CN106529346A - Terminal privacy protecting method and terminal - Google Patents

Terminal privacy protecting method and terminal Download PDF

Info

Publication number
CN106529346A
CN106529346A CN201610963309.XA CN201610963309A CN106529346A CN 106529346 A CN106529346 A CN 106529346A CN 201610963309 A CN201610963309 A CN 201610963309A CN 106529346 A CN106529346 A CN 106529346A
Authority
CN
China
Prior art keywords
internal memory
memorymodel
memory
low
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610963309.XA
Other languages
Chinese (zh)
Other versions
CN106529346B (en
Inventor
汪健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qishitong Group Co., Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201610963309.XA priority Critical patent/CN106529346B/en
Publication of CN106529346A publication Critical patent/CN106529346A/en
Application granted granted Critical
Publication of CN106529346B publication Critical patent/CN106529346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a terminal privacy protecting method and a terminal. The terminal privacy protecting method includes: detecting an unlocking code input by a user in a locked screen state; unlocking a screen so as to allow a system to enter a low memory mode to operate if a second unlocking code is detected and the system does not operate in the low memory mode; and unlocking the screen so as to allow the system to exit the low memory mode to operate if the first unlocking code is detected and the system operates in the low memory mode, wherein the low memory mode is a working mode that a system available memory is gradually reduced according to a preset strategy. According to the technical scheme, when a user uses the second unlocking code to unlock the terminal, the terminal can enter the low memory mode and gradually stop operating, and in this way, the user cannot use the terminal in long time, and a privacy protecting effect can be achieved.

