CN105897430A - User management method and system for intelligent terminal - Google Patents

User management method and system for intelligent terminal Download PDF

Info

Publication number
CN105897430A
CN105897430A CN201610460014.0A CN201610460014A CN105897430A CN 105897430 A CN105897430 A CN 105897430A CN 201610460014 A CN201610460014 A CN 201610460014A CN 105897430 A CN105897430 A CN 105897430A
Authority
CN
China
Prior art keywords
owner
password
user
iris
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610460014.0A
Other languages
Chinese (zh)
Inventor
蒋杰
赵飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHEJIANG DEJING ELECTRONICS TECHNOLOGY CO LTD
Original Assignee
ZHEJIANG DEJING ELECTRONICS TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHEJIANG DEJING ELECTRONICS TECHNOLOGY CO LTD filed Critical ZHEJIANG DEJING ELECTRONICS TECHNOLOGY CO LTD
Priority to CN201610460014.0A priority Critical patent/CN105897430A/en
Publication of CN105897430A publication Critical patent/CN105897430A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a user management method for an intelligent terminal, which comprises the steps of acquiring iris information of a user; judging whether the iris information is matched with pre-stored owner information, and if yes, unlocking and entering an owner mode; if no, acquiring a first password, matching the first password with a pre-stored owner password, and if yes, unlocking and entering the owner mode; and if no, acquiring a second password, matching the second password with a pre-stored guest password, and if yes, unlocking and entering a guest mode. Therefore, only when using a unique iris of an owner for carrying out matching identification unlocking, the user can enter the owner mode. When the user enters in other modes, such as a password cracking mode or a backdoor mode and the like, the user enters the additionally independent guest mode instead of the owner mode of the user at the moment, and in the mode, any information of the owner is invisible, so that absolute security of user data is ensured.

