securely achieve method and be applied to mobile terminal, the mobile terminal is in the implementation of reality, including is smart mobile phone, flat
Plate computer, notebook computer etc. have the electronic equipment of screen, referring to Fig. 1, being shown as the schematic perspective view of mobile terminal.Such as
Shown in Fig. 1, the mobile terminal 1, i.e. smart mobile phone 1 include touch display screen 10, in the implementation of reality, the electronics
Device is, for example, the electronic equipment 1 that smart mobile phone, tablet personal computer, notebook computer etc. have screen.Wherein, it is described to touch display
Screen 10 provides output interface and input interface simultaneously between equipment and user.Touch display screen controller reception/transmission from/
Go to the electric signal of touch display screen 10.The touch display screen 10 then shows visual output to user.This visual output can be with
Including text, figure, video and its any combination.Some or all visual outputs can be corresponding with user-interface object, under
Its more details will be described in text.
Touch display screen 10 receives the input of user also based on tactile and/or tactile contact.The shape of touch display screen 10
The touch sensitive surface for receiving user's input into one.The touch display screen 10 and touch display screen controller are (together with memory
In any associated module and/or instruction set together) (and the touch is any for contact in detection touch display screen 10
It is mobile or interrupt), and by the contact transformation detected into including such as one or more soft in touch display screen 10
The interaction of the user interface object of button etc.In one exemplary embodiment, connecing between touch display screen 10 and user
Contact corresponds to one or more fingers of user.The touch display screen 10 can use LCD (liquid crystal display) technologies or LPD
(light emitting polymer displays) technology, but other Display Techniques can be used in other embodiments.Touch display screen 10 and touch
Displaying screen controller can detect contact and its mobile or interruption using any one of a variety of Touch technologies, and these are touch-sensitive
Technology includes but is not limited to electric capacity, resistance, infrared and surface acoustic wave techniques, and other proximity sensor arrays, or for true
The other technologies of the fixed one or more points being in contact with touch display screen 10.User can use any appropriate object or match somebody with somebody
Part, such as instruction pen, finger etc., to contact touch display screen 10.
Described contact/motion module detects the contact with touch display screen 10 together with touch display screen controller.
Contact/the motion module includes being used to perform the various soft of the associated various operations of the detection of the contact with touch display screen 10
Part component, the operation for example, determine whether to be in contact, and determine whether the contact moves, and in tracking touch display screen 10
Movement, and determine whether the contact is interrupted (whether stopping contacting).Determining the operation of contact point movement can be included really
Determine the speed (amplitude), speed (amplitude and direction) and/or acceleration (including amplitude and/or direction) of contact point.In some realities
Apply in example, contact/motion module also detects the contact on touch pad with touch display screen controller.
In the present embodiment, illustrated exemplified by the mobile terminal 1 smart mobile phone that for example, Fig. 1 is presented.It is described
Smart mobile phone be, for example, install Android operation system either iOS operating systems or Palm OS, Symbian (Saipan) or
The smart mobile phone of the operating systems such as person Black Berry (blackberry, blueberry) OS 6.0, Windows Phone 8.