Description

A kind of method and terminal of protection terminal privacy
Technical field
The present invention relates to field of terminal technology, more particularly to a kind of method and terminal of protection terminal privacy.
Background technology
The use of mobile terminal has been deep in the every aspect of people's daily life, and mobile terminal (such as mobile phone) The private data of middle preservation is also more and more.
In correlation technique, privacy guard technology prevents other people uses to mobile terminal mainly by arranging password, Such as, by screen locking, application lock etc..But this dominant privacy guard technology, while preventing other people from using oneself mobile phone, Negative impact is brought to oneself interpersonal relationships with other people easily.In addition, having to tell other people the scene of password at some Under, these coded locks have not just existed for the protection of privacy.
The content of the invention
The technical problem to be solved is to provide a kind of method and terminal of protection terminal privacy, can be in user The terminal is made to enter low memorymodel and gradually run interim card during using the second PUK unlock terminal, it is to avoid described to use the head of a household Time using terminal, reaches the purpose of protection privacy.
The embodiment of the present invention provides a kind of method of protection terminal privacy, including:
Under screen lock state, the PUK of user input is detected;
If detecting the second PUK, and system not being run under low memorymodel, then solve lock screen, enter system low Memorymodel runs;If detecting the first PUK, and system being run under low memorymodel, then solve lock screen, move back system Go out low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
The embodiment of the present invention also provides a kind of terminal, including:
Detection module, for, under screen lock state, detecting the PUK of user input;
Unblock processing module, if for detecting the second PUK, and system is not run under low memorymodel, then unlock Screen, makes system run into low memorymodel;If detecting the first PUK, and system being run under low memorymodel, then Solution lock screen, makes system exit low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
Set forth herein a kind of protection terminal privacy method and terminal, under screen lock state, detect user input solution Code-locked, if the second PUK is detected, and system is not run under low memorymodel, then solve lock screen, system is entered in low Deposit mode operation;If detecting the first PUK, and system being run under low memorymodel, then solve lock screen, exit system Low memorymodel operation, wherein, low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.This Invention can make the terminal enter low memorymodel and gradually run interim card after other people are using the second PUK unlock terminal, So as to avoid other people long-time using terminals, the purpose of protection privacy is reached.
Description of the drawings
Fig. 1 is the hardware architecture diagram for realizing each one optional mobile terminal of embodiment of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Method flow diagrams of the Fig. 3 for a kind of protection terminal privacy of the embodiment of the present invention;
A kind of terminal schematic diagrames of the Fig. 4 for the embodiment of the present invention;
Fig. 5 is a kind of method flow diagram of protection terminal privacy in example of the present invention 1.
The realization of the object of the invention, functional characteristics and advantage will be described further in conjunction with the embodiments referring to the drawings.
Specific embodiment
Technical scheme is described in detail below in conjunction with drawings and Examples.
The mobile terminal of each embodiment of the application is realized referring now to Description of Drawings.In follow-up description, use For representing the suffix of such as " module ", " part " or " unit " of element only for being conducive to the explanation of the present invention, itself Not specific meaning.Therefore, " module " mixedly can be used with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram for realizing the application one optional mobile terminal of each embodiment.
Mobile terminal 1 00 can include wireless communication unit 110, A/V (audio/video) input block 120, user input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190 Etc..
Fig. 1 shows the mobile terminal 1 00 with various assemblies, it should be understood that being not required for implementing all showing The component for going out.More or less of component can alternatively be implemented.Will be discussed in more detail below the element of mobile terminal 1 00.
Wireless communication unit 110 can generally include one or more assemblies, and which allows mobile terminal 1 00 and radio communication Radio communication between system or network.For example, wireless communication unit 110 can include that broadcasting reception module 111, movement are logical At least one of letter module 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent The broadcast singal generated before the server or reception of broadcast singal and/or broadcast related information and/or broadcast related information And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 is receiving.Broadcast singal can be present in a variety of manners, and for example, which can be with the electronics of DMB (DMB) The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast Receiver module 111 can receive signal broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111 Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video Broadcast-hand-held (DVB-H), the Radio Data System of forward link media (MediaFLO@), received terrestrial digital broadcasting integrated service Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/ Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can including WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant Tooth TM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module 115 typical case is GPS (global positioning system).According to current technology, GPS calculate from three or more satellites away from From information and correct time information and the Information application triangulation for calculating, so as to according to longitude, latitude and height Degree calculates three-dimensional current location information exactly.Currently, the method for calculating position and temporal information uses three satellites simultaneously And the error of the position and temporal information for calculating is corrected by using an other satellite.Additionally, GPS can be by real-time Ground Continuous plus current location information carrys out calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include 