CN105897430A - User management method and system for intelligent terminal - Google Patents
User management method and system for intelligent terminal Download PDFInfo
- Publication number
- CN105897430A CN105897430A CN201610460014.0A CN201610460014A CN105897430A CN 105897430 A CN105897430 A CN 105897430A CN 201610460014 A CN201610460014 A CN 201610460014A CN 105897430 A CN105897430 A CN 105897430A
- Authority
- CN
- China
- Prior art keywords
- owner
- password
- user
- iris
- intelligent terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a user management method for an intelligent terminal, which comprises the steps of acquiring iris information of a user; judging whether the iris information is matched with pre-stored owner information, and if yes, unlocking and entering an owner mode; if no, acquiring a first password, matching the first password with a pre-stored owner password, and if yes, unlocking and entering the owner mode; and if no, acquiring a second password, matching the second password with a pre-stored guest password, and if yes, unlocking and entering a guest mode. Therefore, only when using a unique iris of an owner for carrying out matching identification unlocking, the user can enter the owner mode. When the user enters in other modes, such as a password cracking mode or a backdoor mode and the like, the user enters the additionally independent guest mode instead of the owner mode of the user at the moment, and in the mode, any information of the owner is invisible, so that absolute security of user data is ensured.
Description
Technical field
The present invention relates to field of computer technology, in particular, relate to the user of a kind of intelligent terminal
Management method and system.
Background technology
Along with developing rapidly of intelligent movable equipment, Android system smart mobile phone the most in recent years
Universal, Intelligent mobile equipment is closely bound up with the life of people, and people are even by oneself a lot of
People's information, business information are stored in the intelligent terminal of oneself, the life being greatly convenient for people to.
Meanwhile, should being also highly integrateable on smart machine by app, as chatted of the function being correlated with life
It software QQ, wechat etc., app application that payment software Alipay and each bank release voluntarily etc..
Owing to the work of all daily routines of user has been accepted in these application substantially, and the number in these activities
It is believed that breath is directed to the privacy of user substantially, this just determine user to the safety of smart machine,
Privacy requires drastically to raise, and the safety of intelligent terminal is had higher requirement by user.
Therefore, how to make the safer relieved use smart machine of user, become this area and need solution badly
Problem.
Summary of the invention
It is an object of the invention to provide user management method and the system of a kind of intelligent terminal, effectively carry
The safety of high terminal, is effectively kept completely separate the data of user, accesses and needs unique iris to know
Xie Suo not enter into associative mode operation, can more effectively ensure the personal secrets of terminal use.
It is an object of the invention to be achieved through the following technical solutions:
A kind of user management method of intelligent terminal, including:
Obtain the iris information of user;
Judge described iris information whether with the owner's information match prestored, if coupling, unlock and go forward side by side
Enter owner's pattern;
If not mating, obtain first password, and by described first password and the owner's password phase prestored
Join, if coupling, unlock and enter owner's pattern;
If not mating, obtain the second password, and by described second password and the passwords of visitors phase prestored
Join, if coupling, unlock and enter guest mode.
Preferably, described method farther includes: if described second password is with the passwords of visitors prestored not
Coupling, then intelligent terminal continues screen locking, and receives Password Input.
Preferably, described method farther includes: obtain owner's iris information, owner's password and visitor
Password, and described owner's iris information, owner's password and passwords of visitors are stored.
Preferably, described method farther includes: if intelligent terminal does not gets letter in Preset Time
Breath input, then intelligent terminal enters screen lock state, and receives iris information input.
Preferably, the data storage under described owner's pattern is at owner's memory module, described guest mode
Under data storage in visitor's memory module, described owner's memory module is the most only with visitor's memory module
Vertical.
The present invention discloses the Subscriber Management System of a kind of intelligent terminal, including:
Iris acquisition module, for obtaining the iris information of user;
First processing module, for judge described iris information whether with the owner's information match prestored,
If coupling, unlock and enter owner's pattern;
Second processing module, if for not mating, obtains first password, and by described first password with
The owner's code matches prestored, if coupling, unlocks and enters owner's pattern;
3rd processing module, if for not mating, obtains the second password, and will described second password and
The passwords of visitors prestored matches, if coupling, unlocks and enters guest mode.
Preferably, described system farther includes fourth processing module, if for described second password with
The passwords of visitors prestored is not mated, then intelligent terminal continues screen locking, and receives Password Input.