Referring to Fig. 2, it is shown as using method schematic flow sheet in an embodiment is securely achieved, as shown in Fig. 2 institute
State and comprise the following steps using securely achieving method:
S1, when the mobile terminal enters application model, capture the iris letter of the currently used person of the mobile terminal
Breath, and the iris information with being pre-stored in inside the mobile terminal is matched to verify the currently used person of the mobile terminal
Whether it is owner;If it is not, step S2 is then performed, if it is not, then performing step S3.In the present embodiment, the mobile terminal enters
Application model refers to what is exported in touch display screen of the currently used person of the mobile terminal by clicking on the mobile terminal
The application program shown on graphical user interface, then represent that mobile terminal enters when user clicks on the application program and apply mould
Formula, while also illustrate that safety verification pattern is applied in the mobile terminal triggering.The application program for example, QQ, wechat, Fetion,
Mobile banking, Alipay etc. include the application program of owner's privacy.In the present embodiment, the current of the mobile terminal is verified
Whether user is that the checking foundation of owner is owner's iris information that basis is pre-stored in inside the mobile terminal.In this implementation
Matched in example with the iris information being pre-stored in inside the mobile terminal to verify the currently used person of the mobile terminal
Whether it is owner, if matching, then it represents that the currently used person is owner;If mismatch, then it represents that the currently used person is
Non- owner.Why the present embodiment is used as using iris information is verified foundation, is because iris is located at the sclera and pupil of eyes
Between, it is made up of many gland nests, gauffer, pigmented spots etc., contains extremely abundant texture information.With other biological identification technologies
Compare, iris recognition has the advantage in terms of the physiology that can not substitute:
(1) identical two irises can not possibly occur in uniqueness-nature, even scientific experiment shows double born of the same parents
Tire, the iris image of same people's right and left eyes also differ;
(2) stability-iris just stable molding after people is born 8 months, unless the special circumstances such as lesion occur,
The iris texture of people among all one's life all without change, and by perform the operation change iris texture risk it is also very high;
(3) the non-property invaded-iris is externally visible internal, can be in the case where not contacted with collecting device
Imaging;
(4) natural antifalsification-when taking in the intensity of light of pupil and changing, pupil can produce contraction or expansion
And affecting iris to change, this causes iris to have natural antifalsification, can take precautions against usurping for iris.
And the iris information in the present embodiment passes through by showing including light source, imaging lens, camera, light beam separate sheet, LCD
Show and completed with the trapping module of the composition such as image frame acquisitions device.In the present embodiment, the trapping module can be located at mobile whole
Daugman modules or Wildes modules in end.
S2, if the currently used person of the mobile terminal is not owner, alarm in a predefined manner, and perform default answer
Use safety operation.In the present embodiment, the predetermined type of alarm includes touch display screen light flash, sends drop drop alarm
Sound or vibration etc., but be not limited thereto, in the application example of reality, every mode that can be used for alarm can reach
The purpose of the present embodiment, is stated clearly hereby.In the present embodiment, it is described default to refer to prevent working as non-owner using safety operation
Preceding user performs any operation to the mobile terminal, for example, preventing the currently used person of non-owner from using sectional drawing function, hinders
Only Application Folder or file etc. are used bluetooth by the currently used person of non-owner, and WLAN is direct-connected, multimedia message, QQ, or
The communication softwares such as wechat send the privacy of owner in the mobile terminal.
S3, when the mobile terminal enters service stage, judge the mobile terminal with the presence or absence of non-application safety behaviour
Make, if so, then perform step S4, i.e., with the predetermined way alarm, if it is not, then perform step S5, even currently used person after
Mobile terminal described in continuous normal use.In the present embodiment, the non-application safety operation includes the first non-security application operating
Non- safety operation is applied with second.The first non-security application operating is that the mobile terminal there is currently the shape stolen a glance at
Condition.The second non-security application operating is that the mobile terminal there is currently the situation taken on the sly.Referring specifically to Fig. 3, show
It is shown as step S3 idiographic flow schematic diagram.As shown in figure 3, the step S3 includes:
S31, judge that the mobile terminal whether there is the first non-security application operating, if so, then perform step S4, i.e., with
The predetermined way alarm;If it is not, then continue executing with next step.In the present embodiment, judge whether the mobile terminal is deposited
It is to judge whether the mobile terminal currently captures multiple iris information (examples in the basis for estimation of the first non-security application operating
Such as, the mobile terminal captures two iris informations), if, then it represents that the mobile terminal there is currently the situation stolen a glance at;
If not, then it represents that the mobile terminal there is currently no the situation stolen a glance at.