121 He of camera Microphone 122, the static images that 121 pairs, camera is obtained by image capture apparatus in Video Capture pattern or image capture mode Or the view data of video is processed.Picture frame after process is may be displayed on display unit 151.Jing cameras 121 are processed Carry out sending out during picture frame afterwards can be stored in memory 160 (or other storage mediums) or via wireless communication unit 110 Send, two or more cameras 121 can be provided according to the construction of mobile terminal 1 00.Microphone 122 can be in telephone relation mould Sound (voice data), and energy are received via microphone 122 in formula, logging mode, speech recognition mode etc. operational mode Enough is voice data by such acoustic processing.Audio frequency (voice) data after process can be in the case of telephone calling model Be converted to the form output that mobile communication base station can be sent to via mobile communication module 112.Microphone 122 can be implemented various The noise of type eliminates (or suppression) algorithm and is being received and making an uproar of producing during sending audio signal with eliminating (or suppression) Sound or interference.
User input unit 130 can generate key input data to control mobile terminal 1 00 according to the order of user input Various operations.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, Touch pad (for example, detection is due to the sensitive component of the change of touched and caused resistance, pressure, electric capacity etc.), roller, shake Bar etc..Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, and (for example, mobile terminal 1 00 opens or closes shape State), the position of mobile terminal 1 00, user is for the presence or absence of contact (that is, touch input), the mobile terminal of mobile terminal 1 00 100 orientation, the acceleration or deceleration movement of mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00 The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed The sliding-type phone is opened or is cut out.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 is coupled with external device (ED).Sensing unit 140 can include proximity transducer 141.
Interface unit 170 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for device of the connection with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included Etc..In addition, the device with identification module (hereinafter referred to as " identifying device ") can take the form of smart card, therefore, know Other device can be connected with mobile terminal 1 00 via port or other attachment means.Interface unit 170 can be used for receive from The input (for example, data message, electric power etc.) of external device (ED) and the input for receiving is transferred in mobile terminal 1 00 One or more elements can be used for the transmission data between mobile terminal 1 00 and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing to pass through which by electricity Power provides the path of mobile terminal 1 00 from base or can serve as allowing from base the various command signals being input into pass through which It is transferred to the path of mobile terminal 1 00.Can serve as recognizing mobile terminal 1 00 from the various command signals or electric power of base input The signal whether being accurately fitted within base.Output unit 150 is configured to provide with vision, audio frequency and/or tactile manner Output signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include aobvious Show unit 151, dio Output Modules 152, alarm unit 153 etc..
The information that display unit 151 is processed in may be displayed on mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia files Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, illustrate video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when the display unit 151 and touch pad touch-screen with formation superposed on one another in the form of layer, display unit 151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user from outside viewing, and this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific The embodiment wanted, mobile terminal 1 00 can include two or more display units (or other display devices), for example, move Dynamic terminal 100 can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect Touch input pressure and touch input position and touch input area.
Dio Output Modules 152 can be in mobile terminal 1 00 in call signal reception pattern, call mode, record mould It is when under the isotypes such as formula, speech recognition mode, broadcast reception mode, that wireless communication unit 110 is received or in memory The voice data transducing audio signal that stores in 160 and it is output as sound.And, dio Output Modules 152 can provide with (for example, call signal receives sound, message sink sound etc. to the audio output of the specific function correlation that mobile terminal 1 00 is performed Deng).Dio Output Modules 152 can include loudspeaker, buzzer etc..
Alarm unit 153 can provide output so that event is notified to mobile terminal 1 00.Typical event can be with Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit 153 can provide output in a different manner with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating Output is provided, when calling, message or some other entrance communication (incoming communication) are received, alarm list Unit 153 can provide tactile output (that is, vibrating) to notify to user.Tactile output as by providing, even if When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.
Memory 160 can store software program for the process and control operation performed by controller 180 etc., Huo Zheke With the data (for example, telephone directory, message, still image, video etc.) for temporarily storing own Jing outputs or will export.And And, memory 160 can be storing the vibration of various modes with regard to exporting when touching and being applied to touch-screen and audio signal Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data The related control of communication, video calling etc. and process.In addition, controller 180 can be included for reproducing (or playback) many matchmakers The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or it is so structured that and control Device 180 is separated.Controller 180 can be with execution pattern identifying processing, by the handwriting input for performing on the touchscreen or picture Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Appropriate electric power needed for part and component.
Various embodiments described herein can be with use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implementing.For hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein At least one in electronic unit implementing, in some cases, can be implemented in controller 180 by such embodiment. For software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation Software module is implementing.Software code can be come by the software application (or program) write with any appropriate programming language Implement, perform during software code can be stored in memory 160 and by controller 180.