Preferably, described system farther includes information storage module, be used for obtaining owner's iris information,
Owner's password and passwords of visitors, and described owner's iris information, owner's password and passwords of visitors are stored.
Preferably, described system farther includes screen lock module, if for intelligent terminal at Preset Time
Inside do not get information input, then intelligent terminal enters screen lock state, and receives iris information input.
Preferably, described system farther includes: owner's memory module, under storage machine holotype
Data;
Visitor's memory module, for storing the data under guest mode;Wherein said owner's memory module
Separate with visitor's memory module.
Compared to existing technology, the invention have the advantages that in prior art, multiple user's typing rainbows
Film, after terminal unit screen locking, can be unlocked by any iris of typing, enters after unblock
Pattern is on all four, and all data are all exposed to all data pair of any user, i.e. terminal
Arbitrarily user is all visible.And the user management method of the intelligent terminal in the present invention includes: obtain
Take the iris information at family;Judge described iris information whether with the owner's information match prestored, if
Coupling then unlocks and enters owner's pattern;If not mating, obtain first password, and by described first close
Code and the owner's code matches prestored, if coupling, unlock and enter owner's pattern;If not mating,
Obtain the second password, and described second password is matched with the passwords of visitors prestored, if coupling, solve
Lock and enter guest mode.Thus first can judge to be owner according to iris information, if
It is that owner the most just can unlock and enters under owner's pattern, the data of owner can be accessed, and if
Judge it is not owner, then user will be pointed out to input first password, if user's input is first close
Code and the owner's code matches prestored, then can also unlock and enter under owner's pattern, and if
Judge it is not owner, then user cipher mistake, prompting user will be pointed out to input the second password, as
Really the second password of user's input matches with the passwords of visitors prestored, then will unlock entrance visiting
Under visitor's pattern, the resource under this visitor of intellectual access under guest mode, it is impossible to addressing machine is advocated peace, and other are visited
The resource of visitor, the most thus can improve safety and the privacy of intelligent terminal greatly, it is ensured that
The private data of each user will not be viewed by other people, makes the safer relieved use intelligence of user
Equipment.
Accompanying drawing explanation
Fig. 1 is the flow chart of the user management method of a kind of intelligent terminal of the embodiment of the present invention one;
Fig. 2 is the flow chart of the user management method of the another kind of intelligent terminal of the embodiment of the present invention one;
Fig. 3 is the schematic diagram of the Subscriber Management System of a kind of intelligent terminal of the embodiment of the present invention two.
Detailed description of the invention
It should be mentioned that, some exemplary enforcements before being discussed in greater detail exemplary embodiment
Example is described as process or the method described as flow chart.Although operations is described as by flow chart
The process of order, but many of which operation can be implemented concurrently, concomitantly or simultaneously.
Additionally, the order of operations can be rearranged.The most described process can be by
Terminate, it is also possible to have the additional step being not included in accompanying drawing.Described process can correspond to
Method, function, code, subroutine, subprogram etc..
Alleged " computer equipment " within a context, also referred to as " computer ", referring to can be by fortune
Row preset program or instruction perform the intelligence of the predetermined process process such as numerical computations and/or logical calculated
Electronic equipment, it can include processor and memorizer, processor perform to prestore in memory
Survival instruction performs predetermined process process, or is performed predetermined by hardware such as ASIC, FPGA, DSP
Processing procedure, or combined by said two devices and realize.Computer equipment include but not limited to server,
PC, notebook computer, panel computer, smart mobile phone etc..
Described computer equipment includes subscriber equipment and the network equipment.Wherein, described subscriber equipment or visitor
Family end includes but not limited to computer, smart mobile phone, PDA etc.;The described network equipment includes but not limited to
Single network server, multiple webserver composition server group or based on cloud computing (Cloud
Computing) the cloud being made up of a large amount of computers or the webserver, wherein, cloud computing is distribution
The one that formula calculates, the super virtual machine being made up of a group loosely-coupled computer collection.
Wherein, described computer equipment isolated operation can realize the present invention, it is possible to access network and by with
The interactive operation of other computer equipments in network realizes the present invention.Wherein, described computer sets
Standby residing network includes but not limited to the Internet, wide area network, Metropolitan Area Network (MAN), LAN, VPN
Deng.
It should be noted that described subscriber equipment, client, the network equipment and network etc. are only for example,
Other existing or that be likely to occur from now on computer equipment or networks are such as applicable to the present invention, also should
Within being included in scope, and it is incorporated herein with way of reference.