S32, continue to judge that the mobile terminal whether there is the second non-security application operating, if so, then performing step
S33, i.e., alarmed with the predetermined way, make the mobile terminal be directly entered resting state, if it is not, being then transferred to step S5, i.e.,
Currently used person is made to continue mobile terminal described in normal use.In the present embodiment, judge the mobile terminal with the presence or absence of the
The basis for estimation of two non-security application operatings is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters,
If, then it represents that the mobile terminal there is currently the situation taken on the sly, and make the mobile terminal be directly entered resting state;
If not, then it represents that the mobile terminal there is currently no the situation taken on the sly, make currently used person continue shifting described in normal use
Dynamic terminal.The working signal frequency of wireless device of taking on the sly is usually:900/1100/1200/1300/2400MHz, and mobile phone signal
Frequency be mostly:900Hz, 1800HZ, 1900HZ, 2000Hz, therefore in the present embodiment, by the working signal for device of wirelessly taking on the sly
Frequency setting is abnormal work frequency parameter, is arranged to 100-800MHz and 900/1100/1200/1300/2400MHz.Change
Sentence, which is talked about, is exactly, if the mobile terminal captures one in 100-800MHz and 900/1100/1200/1300/2400MHz
Individual or multiple frequency parameters, that is, judge the situation taken on the sly be present.
Application described in the present embodiment securely achieves method and make use of iris recognition technology to identify owner, prevents mobile whole
The personal information of end subscriber is lost, and is more prevented other people from stealing a glance at, is prevented from being taken on the sly, prevents that the secret file on mobile terminal from being turned
Hair, prevent chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing, so as to preferably protect privacy of user.
Embodiment two
The present embodiment provides a kind of application and securely achieves system, and applied to mobile terminal, the application securely achieves
System includes:
Authentication module, for when the mobile terminal enters application model, verifying the currently used of the mobile terminal
Whether person is owner;If it is not, then calling for alarming in a predefined manner, and perform the default alarm mould using safety operation
Block;If so, then call for when the mobile terminal enters service stage, judging that the mobile terminal whether there is non-application
The judge module of safety operation, if so, then calling the alarm module to be alarmed with the predetermined way, it is used for if it is not, then calling
Currently used person is made to continue the command output module of mobile terminal described in normal use.
System is securely achieved below with reference to diagram to the application described in the present embodiment to be described in detail.The present embodiment
The application securely achieves system 20 and is applied to mobile terminal, the mobile terminal in the implementation of reality, including for
Smart mobile phone, tablet personal computer, notebook computer etc. have the electronic equipment of screen, referring to Fig. 1, being shown as the vertical of mobile terminal
Body schematic diagram.As shown in figure 1, the mobile terminal 1, i.e. smart mobile phone 1 include touch display screen 10, in the implementation of reality
In, the electronic installation is, for example, the electronic equipment 1 that smart mobile phone, tablet personal computer, notebook computer etc. have screen.Refer to
Fig. 4, it is shown as with securely achieving theory structure schematic diagram of the system in an embodiment.As shown in figure 4, the application safety
Realize that system 20 includes:Trapping module 200, authentication module 201, alarm module 202, judge module 203 and instruction output mould
Block 204.
The trapping module 200 is used for when the mobile terminal enters application model, captures working as the mobile terminal
The iris information of preceding user.Why the present embodiment is used as using iris information is verified foundation, is because iris is located at eyes
Sclera and pupil between, be made up of many gland nests, gauffer, pigmented spots etc., contain extremely abundant texture information.With it is other
Biological identification technology is compared, and iris recognition has the advantage in terms of the physiology that can not substitute:
(1) identical two irises can not possibly occur in uniqueness-nature, even scientific experiment shows double born of the same parents
Tire, the iris image of same people's right and left eyes also differ;
(2) stability-iris just stable molding after people is born 8 months, unless the special circumstances such as lesion occur,
The iris texture of people among all one's life all without change, and by perform the operation change iris texture risk it is also very high;
(3) the non-property invaded-iris is externally visible internal, can be in the case where not contacted with collecting device
Imaging;
(4) natural antifalsification-when taking in the intensity of light of pupil and changing, pupil can produce contraction or expansion
And affecting iris to change, this causes iris to have natural antifalsification, can take precautions against usurping for iris.
And the iris information in the present embodiment passes through by showing including light source, imaging lens, camera, light beam separate sheet, LCD
Show and completed with the trapping module 200 of the composition such as image frame acquisitions device.In the present embodiment, the trapping module 200 can be located at
Daugman modules or Wildes modules in mobile terminal.