So far, own Jing describes mobile terminal 1 00 according to its function.In addition, the mobile terminal 1 00 in the embodiment of the present invention Can be such as folded form, board-type, oscillating-type, sliding-type and other various types of mobile terminals, specifically not do herein Limit.
As shown in Figure 1 mobile terminal 1 00 may be constructed such that using via frame or packet transmission data it is all if any Line and wireless communication system and satellite-based communication system are operating.
The communication system that mobile terminal wherein of the invention is operable to is described referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer.For example, used by communication system Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under The description in face is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 1s 00, multiple base stations (BS) 270, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC 280 is configured to and Public Switched Telephony Network (PSTN) 290 form interface.MSC 280 is also structured to be formed with the BSC 275 that can be couple to base station 270 via back haul link and is connect Mouthful.If back haul link can be constructed according to any one in the interface that Ganji knows, the interface can include such as Europe mark Quasi- high power capacity digital circuit/Unite States Standard high power capacity digital circuit (E1/T1), asynchronous transfer mode (ATM), procotol (IP), point-to-point protocol (PPP), frame relay, high-bit-rate digital subscriber line road (HDSL), Asymmetrical Digital Subscriber Line (ADSL) Or all kinds digital subscriber line (xDSL).It will be appreciated that system can include multiple BSC 275 as shown in Figure 2.
Each BS 270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction Each subregion that line is covered is radially away from BS 270.Or, each subregion can be by for two of diversity reception or more Multiple antennas are covered.Each BS 270 may be constructed such that the multiple frequency distribution of support, and each frequency distribution with specific frequency Spectrum (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed intersect can be referred to as CDMA Channel.BS 270 can also be referred to as base station transceiver System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly representing single BSC 275 and at least one BS 270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS 270 can be claimed For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to broadcsting transmitter (BT) 295 mobile terminal operated in system 100.Broadcasting reception module 111 is arranged at mobile terminal 1 00 to receive the broadcast sent by BT 295 as shown in Figure 1 Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.Satellite 300 helps position multiple mobile terminals At least one of 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that be, it is possible to use any number of satellite obtains useful Location information.Location information module 115 as shown in Figure 1 is (such as:GPS) it is generally configured to coordinate to obtain with satellite 300 The location information that must be wanted.Substitute GPS tracking techniques or outside GPS tracking techniques, it is possible to use can track mobile whole Other technologies of the position at end.In addition, at least one gps satellite 300 can optionally or additionally process satellite dmb biography It is defeated.
Used as a typical operation of wireless communication system, BS 270 receives the reverse strand from various mobile terminal 1s 00 Road signal.Mobile terminal 1 00 generally participates in call, information receiving and transmitting and other types of communication.Each of certain base station reception is anti- Processed in specific BS 270 to link signal.The data of acquisition are forwarded to the BSC 275 of correlation.BSC provides logical Words resource allocation and the mobile management function of the coordination including the soft switching process between BS 270.BSC 275 will also be received Data be routed to MSC 280, its provide for PSTN 290 formed interface extra route service.Similarly, PSTN 290 form interfaces with MSC280, and MSC and BSC 275 form interface, and BSC 275 correspondingly controls BS 270 with by forward direction Link signal is sent to mobile terminal 1 00.
Based on above-mentioned mobile terminal hardware configuration and communication system, the application method each embodiment is proposed.
As shown in figure 3, the embodiment of the present invention proposes a kind of method of protection terminal privacy, including:
S310, under screen lock state, detects the PUK of user input;
S320, if the second PUK is detected, and system is not run under low memorymodel, then solve lock screen, make system Run into low memorymodel;If detecting the first PUK, and system being run under low memorymodel, then solve lock screen, make System exits low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy;
Methods described can also include following features:
Alternatively, after the PUK of the detection user input, methods described also includes:If detecting the second PUK, And system is run under low memorymodel, then judge the currently available internal memory of system whether more than or equal to threshold value;If so, then unlock Screen, makes system continue to run under low memorymodel;If it is not, then keeping screen lock state;
Alternatively, it is described the system is run into low memorymodel, including:
Start internal memory filling process, the internal memory filling process applies for specified quantity from system according to default initial value Memory headroom, and gradually apply for memory headroom from system according to predetermined policy;
It is described to make the system exit low memorymodel operation, including:
The internal memory filling process is closed, all memory headrooms that the internal memory fills process application are discharged;
Alternatively, the predetermined policy includes:When listening to user operation every time, step value is reduced according to default internal memory Apply for the memory headroom of specified quantity from system;And/or step value Shen from system is reduced according to default internal memory periodically Please specified quantity memory headroom;
Alternatively, the memory headroom that step value applies for specified quantity from system is reduced according to default internal memory, including:
Judge the currently available internal memory of system whether more than or equal to threshold value, be then according to default internal memory reduce step value from Apply for the memory headroom of specified quantity in system;