Method (some of them are illustrated by flow chart) discussed hereafter can pass through hardware, software,
Firmware, middleware, microcode, hardware description language or its combination in any are implemented.When with software,
When firmware, middleware or microcode are implemented, in order to implement program code or the code segment of necessary task
Can be stored in machine or computer-readable medium (such as storage medium).(one or more)
Processor can implement the task of necessity.
Concrete structure disclosed herein and function detail are the most representational, and are for describing
The purpose of the exemplary embodiment of the present invention.But the present invention can come concrete by many alternative forms
Realize, and be not interpreted as being limited only by the embodiments set forth herein.
Although it should be appreciated that here may have been used term " first ", " second " etc.
Describe unit, but these unit should not be limited by these terms.Only use these terms
Merely to a unit is made a distinction with another unit.For example, without departing substantially from exemplary
In the case of the scope of embodiment, first module can be referred to as second unit, and similarly second
Unit can be referred to as first module.Term "and/or" used herein above include one of them or more
Any and all combination of many listed associated item.
It should be appreciated that when a unit is referred to as " connection " or during " coupled " to another unit,
It can be connected or coupled to another unit described, or can there is temporary location.With this phase
Right, when a unit is referred to as " when being directly connected " or " directly coupled " to another unit, the most not
There is temporary location.The relation that is used for describing between unit should be explained in a comparable manner
Other words (such as " it is in ... between " compared to " it is directly in ... between ", " with ...
Neighbouring " compared to " with ... it is directly adjacent to " etc.).
Term used herein above is only used to describe specific embodiment and be not intended to limit exemplary reality
Execute example.Unless the context clearly dictates otherwise, singulative the most used herein above " ",
" one " alsos attempt to include plural number.It is to be further understood that term used herein above " includes "
And/or feature, integer, step, operation, unit and/or the assembly that " comprising ", regulation was stated
Exist, and do not preclude the presence or addition of other features one or more, integer, step, operation, list
Unit, assembly and/or a combination thereof.
It should further be mentioned that replace in implementations at some, the function/action being previously mentioned can be by
Occur according to being different from accompanying drawing the order indicated.For example, involved function/action is depended on,
The two width figures in succession illustrated can essentially substantially simultaneously perform or sometimes can be according to contrary suitable
Sequence performs.
The invention will be further described with preferred embodiment below in conjunction with the accompanying drawings.
Wherein, the method for the present embodiment is mainly realized by server and user side;Server is permissible
It is the computer equipment being connected with the Internet, or computer cluster etc..User side such as mobile phone, flat
Plates etc., or the equipment such as computer, have network function, can carry out with other-end setting up and is connected
Connect, but and be limited to above-mentioned several.
It should be noted that server and user side are only for example, other are existing or may go out from now on
The existing network equipment and client are such as applicable to the present invention, also should be included in scope with
In, and be incorporated herein with way of reference.It addition, the embodiment in the present invention is by way of example only, real
Execute and can also be able to combine between multiple embodiments with independent assortment, as long as can between example and embodiment
Realize the effect in the present invention.
Embodiment one
As it is shown in figure 1, the user management method of a kind of intelligent terminal disclosed in the present embodiment, including:
S101, the iris information of acquisition user;
S102, judge described iris information whether with the owner's information match prestored, if coupling, solve
Lock and enter owner's pattern;
If S103 does not mates, obtain first password, and by close with the owner prestored for described first password
Code-phase is mated, if coupling, unlocks and enter owner's pattern;
If S104 does not mates, obtain the second password, and by close with the visitor prestored for described second password
Code-phase is mated, if coupling, unlocks and enters guest mode.