The authentication module 201 being connected with the trapping module 200 is for the mobile terminal by capturing
The iris information of currently used person, matched with the iris information being pre-stored in inside the mobile terminal to verify the movement
Whether the currently used person of terminal is that owner verifies whether the currently used person of the mobile terminal is owner;If it is not, then call
The alarm module 202, if it is not, then calling the judge module 203.In the present embodiment, the mobile terminal enters application
Pattern refers to the image exported in touch display screen of the currently used person of the mobile terminal by clicking on the mobile terminal
The application program shown in user interface, then represent that mobile terminal enters application model when user clicks on the application program,
Also illustrate that safety verification pattern is applied in the mobile terminal triggering simultaneously.The application program is for example, QQ, wechat, Fetion, mobile phone
Bank, Alipay etc. include the application program of owner's privacy.In the present embodiment, the authentication module 201 verifies the shifting
Whether the currently used person of dynamic terminal is that the checking foundation of owner is owner's iris that basis is pre-stored in inside the mobile terminal
Information.That is, the iris information of the currently used person captured and the iris being pre-stored in inside the mobile terminal are believed
Breath is matched to verify whether the currently used person of the mobile terminal is owner, if matching, then it represents that described currently used
Person is owner;If mismatch, then it represents that the currently used person is non-owner.
If the alarm module 202 being connected with the authentication module 201 is used for the currently used person of the mobile terminal
Not owner, then alarm in a predefined manner, and perform and default apply safety operation.In the present embodiment, the predetermined alarm
Mode includes touch display screen light flash, sends drop drop alarm sound or vibration etc., but is not limited thereto, in reality
Application example in, every mode that can be used for alarm can reach the purpose of the present embodiment, state clearly hereby.In the present embodiment
In, the default currently used person for referring to prevent non-owner using safety operation performs any behaviour to the mobile terminal
Make, for example, preventing the currently used person of non-owner from using sectional drawing function, prevent the currently used person of non-owner that application program is literary
Part presss from both sides or file etc. uses bluetooth, and WLAN is direct-connected, multimedia message, QQ, or the communication software such as wechat is by machine in the mobile terminal
Main privacy is sent.
The judge module 203 being connected with the authentication module 201 is used to enter service stage in the mobile terminal
When, judge that the mobile terminal applies safety operation with the presence or absence of non-, if so, then calling the alarm module 202 with described pre-
Determine mode to alarm, if it is not, then calling the command output module for making currently used person continue mobile terminal described in normal use
204.In the present embodiment, the non-application safety operation includes the first non-security application operating and the second non-application safety behaviour
Make.The first non-security application operating is that the mobile terminal there is currently the situation stolen a glance at.Described second it is non-security should
The situation taken on the sly is there is currently for the mobile terminal with operation.Therefore, please continue to refer to Fig. 4.As shown in figure 4, described sentence
Disconnected module 203 includes:First judging unit 2031, the second judging unit 2032 and control unit 2033.
Wherein, first judging unit 2031 is used to judge the mobile terminal with the presence or absence of the first non-security application behaviour
Make, if so, then calling the alarm module 202 to be alarmed with the predetermined way;If it is not, then call second judging unit
2032.In the present embodiment, judge in first judging unit 2031 mobile terminal with the presence or absence of first it is non-security should
It is to judge whether the mobile terminal currently captures multiple iris informations (for example, the mobile terminal with the basis for estimation of operation
Capture two iris informations), if, then it represents that the mobile terminal there is currently the situation stolen a glance at;If not, then it represents that described
Mobile terminal there is currently no the situation stolen a glance at.
Second judging unit 2032 is used to judge that the mobile terminal whether there is the second non-security application operating, if
It is then to call the alarm module 202 to be alarmed with the predetermined way, and calls for making the mobile terminal be directly entered not
The control unit 2033 of dormancy state, currently used person is made to continue normally to make if it is not, then directly invoking the command output module 204
With the mobile terminal.In the present embodiment, judge the mobile terminal with the presence or absence of the in second judging unit 2032
The basis for estimation of two non-security application operatings is to judge whether the mobile terminal currently captures multiple abnormal work frequency parameters,
If, then it represents that the mobile terminal there is currently the situation taken on the sly, and make the mobile terminal be directly entered resting state;
If not, then it represents that the mobile terminal there is currently no the situation taken on the sly, make currently used person continue shifting described in normal use
Dynamic terminal.The working signal frequency of wireless device of taking on the sly is usually:900/1100/1200/1300/2400MHz, and mobile phone signal
Frequency be mostly:900Hz, 1800HZ, 1900HZ, 2000Hz, therefore in the present embodiment, by the working signal for device of wirelessly taking on the sly
Frequency setting is abnormal work frequency parameter, is arranged to 100-800MHz and 900/1100/1200/1300/2400MHz.Change
Sentence, which is talked about, is exactly, if the mobile terminal captures one in 100-800MHz and 900/1100/1200/1300/2400MHz
Individual or multiple frequency parameters, that is, judge the situation taken on the sly be present.
Application described in the present embodiment securely achieves system and make use of iris recognition technology to identify owner, prevents mobile whole
The personal information of end subscriber is lost, and is more prevented other people from stealing a glance at, is prevented from being taken on the sly, prevents that the secret file on mobile terminal from being turned
Hair, prevent chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing, so as to preferably protect privacy of user.
Embodiment three
The present embodiment provides a kind of mobile terminal, and the mobile terminal includes:
Touch display screen, for making user be clicked on predetermined number of clicks so that the mobile terminal enters application model;
Processor, it is connected with the touch display screen, for when the mobile terminal enters application model, described in checking
Whether the currently used person of mobile terminal is owner;If it is not, then alarming in a predefined manner, and perform default application safety behaviour
Make;If so, then when the mobile terminal enters service stage, judge the mobile terminal with the presence or absence of non-application safety behaviour
Make, if so, then being alarmed with the predetermined way, if it is not, then making currently used person continue mobile terminal described in normal use.
The mobile terminal described in the present embodiment is described in detail below with reference to diagram.Referring to Fig. 5, it is shown as moving
Dynamic theory structure schematic diagram of the terminal in an embodiment.The mobile terminal includes one kind can be according to being previously set or store
Instruction, automatic to carry out numerical computations and information processing, and the electronic equipment with multimedia video function, it is included but not
Limiting smart mobile phone, tablet personal computer, notebook computer etc. has electronic equipment for touching screen etc..Touch display screen controller connects
Transmit/receive send from/go to the electric signal of touch display screen.The touch display screen then shows visual output to user.This is visual
Output can include text, figure, video and its any combination.Some or all visual outputs can be relative with user-interface object
Should, its more details will be hereinafter described.As shown in figure 5, the mobile terminal 1 include touch display screen 10,
The memory 11 being connected with the touch display screen 10 and the processor being connected with the touch display screen 10 and memory 11
12。
The touch display screen 10 is used to make user click on predetermined number of clicks so that the mobile terminal enters application
Pattern.Predetermined number of clicks is 1 time in the present embodiment.The touch display screen 10 is received based on tactile and/or tactile contact
The input of user.The touch display screen forms a touch sensitive surface for receiving user's input.The touch display screen and touch
Connecing in displaying screen controller (together with any associated module and/or instruction set in memory) detection touch display screen
Touch (and any movement or interruption of the touch), and by the contact transformation detected into including in touch display screen
Such as one or more soft-key buttons etc user interface object interaction.In one exemplary embodiment, display is touched
Contact point between screen and user corresponds to one or more fingers of user.The touch display screen can use LCD (liquid crystals
Show device) technology or LPD (light emitting polymer displays) technology, but other Display Techniques can be used in other embodiments.Touch
Display screen and touch display screen controller can using any one of a variety of Touch technologies come detect contact and its it is mobile or
Interrupt, these Touch technologies include but is not limited to electric capacity, resistance, infrared and surface acoustic wave techniques, and other proximity transducers
Array, or the other technologies of the one or more points for determining to be in contact with touch display screen.User can use any suitable
When object or accessory, such as instruction pen, finger etc., to contact touch display screen.
Contact/motion module detects the contact with touch display screen together with touch display screen controller.Contact/the fortune
Dynamic model block includes being used for the various component softwares for performing the associated various operations of the detection of the contact with touch display screen, described
Operation for example, determines whether to be in contact, and determines whether the contact moves, and the movement in tracking touch display screen, and really
Whether whether the fixed contact interrupted and (stop contacting).Determine that the operation of contact point movement can include determining that the speed of contact point
(amplitude), speed (amplitude and direction) and/or acceleration (including amplitude and/or direction).In certain embodiments, contact/fortune
Dynamic model block also detects the contact on touch pad with touch display screen controller.In the present embodiment, the touch display screen 10 is used
Clicked in making user with predetermined number of clicks to export acquisition instructions.For example, predetermined number of clicks is twice.Due to the movement
Terminal 1 is bound with the vehicles, that is, is bound with the user of the vehicles, then is necessarily stored with use in mobile terminal 1
The fingerprint at family, by fingerprint recognition user, that is, by the click of user come triggering collection order.
The memory 11 being connected with the touch display screen 10 is used for the iris information for storing the owner of the mobile terminal, tests
Demonstrate,prove foundation, basis for estimation etc..In the present embodiment, the memory 11 may include high-speed random access memory, and may be used also
Including nonvolatile memory, such as one or more disk storage equipments, flash memory device or the storage of other nonvolatile solid states
Equipment.In certain embodiments, memory can also include the memory of one or more processors, for example, via RF circuits or
The network attached storage of outside port and communication network access, wherein the communication network can be internet, one or
Multiple in-house networks, LAN (LAN), wide area network (WLAN), storage area network (SAN) etc. or other are appropriately combined.Memory control
Access of such as CPU and interface circuit of device controllable device processed etc the other assemblies to memory.
The processor 12 being connected with the touch display screen 10 and memory 11 is used to enter application in the mobile terminal
During pattern, the iris information of the currently used person of the mobile terminal, and the rainbow with being pre-stored in inside the mobile terminal are captured
Film information is matched to verify whether the currently used person of the mobile terminal is owner;If it is not, then alarm in a predefined manner,
And perform it is default apply safety operation, if it is not, then judging the mobile terminal when the mobile terminal enters service stage
Safety operation is applied with the presence or absence of non-.In the present embodiment, the mobile terminal refers to the mobile terminal into application model
Touch display screen of the currently used person by clicking on the mobile terminal on the application that shows on the graphical user interface that exports
Program, then represent that mobile terminal enters application model when user clicks on the application program, while also illustrate that described mobile whole
Safety verification pattern is applied in end triggering.The application program is for example, QQ, wechat, Fetion, Mobile banking, Alipay etc. are included
The application program of owner's privacy.In the present embodiment, verify the mobile terminal currently used person whether be owner checking
Foundation is according to the owner's iris information being pre-stored in inside the mobile terminal.In the present embodiment with being pre-stored in the movement eventually
Iris information inside end is matched to verify whether the currently used person of the mobile terminal is owner, if matching, table
Show that the currently used person is owner;If mismatch, then it represents that the currently used person is non-owner.Why the present embodiment is adopted
It is because iris is located between the sclera and pupil of eyes, by many gland nests, gauffer, color by the use of iris information as checking foundation
Plain spot etc. is formed, and contains extremely abundant texture information.Compared with other biological identification technologies, iris recognition has and can not taken
Advantage in terms of the physiology in generation:
(1) identical two irises can not possibly occur in uniqueness-nature, even scientific experiment shows double born of the same parents
Tire, the iris image of same people's right and left eyes also differ;
(2) stability-iris just stable molding after people is born 8 months, unless the special circumstances such as lesion occur,
The iris texture of people among all one's life all without change, and by perform the operation change iris texture risk it is also very high;
(3) the non-property invaded-iris is externally visible internal, can be in the case where not contacted with collecting device
Imaging;
(4) natural antifalsification-when taking in the intensity of light of pupil and changing, pupil can produce contraction or expansion
And affecting iris to change, this causes iris to have natural antifalsification, can take precautions against usurping for iris.
And the iris information in the present embodiment passes through by showing including light source, imaging lens, camera, light beam separate sheet, LCD
Show and completed with the trapping module of the composition such as image frame acquisitions device.In the present embodiment, the trapping module can be located at mobile whole
Daugman modules or Wildes modules in end.
In the present embodiment, the predetermined type of alarm include touch display screen light flash, send drop drop alarm sound,
Or vibration etc., but be not limited thereto, in the application example of reality, every mode that can be used for alarm can reach this reality
The purpose of example is applied, is stated clearly hereby.In the present embodiment, it is described default to refer to prevent the current of non-owner to make using safety operation
User performs any operation to the mobile terminal, for example, preventing the currently used person of non-owner from using sectional drawing function, prevents non-
Application Folder or file etc. are used bluetooth by the currently used person of owner, and WLAN is direct-connected, multimedia message, QQ, or wechat
The privacy of owner in the mobile terminal is sent Deng communication software.
The processor 12 judges that the mobile terminal is answered with the presence or absence of non-when the mobile terminal enters service stage
With safety operation, if so, then being alarmed with the predetermined way, moved if it is not, then making described in currently used person's continuation normal use
Terminal.In the present embodiment, the non-application safety operation includes the first non-security application operating and the second non-application safety behaviour
Make.The first non-security application operating is that the mobile terminal there is currently the situation stolen a glance at.Described second it is non-security should
The situation taken on the sly is there is currently for the mobile terminal with operation.The specific processor 12 performs following function
Judge that the mobile terminal whether there is the first non-security application operating, if so, then being alarmed with the predetermined way;
If it is not, then continue to judge that the mobile terminal whether there is the second non-security application operating, if so, then with the predetermined way report
It is alert, make the mobile terminal be directly entered resting state, if it is not, it is mobile whole described in normal use then to make currently used person continue
End.In the present embodiment, judge that the basis for estimation that the mobile terminal whether there is the first non-security application operating is to judge institute
State whether mobile terminal currently captures multiple iris informations (for example, the mobile terminal captures two iris informations), if so, then
Represent that the mobile terminal there is currently the situation stolen a glance at;If not, then it represents that the mobile terminal there is currently no and be stolen a glance at
Situation.In the present embodiment, judge that the basis for estimation that the mobile terminal whether there is the second non-security application operating is to sentence
Whether the mobile terminal that breaks currently captures multiple abnormal work frequency parameters, if, then it represents that the mobile terminal is currently deposited
In the situation taken on the sly, and the mobile terminal is made to be directly entered resting state;If not, then it represents that the mobile terminal is current not
In the presence of the situation taken on the sly, currently used person is made to continue mobile terminal described in normal use.The working signal of wireless device of taking on the sly
Frequency is usually:900/1100/1200/1300/2400MHz, and the frequency of mobile phone signal is mostly:900Hz、1800HZ、
1900HZ, 2000Hz, therefore in the present embodiment, the working signal frequency setting for device of wirelessly taking on the sly is joined for abnormal work frequency
Number, is arranged to 100-800MHz and 900/1100/1200/1300/2400MHz.In other words, if the mobile terminal
One or more of 100-800MHz and 900/1100/1200/1300/2400MHz frequency parameter are captured, that is, judges to deposit
In the situation taken on the sly.
In summary, application of the present invention securely achieves method, system and mobile terminal and make use of iris recognition
Technology identifies owner, prevents the personal information of mobile terminal user from losing, more prevents other people from stealing a glance at, prevents from being taken on the sly, prevent
Secret file on mobile terminal is forwarded, and prevents chat content and secret picture of user etc. from causing diffusion etc. because of sectional drawing,
So as to preferably protect privacy of user.So the present invention effectively overcomes various shortcoming of the prior art and has height and produce
Industry value.
The above-described embodiments merely illustrate the principles and effects of the present invention, not for the limitation present invention.It is any ripe
Know the personage of this technology all can carry out modifications and changes under the spirit and scope without prejudice to the present invention to above-described embodiment.Cause
This, those of ordinary skill in the art is complete without departing from disclosed spirit and institute under technological thought such as
Into all equivalent modifications or change, should by the present invention claim be covered.