In other implementations, system can have two kinds of mode of operations, if it is defeated under screen lock state to detect user The second PUK for entering, and system operation is in the first mode of operation, then solve lock screen, and by described the first of the system operation Mode of operation switches to the second mode of operation;If the first PUK of user input is detected under screen lock state, and system fortune Row solves lock screen and second mode of operation of the system operation is switched to described the in second mode of operation, then One mode of operation;Wherein, first mode of operation is the mode of operation that process is not filled to memory headroom, described second Mode of operation is the mode of operation that process is filled to memory headroom;The filling is processed and is referred to:System starts internal memory filling Process, internal memory filling process apply for the memory headroom of specified quantity from system according to default initial value, and according to Predetermined policy gradually applies for memory headroom from system.
As shown in figure 4, the embodiment of the present invention proposes a kind of terminal, including:
Detection module 401, for, under screen lock state, detecting the PUK of user input;
Unblock processing module 402, if for detecting the second PUK, and system is not run under low memorymodel, then Solution lock screen, makes system run into low memorymodel;If detecting the first PUK, and system being transported under low memorymodel OK, then lock screen is solved, makes system exit low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
Alternatively, processing module 402 is unlocked, for making the system run into low memorymodel, including:Start internal memory Filling process, the internal memory filling process apply for the memory headroom of specified quantity from system according to default initial value, and Gradually apply for memory headroom from system according to predetermined policy;
Unblock processing module, for making the system exit low memorymodel operation, including:Close the internal memory to be filled into Journey, discharges all memory headrooms that the internal memory fills process application.
Alternatively, the predetermined policy includes:When listening to user operation every time, step value is reduced according to default internal memory Apply for the memory headroom of specified quantity from system;And/or step value Shen from system is reduced according to default internal memory periodically Please specified quantity memory headroom.
Alternatively, processing module 402 is unlocked, and applies specifying number for step value being reduced according to default internal memory from system The memory headroom of amount, including:Judge that the currently available internal memory of system, whether more than or equal to threshold value, is subtracted according to default internal memory Few step value applies for the memory headroom of specified quantity from system.
Alternatively, processing module 402 is unlocked, if it is additionally operable to detect the second PUK, and system is under low memorymodel Whether operation, then judge the currently available internal memory of system more than or equal to threshold value;If so, lock screen is then solved, system is continued low Run under memorymodel;If it is not, then keeping screen lock state
Example 1
As shown in figure 5, a kind of method of protection terminal privacy of this example, comprises the following steps:
Step S501, detects whether the PUK of user input is received in mobile phone locking screen interface, is then execution step S502, otherwise execution step S501;
Step S502, determines the type of the PUK, when the PUK is the PUK of general mode, performs step Rapid S508, when the PUK is the PUK of low memorymodel, execution step S503;
Step S503, mobile phone screen unblock, (internal memory is filled out to start a Resident Process for filling internal memory in system background It is charged into journey), the internal memory filling process reduces memory headroom of the initial value to system application specified quantity according to default internal memory, System enters low memorymodel;
Wherein, the internal memory reduces initial value and is system default value or is set by user oneself;Such as, in system default It is 200M bytes to deposit reduction initial value;
Step S504, judges whether to listen to user operation (such as, starting new page, list slip etc.), is to perform Step S505, otherwise execution step S504;
Step S505, judges currently available internal memory whether more than or equal to threshold value, is then execution step S506, otherwise performs Step S507;
Wherein, the threshold value is system default value or is set by user oneself;Such as, threshold value described in system default is 300M bytes;
Step S506, the internal memory filling process reduce step value according to default internal memory and apply for specified quantity from system Memory headroom, return to step S504;
Wherein, the internal memory reduces step value and is system default value or is set by user oneself;Such as, in system default It is 100M bytes to deposit reduction step value;
Wherein, as the free memory in mobile phone is less and less, Android (Android) system can carry out frequently Gc (Garbage Collection, garbage reclamation), so as to cause system to become interim card when responding to user.System operation Interim card can reduce the desire that user uses mobile phone.
By Android JNI, (locally exploitation connects the internal memory filling process for Java Native Interface, Java Mouthful) call Native (local framework) layer method to carry out the mode of internal memory application, can realize that a process is allowed in Android In the range of application to larger internal memory without there is OOM (Out ofMemory, internal memory overflow) extremely.By internal memory is filled Process is set to foreground and is served by, and the process under low memory condition can be avoided to be killed by Android reclaim mechanisms.
Step S507, judges that whether mobile phone enters screen lock state, is then return to step S501, otherwise execution step S507;
Step S508, judges system whether in low memorymodel, is then execution step S509, otherwise execution step S510;
Step S509, closes internal memory filling process, discharges the memory headroom (Installed System Memory that the internal memory fills process application Recover normal), system exits low memorymodel;
Step S510, mobile phone are unlocked, in the normal mode runtime;
The method of above-mentioned protection terminal privacy, can be used for following scene:
(1) other people require to use mobile phone to user;
(2) user informs that other people can enter the PUK (the second PUK) of low memorymodel;