In prior art, multiple user's typing irises, after terminal unit screen locking, can be by typing
Arbitrarily iris is unlocked, and the pattern entered after unblock is on all four, and all data are all exposed to
Arbitrarily all data of user, i.e. terminal are all visible to any user.And in the present invention
The user management method of intelligent terminal includes: obtain the iris information of user;Judge described iris information
Whether with the owner's information match prestored, if coupling, unlock and enter owner's pattern;If not mating
Then obtain first password, and by described first password and the owner's code matches prestored, if coupling,
Unlock and enter owner's pattern;If not mating, obtain the second password, and by described second password with pre-
The passwords of visitors deposited matches, if coupling, unlocks and enters guest mode.Thus can first root
Judge to be owner according to iris information, if owner the most just can unlock enters into owner's pattern
Under, the data of owner can be accessed, and if it is determined that be not owner, then user will be pointed out to input
First password, if the first password of user's input and the owner's code matches prestored, then also might be used
Enter under owner's pattern to unlock, and if it is determined that be not owner, then user cipher will be pointed out
Mistake, prompting user inputs the second password, if the second password of user's input is close with the visitor prestored
Code-phase is mated, then will unlock and enter under guest mode, this visitor of intellectual access under guest mode
Under resource, it is impossible to addressing machine is advocated peace the resource of other visitors, the most thus can improve greatly
The safety of intelligent terminal and privacy, it is ensured that the private data of each user will not be checked by other people
Arrive, make the safer relieved use smart machine of user.And if the second password of user's input is the most not
Right, system will point out user cipher mistake, and receives Password Input, and hereafter user can continue
Input password, according to the password of user's input, enters into other guest mode, or enters into machine
Holotype etc..Intelligent terminal can be mobile phone, flat board, it is also possible to is embedded type terminal equipment, and
Hold iris identification and comprise the equipment of multi-user's function, PDA etc.
In order to make user's oneself intelligent movable equipment of safer relieved use, the invention provides one
Intelligent terminal is based on iris technology, and after arranging lock, only user uses owner's unique iris match cognization
Unlock, the user's AD HOC that could enter, carry out the scheme of data access.User under this pattern
Data overall safety is independent, as long as user does not operate equipment within the time set, equipment automatically into
Locking-in state.And enter by other means, such as password cracking, or back door etc., now enter
It is not owner's pattern of user, is the most independent guest mode, any letter of owner in such a mode
Breath is all sightless, thus ensures being perfectly safe of user data.
This method in the present embodiment can also allow user when being inconvenient to use iris identification to unlock,
Password Input can also be used to be unlocked and enter under owner's pattern, so can improve this side
Method and the scope of application of system, allow user use convenient.
Iris recognition technology is to carry out identification based on the iris in eyes.The eye structure of people is by consolidating
The part composition such as film, iris, pupil crystalline lens, retina.Iris is in black pupil and white
Annular formations between sclera, it includes the most interlaced speckle, filament, crown, bar
The minutia of stricture of vagina, crypts etc..And iris is after prenatal development stage is formed, go through at whole life
In journey constant by being to maintain.These features determine the uniqueness of iris feature, also determine simultaneously
The uniqueness of identification.Therefore, it can the iris feature of eyes as everyone identification
Object.Iris identification is through contrasting the similarity between iris image feature to determine the body of people
Part.In general the process of iris recognition technology comprises: 1. iris image acquisition, uses and specifically takes the photograph
As the whole eye of people is shot by equipment, and by the image transmitting that photographs to iris authentication system
Image semantic classification software.2. Image semantic classification, is handled as follows the iris image got,
It is made to meet the demand extracting iris feature.Iris Location: determine that inner circle, cylindrical and conic section exist
Position in image.Wherein, inner circle is the border of iris and pupil, and cylindrical is the limit of iris and sclera
Boundary, conic section is the border of iris and upper lower eyelid.Iris image normalization: by the rainbow in image
Film size, is adjusted to the fixed dimension that identification system is arranged.Image enhaucament: for the figure after normalization
Picture, carries out brightness, contrast and smoothness etc. reason, improves the discrimination of iris information in image.3. special
Levy extraction, use specific algorithm to extract the characteristic point needed for iris identification from iris image, and
It is encoded.4. characteristic matching, the feature coding that feature extraction is obtained and the rainbow in data base
Film image feature coding mates one by one, it may be judged whether for identical iris, thus reaches the mesh of identification
's.Iris recognition technology has been obtained for using widely now.
According to one of them example, described method farther includes: if described second password with prestore
Passwords of visitors is not mated, then intelligent terminal continues screen locking, and receives Password Input.
Thus can be the second password bad of user's input when, intelligent terminal will not unlock,
But intelligent terminal still may proceed to receive user Password Input, and can according to input password,
User is allowed to enter under other guest mode, if or password and the first password phase of user's input
Join, it is also possible to enter under owner's pattern, so can allow user when input error, follow-up
Can also enter into when inputting correct under the guest mode of owner's pattern or correspondence.
According to other in which example, described method farther includes: obtain owner's iris information, machine
Main password and passwords of visitors, and described owner's iris information, owner's password and passwords of visitors are stored.