Description

The user management method of a kind of intelligent terminal and system
Technical field
The present invention relates to field of computer technology, in particular, relate to the user of a kind of intelligent terminal Management method and system.
Background technology
Along with developing rapidly of intelligent movable equipment, Android system smart mobile phone the most in recent years Universal, Intelligent mobile equipment is closely bound up with the life of people, and people are even by oneself a lot of People's information, business information are stored in the intelligent terminal of oneself, the life being greatly convenient for people to.
Meanwhile, should being also highly integrateable on smart machine by app, as chatted of the function being correlated with life It software QQ, wechat etc., app application that payment software Alipay and each bank release voluntarily etc.. Owing to the work of all daily routines of user has been accepted in these application substantially, and the number in these activities It is believed that breath is directed to the privacy of user substantially, this just determine user to the safety of smart machine, Privacy requires drastically to raise, and the safety of intelligent terminal is had higher requirement by user.
Therefore, how to make the safer relieved use smart machine of user, become this area and need solution badly Problem.
Summary of the invention
It is an object of the invention to provide user management method and the system of a kind of intelligent terminal, effectively carry The safety of high terminal, is effectively kept completely separate the data of user, accesses and needs unique iris to know Xie Suo not enter into associative mode operation, can more effectively ensure the personal secrets of terminal use.
It is an object of the invention to be achieved through the following technical solutions:
A kind of user management method of intelligent terminal, including:
Obtain the iris information of user;
Judge described iris information whether with the owner's information match prestored, if coupling, unlock and go forward side by side Enter owner's pattern;
If not mating, obtain first password, and by described first password and the owner's password phase prestored Join, if coupling, unlock and enter owner's pattern;
If not mating, obtain the second password, and by described second password and the passwords of visitors phase prestored Join, if coupling, unlock and enter guest mode.
Preferably, described method farther includes: if described second password is with the passwords of visitors prestored not Coupling, then intelligent terminal continues screen locking, and receives Password Input.
Preferably, described method farther includes: obtain owner's iris information, owner's password and visitor Password, and described owner's iris information, owner's password and passwords of visitors are stored.
Preferably, described method farther includes: if intelligent terminal does not gets letter in Preset Time Breath input, then intelligent terminal enters screen lock state, and receives iris information input.
Preferably, the data storage under described owner's pattern is at owner's memory module, described guest mode Under data storage in visitor's memory module, described owner's memory module is the most only with visitor's memory module Vertical.
The present invention discloses the Subscriber Management System of a kind of intelligent terminal, including:
Iris acquisition module, for obtaining the iris information of user;
First processing module, for judge described iris information whether with the owner's information match prestored, If coupling, unlock and enter owner's pattern;
Second processing module, if for not mating, obtains first password, and by described first password with The owner's code matches prestored, if coupling, unlocks and enters owner's pattern;
3rd processing module, if for not mating, obtains the second password, and will described second password and The passwords of visitors prestored matches, if coupling, unlocks and enters guest mode.
Preferably, described system farther includes fourth processing module, if for described second password with The passwords of visitors prestored is not mated, then intelligent terminal continues screen locking, and receives Password Input.
Preferably, described system farther includes information storage module, be used for obtaining owner's iris information, Owner's password and passwords of visitors, and described owner's iris information, owner's password and passwords of visitors are stored.
Preferably, described system farther includes screen lock module, if for intelligent terminal at Preset Time Inside do not get information input, then intelligent terminal enters screen lock state, and receives iris information input.
Preferably, described system farther includes: owner's memory module, under storage machine holotype Data;
Visitor's memory module, for storing the data under guest mode;Wherein said owner's memory module Separate with visitor's memory module.
Compared to existing technology, the invention have the advantages that in prior art, multiple user's typing rainbows Film, after terminal unit screen locking, can be unlocked by any iris of typing, enters after unblock Pattern is on all four, and all data are all exposed to all data pair of any user, i.e. terminal Arbitrarily user is all visible.And the user management method of the intelligent terminal in the present invention includes: obtain Take the iris information at family;Judge described iris information whether with the owner's information match prestored, if Coupling then unlocks and enters owner's pattern;If not mating, obtain first password, and by described first close Code and the owner's code matches prestored, if coupling, unlock and enter owner's pattern;If not mating, Obtain the second password, and described second password is matched with the passwords of visitors prestored, if coupling, solve Lock and enter guest mode.Thus first can judge to be owner according to iris information, if It is that owner the most just can unlock and enters under owner's pattern, the data of owner can be accessed, and if Judge it is not owner, then user will be pointed out to input first password, if user's input is first close Code and the owner's code matches prestored, then can also unlock and enter under owner's pattern, and if Judge it is not owner, then user cipher mistake, prompting user will be pointed out to input the second password, as Really the second password of user's input matches with the passwords of visitors prestored, then will unlock entrance visiting Under visitor's pattern, the resource under this visitor of intellectual access under guest mode, it is impossible to addressing machine is advocated peace, and other are visited The resource of visitor, the most thus can improve safety and the privacy of intelligent terminal greatly, it is ensured that The private data of each user will not be viewed by other people, makes the safer relieved use intelligence of user Equipment.