(3) other people after locking screen interface is input into second PUK, mobile phone is unlocked and enters low memorymodel;
(3) other people start mobile phone of leafing through, for example, open wechat;
(4) other people perform multi-pass operation (such as, into wechat, multiple slip wechat list, the behaviour such as chat record of leafing through Make) after, mobile phone enters the state of obvious interim card;
(5) other people run interim card due to mobile phone, and the desire of mobile phone of leafing through declines rapidly, mobile phone will be returned user;
(6) user after the PUK (the first PUK) that locking screen interface is input under normal use pattern, mobile phone exits low Memorymodel, Installed System Memory recover normal, and user normally uses mobile phone.
It should be noted that herein, term " including ", "comprising" or its any other variant are intended to non-row His property is included, so that a series of process, method, article or device including key elements not only include those key elements, and And also include other key elements being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element for being limited by sentence "including a ...", it is not excluded that including being somebody's turn to do Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), use so that a station terminal equipment including some instructions (can be mobile phone, computer, clothes Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the present invention is not thereby limited, it is every using this Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. it is a kind of protection terminal privacy method, including:
Under screen lock state, the PUK of user input is detected;
If detecting the second PUK, and system not being run under low memorymodel, then solve lock screen, system is made to enter low internal memory Mode operation;If detecting the first PUK, and system being run under low memorymodel, then solve lock screen, exit system low Memorymodel runs;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
2. method according to claim 1, it is characterised in that:It is described system is included into the operation of low memorymodel:
Start internal memory filling process, the internal memory filling process is applied in specified quantity from system according to default initial value Space is deposited, and gradually applies for memory headroom from system according to predetermined policy;
It is described to make system exit the operation of low memorymodel to include:
The internal memory filling process is closed, all memory headrooms that the internal memory fills process application are discharged.
3. method according to claim 2, it is characterised in that:The predetermined policy includes:
When listening to user operation every time, step value is reduced according to default internal memory and applies for that the internal memory of specified quantity is empty from system Between;And/or the memory headroom that step value applies for specified quantity from system is reduced according to default internal memory periodically.
4. method according to claim 3, it is characterised in that:It is described according to default internal memory reduce step value from system The memory headroom of application specified quantity includes:
Whether the currently available internal memory of system is judged more than or equal to threshold value, be that step value is reduced from system according to default internal memory then The memory headroom of middle application specified quantity.
5. the method according to any one of claim 1-4, it is characterised in that the PUK of the detection user input it Afterwards, methods described also includes:
If detecting the second PUK, and system being run under low memorymodel, then judge whether the currently available internal memory of system is big In or be equal to threshold value;If so, lock screen is then solved, makes system continue to run under low memorymodel;If it is not, then keeping screen locking shape State.
6. a kind of terminal, including:
Detection module, for, under screen lock state, detecting the PUK of user input;
Unblock processing module, if for detecting the second PUK, and system is not run under low memorymodel, then solve screen locking Curtain, makes system run into low memorymodel;If detecting the first PUK, and system being run under low memorymodel, then solve Lock screen, makes system exit low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
7. terminal according to claim 6, it is characterised in that:
Unblock processing module, for making the system run into low memorymodel, including:
Start internal memory filling process, the internal memory filling process is applied in specified quantity from system according to default initial value Space is deposited, and gradually applies for memory headroom from system according to predetermined policy;
Unblock processing module, for making the system exit low memorymodel operation, including:
The internal memory filling process is closed, all memory headrooms that the internal memory fills process application are discharged.
8. terminal according to claim 7, it is characterised in that:The predetermined policy includes:
When listening to user operation every time, step value is reduced according to default internal memory and applies for that the internal memory of specified quantity is empty from system Between;And/or the memory headroom that step value applies for specified quantity from system is reduced according to default internal memory periodically.
9. terminal according to claim 8, it is characterised in that:
Unblock processing module, for reducing the memory headroom that step value applies for specified quantity from system according to default internal memory, Including:Judge that the currently available internal memory of system, whether more than or equal to threshold value, is, step value is reduced from being according to default internal memory Apply for the memory headroom of specified quantity in system.
10. the terminal according to any one of claim 6-9, it is characterised in that:
Unblock processing module, if it is additionally operable to detect the second PUK, and system is run under low memorymodel, then judge system Whether currently available internal memory is more than or equal to threshold value;If so, lock screen is then solved, makes system continue to run under low memorymodel; If it is not, then keeping screen lock state.
CN201610963309.XA 2016-10-28 2016-10-28 Method for protecting terminal privacy and terminal Active CN106529346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610963309.XA CN106529346B (en) 2016-10-28 2016-10-28 Method for protecting terminal privacy and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610963309.XA CN106529346B (en) 2016-10-28 2016-10-28 Method for protecting terminal privacy and terminal