Thus can shift to an earlier date the information such as the main iris information of record machine, owner's password and passwords of visitors, make
Typing is crossed the user of these information and can be unlocked and enter under corresponding pattern, and without typing
User just cannot unlock intelligent terminal, thus ensure safety and the privacy of subscriber data, additionally
Corresponding as required multiple passwords of visitors can also be set so that it is he visitor can unlock intelligent terminal
And enter under the pattern of correspondence, the data stored between certain visitor and visitor is also separate,
Data between them cannot be checked each other, thus ensures the privacy of user.
According to other in which example, described method farther includes: if intelligent terminal is at Preset Time
Inside do not get information input, then intelligent terminal enters screen lock state, and receives iris information input.
So in the case of user does not operates for a long time, intelligent terminal's screen locking so can will be protected use
The safety of family data, Preset Time can be 1 minute, 5 minutes, it is also possible to 10 seconds, 30 seconds etc.
Time.
According to other in which example, the data storage under described owner's pattern in owner's memory module,
Data storage under described guest mode is deposited with visitor in visitor's memory module, described owner's memory module
Storage module is separate.Thus can ensure that safety and the privacy of data between user.Have
The safety of the raising terminal of effect, is effectively kept completely separate the data of user, accesses and needs uniquely
Iris identification unlocks and enters into associative mode operation, can more effectively ensure the personal secrets of terminal use.
As in figure 2 it is shown, the present embodiment takes iris identification to add multi-user mode.Obtain the iris of user
Information;Judge described iris information whether with the owner's information match prestored, if coupling, unlock also
Enter owner's pattern;If not mating, obtain first password, and by described first password and the machine prestored
Main code matches, if coupling, unlocks and enters owner's pattern;If not mating, obtain the second password,
And described second password is matched with the passwords of visitors prestored, if coupling, unlock and enter visitor's mould
Formula.In the present embodiment, owner or other users, unique iris screen locking password can be set,
User enters oneself AD HOC and is required for using iris to carry out unique match.Wherein this kind of multi-user's mould
Formula, each user data is stored separately in an independent subregion, and this block region in smart machine
It is sightless relative to other users, after user unlocks, it can be seen that oneself data all, and right
On this smart machine, the data of other users are the most sightless, it is impossible to operate with any other and use
The data at family.Terminal unit such as it is mounted with that wechat is applied, after user A uses terminal to log in, claps
Generate some data according to chat etc., and when user B uses the application of terminal wechat to log in, can't see and appoint
User's login record or the account information data etc. of use before what.This scheme user can be arranged on
Do not operate smart machine in regular hour, automatically into screen locking mode, as needed to enter, need again
Carrying out the unblock of correspondence, different user iris unlocks and enters oneself AD HOC, is not to be returned directly to
State before screen locking before, thoroughly ensures secure user data.And go out active or evil in terminal
Meaning user wants to be forced into situation, without unique iris identification of typing, even if cracking entrance, entrance
It is not owner's pattern, can't see any user data, thus guarantee data security.
Embodiment two
As it is shown on figure 3, the present embodiment discloses the Subscriber Management System of a kind of intelligent terminal, including:
Iris acquisition module 201, for obtaining the iris information of user;
First processing module 202, for judge described iris information whether with the owner's information phase prestored
Coupling, if coupling, unlocks and enters owner's pattern;
Second processing module 203, if for not mating, obtains first password, and by described first close
Code and the owner's code matches prestored, if coupling, unlock and enter owner's pattern;
3rd processing module 204, if for not mating, obtains the second password, and by described second close
Code matches with the passwords of visitors prestored, if coupling, unlocks and enters guest mode.
Thus first can judge to be owner according to iris information, if owner the most just may be used
Enter under owner's pattern to unlock, the data of owner can be accessed, and if it is determined that be not owner,
User so will be pointed out to input first password, if the first password of user's input and the owner prestored
Code matches, then can also unlock and enter under owner's pattern, and if it is determined that be not owner,
So will point out user cipher mistake, prompting user inputs the second password, if the of user's input
Two passwords match with the passwords of visitors prestored, then will unlock and enter under guest mode, visitor
Resource under this visitor of intellectual access under pattern, it is impossible to addressing machine is advocated peace the resource of other visitors, therefore
Thus can improve safety and the privacy of intelligent terminal greatly, it is ensured that the individual of each user
Data will not be viewed by other people, makes the safer relieved use smart machine of user.And if used
Second password of family input is the most right, and system will point out user cipher mistake, and it is defeated to receive password
Entering, hereafter user can continue with password, according to the password of user's input, enters into other visit
Visitor's pattern, or enter into owner's pattern etc..
This method in the present embodiment can also allow user when being inconvenient to use iris identification to unlock,
Password Input can also be used to be unlocked and enter under owner's pattern, so can improve this side
Method and the scope of application of system, allow user use convenient.
According to one of them example, described system farther includes fourth processing module, if for described
Second password does not mates with the passwords of visitors prestored, then intelligent terminal continues screen locking, and it is defeated to receive password
Enter.
Thus can be the second password bad of user's input when, intelligent terminal will not unlock,
But intelligent terminal still may proceed to receive user Password Input, and can according to input password,
User is allowed to enter under other guest mode, if or password and the first password phase of user's input
Join, it is also possible to enter under owner's pattern, so can allow user when input error, follow-up
Can also enter into when inputting correct under the guest mode of owner's pattern or correspondence.
According to other in which example, described system farther includes information storage module, is used for obtaining
Owner's iris information, owner's password and passwords of visitors, and by described owner's iris information, owner's password
Store with passwords of visitors.
Thus can shift to an earlier date the information such as the main iris information of record machine, owner's password and passwords of visitors, make
Typing is crossed the user of these information and can be unlocked and enter under corresponding pattern, and without typing
User just cannot unlock intelligent terminal, thus ensure safety and the privacy of subscriber data, additionally
Corresponding as required multiple passwords of visitors can also be set so that it is he visitor can unlock intelligent terminal
And enter under the pattern of correspondence, the data stored between certain visitor and visitor is also separate,
Data between them cannot be checked each other, thus ensures the privacy of user.
According to other in which example, described system farther includes screen lock module, if for intelligence eventually
End does not gets information input in Preset Time, then intelligent terminal enters screen lock state, and receives rainbow
Film information inputs.So will be by intelligent terminal's screen locking in the case of user does not operates for a long time, this
Sample can protect the safety of subscriber data, and Preset Time can be 1 minute, 5 minutes, it is also possible to
10 seconds, the time such as 30 seconds.
Preferably, described system farther includes: owner's memory module, under storage machine holotype
Data;
Visitor's memory module, for storing the data under guest mode;Wherein said owner's memory module
Separate with visitor's memory module.
Thus can ensure that safety and the privacy of data between user.Effectively improve terminal
Safety, effectively the data of user are kept completely separate, access need unique iris identification unlock
Enter into associative mode operation, can more effectively ensure the personal secrets of terminal use.
Above content is that to combine concrete preferred implementation made for the present invention the most specifically
Bright, it is impossible to assert the present invention be embodied as be confined to these explanations.For technology belonging to the present invention
For the those of ordinary skill in field, without departing from the inventive concept of the premise, it is also possible to if making
Dry simple deduction or replace, all should be considered as belonging to protection scope of the present invention.
Claims (10)
1. the user management method of an intelligent terminal, it is characterised in that including:
Obtain the iris information of user;
Judge described iris information whether with the owner's information match prestored, if coupling, unlock and go forward side by side
Enter owner's pattern;
If not mating, obtain first password, and by described first password and the owner's password phase prestored
Join, if coupling, unlock and enter owner's pattern;
If not mating, obtain the second password, and by described second password and the passwords of visitors phase prestored
Join, if coupling, unlock and enter guest mode.
Management method the most according to claim 1, it is characterised in that described method is wrapped further
Include: if described second password does not mates with the passwords of visitors prestored, then intelligent terminal continues screen locking, and
Receive Password Input.
Management method the most according to claim 1, it is characterised in that described method is wrapped further
Include: obtain owner's iris information, owner's password and passwords of visitors, and by described owner's iris information,
Owner's password and passwords of visitors store.
Management method the most according to claim 1, it is characterised in that described method is wrapped further
Include: if intelligent terminal does not gets information input in Preset Time, then intelligent terminal enters screen locking shape
State, and receive iris information input.
Management method the most according to claim 1, it is characterised in that under described owner's pattern
Data storage data storage under owner's memory module, described guest mode in visitor's memory module,
Described owner's memory module is separate with visitor's memory module.
6. the Subscriber Management System of an intelligent terminal, it is characterised in that including:
Iris acquisition module, for obtaining the iris information of user;
First processing module, for judge described iris information whether with the owner's information match prestored,
If coupling, unlock and enter owner's pattern;
Second processing module, if for not mating, obtains first password, and by described first password with
The owner's code matches prestored, if coupling, unlocks and enters owner's pattern;
3rd processing module, if for not mating, obtains the second password, and will described second password and
The passwords of visitors prestored matches, if coupling, unlocks and enters guest mode.
Management system the most according to claim 6, it is characterised in that described system is wrapped further
Include fourth processing module, if not mating with the passwords of visitors prestored for described second password, then intelligence
Terminal continues screen locking, and receives Password Input.
Management system the most according to claim 6, it is characterised in that described system is wrapped further
Include information storage module, be used for obtaining owner's iris information, owner's password and passwords of visitors, and by institute
State owner's iris information, owner's password and passwords of visitors to store.
Management system the most according to claim 6, it is characterised in that described system is wrapped further
Including screen lock module, if not getting information input in Preset Time for intelligent terminal, then intelligence is eventually
End enters screen lock state, and receives iris information input.
Management system the most according to claim 6, it is characterised in that described system is further
Including: owner's memory module, the data under storage machine holotype;
Visitor's memory module, for storing the data under guest mode;Wherein said owner's memory module
Separate with visitor's memory module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610460014.0A CN105897430A (en) | 2016-06-22 | 2016-06-22 | User management method and system for intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610460014.0A CN105897430A (en) | 2016-06-22 | 2016-06-22 | User management method and system for intelligent terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105897430A true CN105897430A (en) | 2016-08-24 |
Family
ID=56718084
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610460014.0A Pending CN105897430A (en) | 2016-06-22 | 2016-06-22 | User management method and system for intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105897430A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503514A (en) * | 2016-09-28 | 2017-03-15 | 北京用友政务软件有限公司 | Unlocking method and system based on the electric terminal equipment of iris identification |
CN106506786A (en) * | 2016-12-27 | 2017-03-15 | 努比亚技术有限公司 | The terminal and method of protection user privacy information |
CN106529346A (en) * | 2016-10-28 | 2017-03-22 | 努比亚技术有限公司 | Terminal privacy protecting method and terminal |
CN106788992A (en) * | 2016-12-05 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information decryption method and device |
CN106778154A (en) * | 2016-11-15 | 2017-05-31 | 深圳天珑无线科技有限公司 | Mobile terminal and its unlocking method |
CN107172276A (en) * | 2017-04-28 | 2017-09-15 | 努比亚技术有限公司 | A kind of terminal method for retrieving, terminal and computer-readable recording medium |
CN107577931A (en) * | 2017-08-29 | 2018-01-12 | 广东欧珀移动通信有限公司 | Authority control method and related product |
CN107808086A (en) * | 2017-10-31 | 2018-03-16 | 广东小天才科技有限公司 | A kind of unlocking method of intelligent terminal, device and equipment |
CN107862190A (en) * | 2017-10-26 | 2018-03-30 | 广东欧珀移动通信有限公司 | Based reminding method and Related product |
CN108268763A (en) * | 2018-02-13 | 2018-07-10 | 广东欧珀移动通信有限公司 | terminal control method, device, storage medium and terminal |
CN109145575A (en) * | 2017-06-19 | 2019-01-04 | 珠海格力电器股份有限公司 | A kind of distribution method and device using permission |
CN109257481A (en) * | 2018-07-26 | 2019-01-22 | 深圳市沃特沃德股份有限公司 | The method and device of multi-user operation control |
CN112115444A (en) * | 2019-06-21 | 2020-12-22 | 华为技术有限公司 | Unlocking method and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065823A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | User mode control method and user mode control system based on iris recognition technology for mobile terminal |
CN105117629A (en) * | 2015-08-21 | 2015-12-02 | 京东方科技集团股份有限公司 | Electronic device control method and apparatus, and electronic device |
-
2016
- 2016-06-22 CN CN201610460014.0A patent/CN105897430A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065823A (en) * | 2014-06-30 | 2014-09-24 | 惠州Tcl移动通信有限公司 | User mode control method and user mode control system based on iris recognition technology for mobile terminal |
CN105117629A (en) * | 2015-08-21 | 2015-12-02 | 京东方科技集团股份有限公司 | Electronic device control method and apparatus, and electronic device |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503514A (en) * | 2016-09-28 | 2017-03-15 | 北京用友政务软件有限公司 | Unlocking method and system based on the electric terminal equipment of iris identification |
CN106529346B (en) * | 2016-10-28 | 2020-02-14 | 企事通集团有限公司 | Method for protecting terminal privacy and terminal |
CN106529346A (en) * | 2016-10-28 | 2017-03-22 | 努比亚技术有限公司 | Terminal privacy protecting method and terminal |
CN106778154A (en) * | 2016-11-15 | 2017-05-31 | 深圳天珑无线科技有限公司 | Mobile terminal and its unlocking method |
CN106788992A (en) * | 2016-12-05 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information decryption method and device |
CN106506786A (en) * | 2016-12-27 | 2017-03-15 | 努比亚技术有限公司 | The terminal and method of protection user privacy information |
CN107172276A (en) * | 2017-04-28 | 2017-09-15 | 努比亚技术有限公司 | A kind of terminal method for retrieving, terminal and computer-readable recording medium |
US11372961B2 (en) | 2017-06-19 | 2022-06-28 | Gree Electric Appliances (Wuhan) Co., Ltd | Method and device for assigning application usage permission |
CN109145575A (en) * | 2017-06-19 | 2019-01-04 | 珠海格力电器股份有限公司 | A kind of distribution method and device using permission |
CN107577931A (en) * | 2017-08-29 | 2018-01-12 | 广东欧珀移动通信有限公司 | Authority control method and related product |
CN107862190A (en) * | 2017-10-26 | 2018-03-30 | 广东欧珀移动通信有限公司 | Based reminding method and Related product |
CN107808086A (en) * | 2017-10-31 | 2018-03-16 | 广东小天才科技有限公司 | A kind of unlocking method of intelligent terminal, device and equipment |
CN108268763A (en) * | 2018-02-13 | 2018-07-10 | 广东欧珀移动通信有限公司 | terminal control method, device, storage medium and terminal |
CN109257481A (en) * | 2018-07-26 | 2019-01-22 | 深圳市沃特沃德股份有限公司 | The method and device of multi-user operation control |
CN112115444A (en) * | 2019-06-21 | 2020-12-22 | 华为技术有限公司 | Unlocking method and electronic equipment |
WO2020253804A1 (en) * | 2019-06-21 | 2020-12-24 | 华为技术有限公司 | Unlocking method and electronic device |
CN112115444B (en) * | 2019-06-21 | 2022-08-26 | 华为技术有限公司 | Unlocking method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105897430A (en) | User management method and system for intelligent terminal | |
US10867199B2 (en) | Data update method for face-to-unlock authentication, authentication device, and non-volatile storage medium | |
RU2718226C2 (en) | Biometric data safe handling systems and methods | |
KR101242390B1 (en) | Method, apparatus and computer-readable recording medium for identifying user | |
CN107924436A (en) | Control is accessed using the electronic device of biological identification technology | |
US9258301B2 (en) | Advanced authentication techniques | |
US9544306B2 (en) | Attempted security breach remediation | |
DE202017006897U1 (en) | Systems for providing a universal decentralized solution for verifying users with cross-verification features | |
WO2013100697A1 (en) | Method, apparatus, and computer-readable recording medium for authenticating a user | |
CN103593594A (en) | System and method for providing secure access to an electronic device using facial biometric identification and screen gesture | |
CN106023363A (en) | Identity verification method and system | |
CN105893817A (en) | Mobile device application permission management method and system | |
CN105320871A (en) | Screen unlocking method and screen unlocking apparatus | |
JP6300705B2 (en) | Authentication management method by device cooperation, information processing device, wearable device, computer program | |
CN106126994A (en) | The user management method of a kind of mobile terminal and system | |
CN105956569A (en) | Finger vein identification based identity authentication platform | |
WO2016187940A1 (en) | Information protecting method, mobile terminal and computer storage medium | |
WO2017067507A1 (en) | Method and device for determining a use permission of an apparatus | |
CN107368722A (en) | Verification method, computer-readable recording medium, the mobile terminal of biometric image | |
CN105869255A (en) | Intelligent access control method and system based on mobile terminal | |
CN106650361A (en) | Unblocking method and device | |
CN103269481A (en) | Method and system for encrypting and protecting procedure or file of portable electronic equipment | |
CN112699354A (en) | User authority management method and terminal equipment | |
CN107395369A (en) | Towards mobile Internet from the authentication method of carrying device, access method and system | |
CN104376240A (en) | Method for processing information and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160824 |