Accompanying drawing explanation
Fig. 1 is the flow chart of the user management method of a kind of intelligent terminal of the embodiment of the present invention one;
Fig. 2 is the flow chart of the user management method of the another kind of intelligent terminal of the embodiment of the present invention one;
Fig. 3 is the schematic diagram of the Subscriber Management System of a kind of intelligent terminal of the embodiment of the present invention two.
Detailed description of the invention
It should be mentioned that, some exemplary enforcements before being discussed in greater detail exemplary embodiment Example is described as process or the method described as flow chart.Although operations is described as by flow chart The process of order, but many of which operation can be implemented concurrently, concomitantly or simultaneously. Additionally, the order of operations can be rearranged.The most described process can be by Terminate, it is also possible to have the additional step being not included in accompanying drawing.Described process can correspond to Method, function, code, subroutine, subprogram etc..
Alleged " computer equipment " within a context, also referred to as " computer ", referring to can be by fortune Row preset program or instruction perform the intelligence of the predetermined process process such as numerical computations and/or logical calculated Electronic equipment, it can include processor and memorizer, processor perform to prestore in memory Survival instruction performs predetermined process process, or is performed predetermined by hardware such as ASIC, FPGA, DSP Processing procedure, or combined by said two devices and realize.Computer equipment include but not limited to server, PC, notebook computer, panel computer, smart mobile phone etc..
Described computer equipment includes subscriber equipment and the network equipment.Wherein, described subscriber equipment or visitor Family end includes but not limited to computer, smart mobile phone, PDA etc.;The described network equipment includes but not limited to Single network server, multiple webserver composition server group or based on cloud computing (Cloud Computing) the cloud being made up of a large amount of computers or the webserver, wherein, cloud computing is distribution The one that formula calculates, the super virtual machine being made up of a group loosely-coupled computer collection. Wherein, described computer equipment isolated operation can realize the present invention, it is possible to access network and by with The interactive operation of other computer equipments in network realizes the present invention.Wherein, described computer sets Standby residing network includes but not limited to the Internet, wide area network, Metropolitan Area Network (MAN), LAN, VPN Deng.
It should be noted that described subscriber equipment, client, the network equipment and network etc. are only for example, Other existing or that be likely to occur from now on computer equipment or networks are such as applicable to the present invention, also should Within being included in scope, and it is incorporated herein with way of reference.
Method (some of them are illustrated by flow chart) discussed hereafter can pass through hardware, software, Firmware, middleware, microcode, hardware description language or its combination in any are implemented.When with software, When firmware, middleware or microcode are implemented, in order to implement program code or the code segment of necessary task Can be stored in machine or computer-readable medium (such as storage medium).(one or more) Processor can implement the task of necessity.
Concrete structure disclosed herein and function detail are the most representational, and are for describing The purpose of the exemplary embodiment of the present invention.But the present invention can come concrete by many alternative forms Realize, and be not interpreted as being limited only by the embodiments set forth herein.
Although it should be appreciated that here may have been used term " first ", " second " etc. Describe unit, but these unit should not be limited by these terms.Only use these terms Merely to a unit is made a distinction with another unit.For example, without departing substantially from exemplary In the case of the scope of embodiment, first module can be referred to as second unit, and similarly second Unit can be referred to as first module.Term "and/or" used herein above include one of them or more Any and all combination of many listed associated item.
It should be appreciated that when a unit is referred to as " connection " or during " coupled " to another unit, It can be connected or coupled to another unit described, or can there is temporary location.With this phase Right, when a unit is referred to as " when being directly connected " or " directly coupled " to another unit, the most not There is temporary location.The relation that is used for describing between unit should be explained in a comparable manner Other words (such as " it is in ... between " compared to " it is directly in ... between ", " with ... Neighbouring " compared to " with ... it is directly adjacent to " etc.).
Term used herein above is only used to describe specific embodiment and be not intended to limit exemplary reality Execute example.Unless the context clearly dictates otherwise, singulative the most used herein above " ", " one " alsos attempt to include plural number.It is to be further understood that term used herein above " includes " And/or feature, integer, step, operation, unit and/or the assembly that " comprising ", regulation was stated Exist, and do not preclude the presence or addition of other features one or more, integer, step, operation, list Unit, assembly and/or a combination thereof.
It should further be mentioned that replace in implementations at some, the function/action being previously mentioned can be by Occur according to being different from accompanying drawing the order indicated.For example, involved function/action is depended on, The two width figures in succession illustrated can essentially substantially simultaneously perform or sometimes can be according to contrary suitable Sequence performs.
The invention will be further described with preferred embodiment below in conjunction with the accompanying drawings.
Wherein, the method for the present embodiment is mainly realized by server and user side;Server is permissible It is the computer equipment being connected with the Internet, or computer cluster etc..User side such as mobile phone, flat Plates etc., or the equipment such as computer, have network function, can carry out with other-end setting up and is connected Connect, but and be limited to above-mentioned several.
It should be noted that server and user side are only for example, other are existing or may go out from now on The existing network equipment and client are such as applicable to the present invention, also should be included in scope with In, and be incorporated herein with way of reference.It addition, the embodiment in the present invention is by way of example only, real Execute and can also be able to combine between multiple embodiments with independent assortment, as long as can between example and embodiment Realize the effect in the present invention.
Embodiment one
As it is shown in figure 1, the user management method of a kind of intelligent terminal disclosed in the present embodiment, including:
S101, the iris information of acquisition user;
S102, judge described iris information whether with the owner's information match prestored, if coupling, solve Lock and enter owner's pattern;
If S103 does not mates, obtain first password, and by close with the owner prestored for described first password Code-phase is mated, if coupling, unlocks and enter owner's pattern;
If S104 does not mates, obtain the second password, and by close with the visitor prestored for described second password Code-phase is mated, if coupling, unlocks and enters guest mode.
In prior art, multiple user's typing irises, after terminal unit screen locking, can be by typing Arbitrarily iris is unlocked, and the pattern entered after unblock is on all four, and all data are all exposed to Arbitrarily all data of user, i.e. terminal are all visible to any user.And in the present invention The user management method of intelligent terminal includes: obtain the iris information of user;Judge described iris information Whether with the owner's information match prestored, if coupling, unlock and enter owner's pattern;If not mating Then obtain first password, and by described first password and the owner's code matches prestored, if coupling, Unlock and enter owner's pattern;If not mating, obtain the second password, and by described second password with pre- The passwords of visitors deposited matches, if coupling, unlocks and enters guest mode.Thus can first root Judge to be owner according to iris information, if owner the most just can unlock enters into owner's pattern Under, the data of owner can be accessed, and if it is determined that be not owner, then user will be pointed out to input First password, if the first password of user's input and the owner's code matches prestored, then also might be used Enter under owner's pattern to unlock, and if it is determined that be not owner, then user cipher will be pointed out Mistake, prompting user inputs the second password, if the second password of user's input is close with the visitor prestored Code-phase is mated, then will unlock and enter under guest mode, this visitor of intellectual access under guest mode Under resource, it is impossible to addressing machine is advocated peace the resource of other visitors, the most thus can improve greatly The safety of intelligent terminal and privacy, it is ensured that the private data of each user will not be checked by other people Arrive, make the safer relieved use smart machine of user.And if the second password of user's input is the most not Right, system will point out user cipher mistake, and receives Password Input, and hereafter user can continue Input password, according to the password of user's input, enters into other guest mode, or enters into machine Holotype etc..Intelligent terminal can be mobile phone, flat board, it is also possible to is embedded type terminal equipment, and Hold iris identification and comprise the equipment of multi-user's function, PDA etc.
In order to make user's oneself intelligent movable equipment of safer relieved use, the invention provides one Intelligent terminal is based on iris technology, and after arranging lock, only user uses owner's unique iris match cognization Unlock, the user's AD HOC that could enter, carry out the scheme of data access.User under this pattern Data overall safety is independent, as long as user does not operate equipment within the time set, equipment automatically into Locking-in state.And enter by other means, such as password cracking, or back door etc., now enter It is not owner's pattern of user, is the most independent guest mode, any letter of owner in such a mode Breath is all sightless, thus ensures being perfectly safe of user data.
This method in the present embodiment can also allow user when being inconvenient to use iris identification to unlock, Password Input can also be used to be unlocked and enter under owner's pattern, so can improve this side Method and the scope of application of system, allow user use convenient.
Iris recognition technology is to carry out identification based on the iris in eyes.The eye structure of people is by consolidating The part composition such as film, iris, pupil crystalline lens, retina.Iris is in black pupil and white Annular formations between sclera, it includes the most interlaced speckle, filament, crown, bar The minutia of stricture of vagina, crypts etc..And iris is after prenatal development stage is formed, go through at whole life In journey constant by being to maintain.These features determine the uniqueness of iris feature, also determine simultaneously The uniqueness of identification.Therefore, it can the iris feature of eyes as everyone identification Object.Iris identification is through contrasting the similarity between iris image feature to determine the body of people Part.In general the process of iris recognition technology comprises: 1. iris image acquisition, uses and specifically takes the photograph As the whole eye of people is shot by equipment, and by the image transmitting that photographs to iris authentication system Image semantic classification software.2. Image semantic classification, is handled as follows the iris image got, It is made to meet the demand extracting iris feature.Iris Location: determine that inner circle, cylindrical and conic section exist Position in image.Wherein, inner circle is the border of iris and pupil, and cylindrical is the limit of iris and sclera Boundary, conic section is the border of iris and upper lower eyelid.Iris image normalization: by the rainbow in image Film size, is adjusted to the fixed dimension that identification system is arranged.Image enhaucament: for the figure after normalization Picture, carries out brightness, contrast and smoothness etc. reason, improves the discrimination of iris information in image.3. special Levy extraction, use specific algorithm to extract the characteristic point needed for iris identification from iris image, and It is encoded.4. characteristic matching, the feature coding that feature extraction is obtained and the rainbow in data base Film image feature coding mates one by one, it may be judged whether for identical iris, thus reaches the mesh of identification 's.Iris recognition technology has been obtained for using widely now.
According to one of them example, described method farther includes: if described second password with prestore Passwords of visitors is not mated, then intelligent terminal continues screen locking, and receives Password Input.
Thus can be the second password bad of user's input when, intelligent terminal will not unlock, But intelligent terminal still may proceed to receive user Password Input, and can according to input password, User is allowed to enter under other guest mode, if or password and the first password phase of user's input Join, it is also possible to enter under owner's pattern, so can allow user when input error, follow-up Can also enter into when inputting correct under the guest mode of owner's pattern or correspondence.
According to other in which example, described method farther includes: obtain owner's iris information, machine Main password and passwords of visitors, and described owner's iris information, owner's password and passwords of visitors are stored.
Thus can shift to an earlier date the information such as the main iris information of record machine, owner's password and passwords of visitors, make Typing is crossed the user of these information and can be unlocked and enter under corresponding pattern, and without typing User just cannot unlock intelligent terminal, thus ensure safety and the privacy of subscriber data, additionally Corresponding as required multiple passwords of visitors can also be set so that it is he visitor can unlock intelligent terminal And enter under the pattern of correspondence, the data stored between certain visitor and visitor is also separate, Data between them cannot be checked each other, thus ensures the privacy of user.
According to other in which example, described method farther includes: if intelligent terminal is at Preset Time Inside do not get information input, then intelligent terminal enters screen lock state, and receives iris information input. So in the case of user does not operates for a long time, intelligent terminal's screen locking so can will be protected use The safety of family data, Preset Time can be 1 minute, 5 minutes, it is also possible to 10 seconds, 30 seconds etc. Time.
According to other in which example, the data storage under described owner's pattern in owner's memory module, Data storage under described guest mode is deposited with visitor in visitor's memory module, described owner's memory module Storage module is separate.Thus can ensure that safety and the privacy of data between user.Have The safety of the raising terminal of effect, is effectively kept completely separate the data of user, accesses and needs uniquely Iris identification unlocks and enters into associative mode operation, can more effectively ensure the personal secrets of terminal use.
As in figure 2 it is shown, the present embodiment takes iris identification to add multi-user mode.Obtain the iris of user Information;Judge described iris information whether with the owner's information match prestored, if coupling, unlock also Enter owner's pattern;If not mating, obtain first password, and by described first password and the machine prestored Main code matches, if coupling, unlocks and enters owner's pattern;If not mating, obtain the second password, And described second password is matched with the passwords of visitors prestored, if coupling, unlock and enter visitor's mould Formula.In the present embodiment, owner or other users, unique iris screen locking password can be set, User enters oneself AD HOC and is required for using iris to carry out unique match.Wherein this kind of multi-user's mould Formula, each user data is stored separately in an independent subregion, and this block region in smart machine It is sightless relative to other users, after user unlocks, it can be seen that oneself data all, and right On this smart machine, the data of other users are the most sightless, it is impossible to operate with any other and use The data at family.Terminal unit such as it is mounted with that wechat is applied, after user A uses terminal to log in, claps Generate some data according to chat etc., and when user B uses the application of terminal wechat to log in, can't see and appoint User's login record or the account information data etc. of use before what.This scheme user can be arranged on Do not operate smart machine in regular hour, automatically into screen locking mode, as needed to enter, need again Carrying out the unblock of correspondence, different user iris unlocks and enters oneself AD HOC, is not to be returned directly to State before screen locking before, thoroughly ensures secure user data.And go out active or evil in terminal Meaning user wants to be forced into situation, without unique iris identification of typing, even if cracking entrance, entrance It is not owner's pattern, can't see any user data, thus guarantee data security.
Embodiment two
As it is shown on figure 3, the present embodiment discloses the Subscriber Management System of a kind of intelligent terminal, including:
Iris acquisition module 201, for obtaining the iris information of user;
First processing module 202, for judge described iris information whether with the owner's information phase prestored Coupling, if coupling, unlocks and enters owner's pattern;
Second processing module 203, if for not mating, obtains first password, and by described first close Code and the owner's code matches prestored, if coupling, unlock and enter owner's pattern;
3rd processing module 204, if for not mating, obtains the second password, and by described second close Code matches with the passwords of visitors prestored, if coupling, unlocks and enters guest mode.
Thus first can judge to be owner according to iris information, if owner the most just may be used Enter under owner's pattern to unlock, the data of owner can be accessed, and if it is determined that be not owner, User so will be pointed out to input first password, if the first password of user's input and the owner prestored Code matches, then can also unlock and enter under owner's pattern, and if it is determined that be not owner, So will point out user cipher mistake, prompting user inputs the second password, if the of user's input Two passwords match with the passwords of visitors prestored, then will unlock and enter under guest mode, visitor Resource under this visitor of intellectual access under pattern, it is impossible to addressing machine is advocated peace the resource of other visitors, therefore Thus can improve safety and the privacy of intelligent terminal greatly, it is ensured that the individual of each user Data will not be viewed by other people, makes the safer relieved use smart machine of user.And if used Second password of family input is the most right, and system will point out user cipher mistake, and it is defeated to receive password Entering, hereafter user can continue with password, according to the password of user's input, enters into other visit Visitor's pattern, or enter into owner's pattern etc..
This method in the present embodiment can also allow user when being inconvenient to use iris identification to unlock, Password Input can also be used to be unlocked and enter under owner's pattern, so can improve this side Method and the scope of application of system, allow user use convenient.
According to one of them example, described system farther includes fourth processing module, if for described Second password does not mates with the passwords of visitors prestored, then intelligent terminal continues screen locking, and it is defeated to receive password Enter.
Thus can be the second password bad of user's input when, intelligent terminal will not unlock, But intelligent terminal still may proceed to receive user Password Input, and can according to input password, User is allowed to enter under other guest mode, if or password and the first password phase of user's input Join, it is also possible to enter under owner's pattern, so can allow user when input error, follow-up Can also enter into when inputting correct under the guest mode of owner's pattern or correspondence.
According to other in which example, described system farther includes information storage module, is used for obtaining Owner's iris information, owner's password and passwords of visitors, and by described owner's iris information, owner's password Store with passwords of visitors.
Thus can shift to an earlier date the information such as the main iris information of record machine, owner's password and passwords of visitors, make Typing is crossed the user of these information and can be unlocked and enter under corresponding pattern, and without typing User just cannot unlock intelligent terminal, thus ensure safety and the privacy of subscriber data, additionally Corresponding as required multiple passwords of visitors can also be set so that it is he visitor can unlock intelligent terminal And enter under the pattern of correspondence, the data stored between certain visitor and visitor is also separate, Data between them cannot be checked each other, thus ensures the privacy of user.
According to other in which example, described system farther includes screen lock module, if for intelligence eventually End does not gets information input in Preset Time, then intelligent terminal enters screen lock state, and receives rainbow Film information inputs.So will be by intelligent terminal's screen locking in the case of user does not operates for a long time, this Sample can protect the safety of subscriber data, and Preset Time can be 1 minute, 5 minutes, it is also possible to 10 seconds, the time such as 30 seconds.
Preferably, described system farther includes: owner's memory module, under storage machine holotype Data;
Visitor's memory module, for storing the data under guest mode;Wherein said owner's memory module Separate with visitor's memory module.
Thus can ensure that safety and the privacy of data between user.Effectively improve terminal Safety, effectively the data of user are kept completely separate, access need unique iris identification unlock Enter into associative mode operation, can more effectively ensure the personal secrets of terminal use.
Above content is that to combine concrete preferred implementation made for the present invention the most specifically Bright, it is impossible to assert the present invention be embodied as be confined to these explanations.For technology belonging to the present invention For the those of ordinary skill in field, without departing from the inventive concept of the premise, it is also possible to if making Dry simple deduction or replace, all should be considered as belonging to protection scope of the present invention.

Claims (10)

1. the user management method of an intelligent terminal, it is characterised in that including:
Obtain the iris information of user;
Judge described iris information whether with the owner's information match prestored, if coupling, unlock and go forward side by side Enter owner's pattern;
If not mating, obtain first password, and by described first password and the owner's password phase prestored Join, if coupling, unlock and enter owner's pattern;
If not mating, obtain the second password, and by described second password and the passwords of visitors phase prestored Join, if coupling, unlock and enter guest mode.
Management method the most according to claim 1, it is characterised in that described method is wrapped further Include: if described second password does not mates with the passwords of visitors prestored, then intelligent terminal continues screen locking, and Receive Password Input.
Management method the most according to claim 1, it is characterised in that described method is wrapped further Include: obtain owner's iris information, owner's password and passwords of visitors, and by described owner's iris information, Owner's password and passwords of visitors store.
Management method the most according to claim 1, it is characterised in that described method is wrapped further Include: if intelligent terminal does not gets information input in Preset Time, then intelligent terminal enters screen locking shape State, and receive iris information input.
Management method the most according to claim 1, it is characterised in that under described owner's pattern Data storage data storage under owner's memory module, described guest mode in visitor's memory module, Described owner's memory module is separate with visitor's memory module.
6. the Subscriber Management System of an intelligent terminal, it is characterised in that including:
Iris acquisition module, for obtaining the iris information of user;
First processing module, for judge described iris information whether with the owner's information match prestored, If coupling, unlock and enter owner's pattern;
Second processing module, if for not mating, obtains first password, and by described first password with The owner's code matches prestored, if coupling, unlocks and enters owner's pattern;
3rd processing module, if for not mating, obtains the second password, and will described second password and The passwords of visitors prestored matches, if coupling, unlocks and enters guest mode.
Management system the most according to claim 6, it is characterised in that described system is wrapped further Include fourth processing module, if not mating with the passwords of visitors prestored for described second password, then intelligence Terminal continues screen locking, and receives Password Input.
Management system the most according to claim 6, it is characterised in that described system is wrapped further Include information storage module, be used for obtaining owner's iris information, owner's password and passwords of visitors, and by institute State owner's iris information, owner's password and passwords of visitors to store.
Management system the most according to claim 6, it is characterised in that described system is wrapped further Including screen lock module, if not getting information input in Preset Time for intelligent terminal, then intelligence is eventually End enters screen lock state, and receives iris information input.
Management system the most according to claim 6, it is characterised in that described system is further Including: owner's memory module, the data under storage machine holotype;
Visitor's memory module, for storing the data under guest mode;Wherein said owner's memory module Separate with visitor's memory module.
CN201610460014.0A 2016-06-22 2016-06-22 User management method and system for intelligent terminal Pending CN105897430A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610460014.0A CN105897430A (en) 2016-06-22 2016-06-22 User management method and system for intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610460014.0A CN105897430A (en) 2016-06-22 2016-06-22 User management method and system for intelligent terminal

Publications (1)

Publication Number Publication Date
CN105897430A true CN105897430A (en) 2016-08-24

Family

ID=56718084

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610460014.0A Pending CN105897430A (en) 2016-06-22 2016-06-22 User management method and system for intelligent terminal

Country Status (1)

Country Link
CN (1) CN105897430A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503514A (en) * 2016-09-28 2017-03-15 北京用友政务软件有限公司 Unlocking method and system based on the electric terminal equipment of iris identification
CN106506786A (en) * 2016-12-27 2017-03-15 努比亚技术有限公司 The terminal and method of protection user privacy information
CN106529346A (en) * 2016-10-28 2017-03-22 努比亚技术有限公司 Terminal privacy protecting method and terminal
CN106788992A (en) * 2016-12-05 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of information decryption method and device
CN106778154A (en) * 2016-11-15 2017-05-31 深圳天珑无线科技有限公司 Mobile terminal and its unlocking method
CN107172276A (en) * 2017-04-28 2017-09-15 努比亚技术有限公司 A kind of terminal method for retrieving, terminal and computer-readable recording medium
CN107577931A (en) * 2017-08-29 2018-01-12 广东欧珀移动通信有限公司 Authority control method and related product
CN107808086A (en) * 2017-10-31 2018-03-16 广东小天才科技有限公司 A kind of unlocking method of intelligent terminal, device and equipment
CN107862190A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Based reminding method and Related product
CN108268763A (en) * 2018-02-13 2018-07-10 广东欧珀移动通信有限公司 terminal control method, device, storage medium and terminal
CN109145575A (en) * 2017-06-19 2019-01-04 珠海格力电器股份有限公司 A kind of distribution method and device using permission
CN109257481A (en) * 2018-07-26 2019-01-22 深圳市沃特沃德股份有限公司 The method and device of multi-user operation control
CN112115444A (en) * 2019-06-21 2020-12-22 华为技术有限公司 Unlocking method and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065823A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN105117629A (en) * 2015-08-21 2015-12-02 京东方科技集团股份有限公司 Electronic device control method and apparatus, and electronic device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065823A (en) * 2014-06-30 2014-09-24 惠州Tcl移动通信有限公司 User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN105117629A (en) * 2015-08-21 2015-12-02 京东方科技集团股份有限公司 Electronic device control method and apparatus, and electronic device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503514A (en) * 2016-09-28 2017-03-15 北京用友政务软件有限公司 Unlocking method and system based on the electric terminal equipment of iris identification
CN106529346B (en) * 2016-10-28 2020-02-14 企事通集团有限公司 Method for protecting terminal privacy and terminal
CN106529346A (en) * 2016-10-28 2017-03-22 努比亚技术有限公司 Terminal privacy protecting method and terminal
CN106778154A (en) * 2016-11-15 2017-05-31 深圳天珑无线科技有限公司 Mobile terminal and its unlocking method
CN106788992A (en) * 2016-12-05 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of information decryption method and device
CN106506786A (en) * 2016-12-27 2017-03-15 努比亚技术有限公司 The terminal and method of protection user privacy information
CN107172276A (en) * 2017-04-28 2017-09-15 努比亚技术有限公司 A kind of terminal method for retrieving, terminal and computer-readable recording medium
US11372961B2 (en) 2017-06-19 2022-06-28 Gree Electric Appliances (Wuhan) Co., Ltd Method and device for assigning application usage permission
CN109145575A (en) * 2017-06-19 2019-01-04 珠海格力电器股份有限公司 A kind of distribution method and device using permission
CN107577931A (en) * 2017-08-29 2018-01-12 广东欧珀移动通信有限公司 Authority control method and related product
CN107862190A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Based reminding method and Related product
CN107808086A (en) * 2017-10-31 2018-03-16 广东小天才科技有限公司 A kind of unlocking method of intelligent terminal, device and equipment
CN108268763A (en) * 2018-02-13 2018-07-10 广东欧珀移动通信有限公司 terminal control method, device, storage medium and terminal
CN109257481A (en) * 2018-07-26 2019-01-22 深圳市沃特沃德股份有限公司 The method and device of multi-user operation control
CN112115444A (en) * 2019-06-21 2020-12-22 华为技术有限公司 Unlocking method and electronic equipment
WO2020253804A1 (en) * 2019-06-21 2020-12-24 华为技术有限公司 Unlocking method and electronic device
CN112115444B (en) * 2019-06-21 2022-08-26 华为技术有限公司 Unlocking method and electronic equipment

Similar Documents

Publication Publication Date Title
CN105897430A (en) User management method and system for intelligent terminal
US10867199B2 (en) Data update method for face-to-unlock authentication, authentication device, and non-volatile storage medium
RU2718226C2 (en) Biometric data safe handling systems and methods
KR101242390B1 (en) Method, apparatus and computer-readable recording medium for identifying user
CN107924436A (en) Control is accessed using the electronic device of biological identification technology
US9258301B2 (en) Advanced authentication techniques
US9544306B2 (en) Attempted security breach remediation
DE202017006897U1 (en) Systems for providing a universal decentralized solution for verifying users with cross-verification features
WO2013100697A1 (en) Method, apparatus, and computer-readable recording medium for authenticating a user
CN103593594A (en) System and method for providing secure access to an electronic device using facial biometric identification and screen gesture
CN106023363A (en) Identity verification method and system
CN105893817A (en) Mobile device application permission management method and system
CN105320871A (en) Screen unlocking method and screen unlocking apparatus
JP6300705B2 (en) Authentication management method by device cooperation, information processing device, wearable device, computer program
CN106126994A (en) The user management method of a kind of mobile terminal and system
CN105956569A (en) Finger vein identification based identity authentication platform
WO2016187940A1 (en) Information protecting method, mobile terminal and computer storage medium
WO2017067507A1 (en) Method and device for determining a use permission of an apparatus
CN107368722A (en) Verification method, computer-readable recording medium, the mobile terminal of biometric image
CN105869255A (en) Intelligent access control method and system based on mobile terminal
CN106650361A (en) Unblocking method and device
CN103269481A (en) Method and system for encrypting and protecting procedure or file of portable electronic equipment
CN112699354A (en) User authority management method and terminal equipment
CN107395369A (en) Towards mobile Internet from the authentication method of carrying device, access method and system
CN104376240A (en) Method for processing information and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160824