Publications (2)

Publication Number Publication Date
CN106529346A true CN106529346A (en) 2017-03-22
CN106529346B CN106529346B (en) 2020-02-14

Family

ID=58326360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610963309.XA Active CN106529346B (en) 2016-10-28 2016-10-28 Method for protecting terminal privacy and terminal

Country Status (1)

Country Link
CN (1) CN106529346B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271332A (en) * 2011-07-18 2011-12-07 中兴通讯股份有限公司 Method and device for maintaining secrecy of terminal information
CN103945456A (en) * 2014-05-12 2014-07-23 武汉邮电科学研究院 LTE (long term evolution) base station user plane efficient UDP (user datagram protocol) data transmission optimization method based on Linux system
CN104967736A (en) * 2015-06-04 2015-10-07 上海卓易科技股份有限公司 Multi-user switching method and apparatus
CN105897430A (en) * 2016-06-22 2016-08-24 浙江德景电子科技有限公司 User management method and system for intelligent terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271332A (en) * 2011-07-18 2011-12-07 中兴通讯股份有限公司 Method and device for maintaining secrecy of terminal information
CN103945456A (en) * 2014-05-12 2014-07-23 武汉邮电科学研究院 LTE (long term evolution) base station user plane efficient UDP (user datagram protocol) data transmission optimization method based on Linux system
CN104967736A (en) * 2015-06-04 2015-10-07 上海卓易科技股份有限公司 Multi-user switching method and apparatus
CN105897430A (en) * 2016-06-22 2016-08-24 浙江德景电子科技有限公司 User management method and system for intelligent terminal

Also Published As

Publication number Publication date
CN106529346B (en) 2020-02-14

Similar Documents

Publication Publication Date Title
CN105100476B (en) A kind of mobile terminal unlocking device and method
CN106231087B (en) A kind of method and apparatus of front and back sides dual-screen display device false-touch prevention
CN106654424A (en) Charging method and terminal
CN106027795B (en) A kind of switching method and terminal of double-sided screen
CN105208219A (en) Mobile terminal falling reminding method and device
CN104679890B (en) Picture method for pushing and device
CN106527933A (en) Control method and device of edge gesture of mobile terminal
CN105430258B (en) A kind of method and apparatus of self-timer group photo
CN104836884A (en) Standby unlocking method of mobile terminal, and mobile terminal
CN106775372A (en) A kind of display adjusting method of suspension procedure disk, device and terminal
CN104735254B (en) terminal screen locking method and system
CN106412328B (en) A kind of method and apparatus obtaining field feedback
CN104883454B (en) A kind of display control method and display control terminal
CN106681722A (en) Process processing method and electronic device
CN107133508A (en) Application management method and mobile terminal
CN106792607A (en) Mobile terminal and the method for reducing mobile terminal power consumption
CN106484534A (en) Control method for the mobile terminal of displaying and control device
CN106488035A (en) A kind of mobile terminal and control method
CN106911486B (en) A kind of message push processing method, apparatus and system
CN106897010A (en) Touch screen terminal and control method
CN106777251A (en) A kind of file management method and device
CN106792603A (en) Mobile terminal and its call forwarding method
CN106792878A (en) A kind of data traffic monitoring method and device
CN106856617A (en) A kind of terminal and residence reselecting
CN106412877A (en) Activation method and activation device for SIM card of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200115

Address after: Room 301, floor 3, building 2, No.28, Jiuhe Road, Jianggan District, Hangzhou City, Zhejiang Province

Applicant after: Qishitong Group Co., Ltd

Address before: 518000 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor

Applicant before: Nubian Technologies Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant