CN106529346A - Terminal privacy protecting method and terminal - Google Patents
Terminal privacy protecting method and terminal Download PDFInfo
- Publication number
- CN106529346A CN106529346A CN201610963309.XA CN201610963309A CN106529346A CN 106529346 A CN106529346 A CN 106529346A CN 201610963309 A CN201610963309 A CN 201610963309A CN 106529346 A CN106529346 A CN 106529346A
- Authority
- CN
- China
- Prior art keywords
- internal memory
- memorymodel
- memory
- low
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a terminal privacy protecting method and a terminal. The terminal privacy protecting method includes: detecting an unlocking code input by a user in a locked screen state; unlocking a screen so as to allow a system to enter a low memory mode to operate if a second unlocking code is detected and the system does not operate in the low memory mode; and unlocking the screen so as to allow the system to exit the low memory mode to operate if the first unlocking code is detected and the system operates in the low memory mode, wherein the low memory mode is a working mode that a system available memory is gradually reduced according to a preset strategy. According to the technical scheme, when a user uses the second unlocking code to unlock the terminal, the terminal can enter the low memory mode and gradually stop operating, and in this way, the user cannot use the terminal in long time, and a privacy protecting effect can be achieved.
Description
Technical field
The present invention relates to field of terminal technology, more particularly to a kind of method and terminal of protection terminal privacy.
Background technology
The use of mobile terminal has been deep in the every aspect of people's daily life, and mobile terminal (such as mobile phone)
The private data of middle preservation is also more and more.
In correlation technique, privacy guard technology prevents other people uses to mobile terminal mainly by arranging password,
Such as, by screen locking, application lock etc..But this dominant privacy guard technology, while preventing other people from using oneself mobile phone,
Negative impact is brought to oneself interpersonal relationships with other people easily.In addition, having to tell other people the scene of password at some
Under, these coded locks have not just existed for the protection of privacy.
The content of the invention
The technical problem to be solved is to provide a kind of method and terminal of protection terminal privacy, can be in user
The terminal is made to enter low memorymodel and gradually run interim card during using the second PUK unlock terminal, it is to avoid described to use the head of a household
Time using terminal, reaches the purpose of protection privacy.
The embodiment of the present invention provides a kind of method of protection terminal privacy, including:
Under screen lock state, the PUK of user input is detected;
If detecting the second PUK, and system not being run under low memorymodel, then solve lock screen, enter system low
Memorymodel runs;If detecting the first PUK, and system being run under low memorymodel, then solve lock screen, move back system
Go out low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
The embodiment of the present invention also provides a kind of terminal, including:
Detection module, for, under screen lock state, detecting the PUK of user input;
Unblock processing module, if for detecting the second PUK, and system is not run under low memorymodel, then unlock
Screen, makes system run into low memorymodel;If detecting the first PUK, and system being run under low memorymodel, then
Solution lock screen, makes system exit low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
Set forth herein a kind of protection terminal privacy method and terminal, under screen lock state, detect user input solution
Code-locked, if the second PUK is detected, and system is not run under low memorymodel, then solve lock screen, system is entered in low
Deposit mode operation;If detecting the first PUK, and system being run under low memorymodel, then solve lock screen, exit system
Low memorymodel operation, wherein, low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.This
Invention can make the terminal enter low memorymodel and gradually run interim card after other people are using the second PUK unlock terminal,
So as to avoid other people long-time using terminals, the purpose of protection privacy is reached.
Description of the drawings
Fig. 1 is the hardware architecture diagram for realizing each one optional mobile terminal of embodiment of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Method flow diagrams of the Fig. 3 for a kind of protection terminal privacy of the embodiment of the present invention;
A kind of terminal schematic diagrames of the Fig. 4 for the embodiment of the present invention;
Fig. 5 is a kind of method flow diagram of protection terminal privacy in example of the present invention 1.
The realization of the object of the invention, functional characteristics and advantage will be described further in conjunction with the embodiments referring to the drawings.
Specific embodiment
Technical scheme is described in detail below in conjunction with drawings and Examples.
The mobile terminal of each embodiment of the application is realized referring now to Description of Drawings.In follow-up description, use
For representing the suffix of such as " module ", " part " or " unit " of element only for being conducive to the explanation of the present invention, itself
Not specific meaning.Therefore, " module " mixedly can be used with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP
The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated
Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement
Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram for realizing the application one optional mobile terminal of each embodiment.
Mobile terminal 1 00 can include wireless communication unit 110, A/V (audio/video) input block 120, user input
Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190
Etc..
Fig. 1 shows the mobile terminal 1 00 with various assemblies, it should be understood that being not required for implementing all showing
The component for going out.More or less of component can alternatively be implemented.Will be discussed in more detail below the element of mobile terminal 1 00.
Wireless communication unit 110 can generally include one or more assemblies, and which allows mobile terminal 1 00 and radio communication
Radio communication between system or network.For example, wireless communication unit 110 can include that broadcasting reception module 111, movement are logical
At least one of letter module 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel
Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent
The broadcast singal generated before the server or reception of broadcast singal and/or broadcast related information and/or broadcast related information
And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting
Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 is receiving.Broadcast singal can be present in a variety of manners, and for example, which can be with the electronics of DMB (DMB)
The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast
Receiver module 111 can receive signal broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111
Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video
Broadcast-hand-held (DVB-H), the Radio Data System of forward link media (MediaFLO@), received terrestrial digital broadcasting integrated service
Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/
Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice
Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can including WLAN (WLAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant
Tooth TM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module
115 typical case is GPS (global positioning system).According to current technology, GPS calculate from three or more satellites away from
From information and correct time information and the Information application triangulation for calculating, so as to according to longitude, latitude and height
Degree calculates three-dimensional current location information exactly.Currently, the method for calculating position and temporal information uses three satellites simultaneously
And the error of the position and temporal information for calculating is corrected by using an other satellite.Additionally, GPS can be by real-time
Ground Continuous plus current location information carrys out calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include 121 He of camera
Microphone 122, the static images that 121 pairs, camera is obtained by image capture apparatus in Video Capture pattern or image capture mode
Or the view data of video is processed.Picture frame after process is may be displayed on display unit 151.Jing cameras 121 are processed
Carry out sending out during picture frame afterwards can be stored in memory 160 (or other storage mediums) or via wireless communication unit 110
Send, two or more cameras 121 can be provided according to the construction of mobile terminal 1 00.Microphone 122 can be in telephone relation mould
Sound (voice data), and energy are received via microphone 122 in formula, logging mode, speech recognition mode etc. operational mode
Enough is voice data by such acoustic processing.Audio frequency (voice) data after process can be in the case of telephone calling model
Be converted to the form output that mobile communication base station can be sent to via mobile communication module 112.Microphone 122 can be implemented various
The noise of type eliminates (or suppression) algorithm and is being received and making an uproar of producing during sending audio signal with eliminating (or suppression)
Sound or interference.
User input unit 130 can generate key input data to control mobile terminal 1 00 according to the order of user input
Various operations.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome,
Touch pad (for example, detection is due to the sensitive component of the change of touched and caused resistance, pressure, electric capacity etc.), roller, shake
Bar etc..Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, and (for example, mobile terminal 1 00 opens or closes shape
State), the position of mobile terminal 1 00, user is for the presence or absence of contact (that is, touch input), the mobile terminal of mobile terminal 1 00
100 orientation, the acceleration or deceleration movement of mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00
The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed
The sliding-type phone is opened or is cut out.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or
Whether person's interface unit 170 is coupled with external device (ED).Sensing unit 140 can include proximity transducer 141.
Interface unit 170 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for device of the connection with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user
Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included
Etc..In addition, the device with identification module (hereinafter referred to as " identifying device ") can take the form of smart card, therefore, know
Other device can be connected with mobile terminal 1 00 via port or other attachment means.Interface unit 170 can be used for receive from
The input (for example, data message, electric power etc.) of external device (ED) and the input for receiving is transferred in mobile terminal 1 00
One or more elements can be used for the transmission data between mobile terminal 1 00 and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing to pass through which by electricity
Power provides the path of mobile terminal 1 00 from base or can serve as allowing from base the various command signals being input into pass through which
It is transferred to the path of mobile terminal 1 00.Can serve as recognizing mobile terminal 1 00 from the various command signals or electric power of base input
The signal whether being accurately fitted within base.Output unit 150 is configured to provide with vision, audio frequency and/or tactile manner
Output signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include aobvious
Show unit 151, dio Output Modules 152, alarm unit 153 etc..
The information that display unit 151 is processed in may be displayed on mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity
During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia files
Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern
Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, illustrate video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when the display unit 151 and touch pad touch-screen with formation superposed on one another in the form of layer, display unit
151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
It is a kind of.Some in these displays may be constructed such that transparence to allow user from outside viewing, and this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
The embodiment wanted, mobile terminal 1 00 can include two or more display units (or other display devices), for example, move
Dynamic terminal 100 can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect
Touch input pressure and touch input position and touch input area.
Dio Output Modules 152 can be in mobile terminal 1 00 in call signal reception pattern, call mode, record mould
It is when under the isotypes such as formula, speech recognition mode, broadcast reception mode, that wireless communication unit 110 is received or in memory
The voice data transducing audio signal that stores in 160 and it is output as sound.And, dio Output Modules 152 can provide with
(for example, call signal receives sound, message sink sound etc. to the audio output of the specific function correlation that mobile terminal 1 00 is performed
Deng).Dio Output Modules 152 can include loudspeaker, buzzer etc..
Alarm unit 153 can provide output so that event is notified to mobile terminal 1 00.Typical event can be with
Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit
153 can provide output in a different manner with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating
Output is provided, when calling, message or some other entrance communication (incoming communication) are received, alarm list
Unit 153 can provide tactile output (that is, vibrating) to notify to user.Tactile output as by providing, even if
When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153
The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.
Memory 160 can store software program for the process and control operation performed by controller 180 etc., Huo Zheke
With the data (for example, telephone directory, message, still image, video etc.) for temporarily storing own Jing outputs or will export.And
And, memory 160 can be storing the vibration of various modes with regard to exporting when touching and being applied to touch-screen and audio signal
Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many
Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection
The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data
The related control of communication, video calling etc. and process.In addition, controller 180 can be included for reproducing (or playback) many matchmakers
The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or it is so structured that and control
Device 180 is separated.Controller 180 can be with execution pattern identifying processing, by the handwriting input for performing on the touchscreen or picture
Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Appropriate electric power needed for part and component.
Various embodiments described herein can be with use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implementing.For hardware is implemented, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein
At least one in electronic unit implementing, in some cases, can be implemented in controller 180 by such embodiment.
For software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation
Software module is implementing.Software code can be come by the software application (or program) write with any appropriate programming language
Implement, perform during software code can be stored in memory 160 and by controller 180.
So far, own Jing describes mobile terminal 1 00 according to its function.In addition, the mobile terminal 1 00 in the embodiment of the present invention
Can be such as folded form, board-type, oscillating-type, sliding-type and other various types of mobile terminals, specifically not do herein
Limit.
As shown in Figure 1 mobile terminal 1 00 may be constructed such that using via frame or packet transmission data it is all if any
Line and wireless communication system and satellite-based communication system are operating.
The communication system that mobile terminal wherein of the invention is operable to is described referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer.For example, used by communication system
Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system
System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under
The description in face is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 1s 00, multiple base stations (BS) 270, base station
Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC 280 is configured to and Public Switched Telephony Network (PSTN)
290 form interface.MSC 280 is also structured to be formed with the BSC 275 that can be couple to base station 270 via back haul link and is connect
Mouthful.If back haul link can be constructed according to any one in the interface that Ganji knows, the interface can include such as Europe mark
Quasi- high power capacity digital circuit/Unite States Standard high power capacity digital circuit (E1/T1), asynchronous transfer mode (ATM), procotol
(IP), point-to-point protocol (PPP), frame relay, high-bit-rate digital subscriber line road (HDSL), Asymmetrical Digital Subscriber Line (ADSL)
Or all kinds digital subscriber line (xDSL).It will be appreciated that system can include multiple BSC 275 as shown in Figure 2.
Each BS 270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction
Each subregion that line is covered is radially away from BS 270.Or, each subregion can be by for two of diversity reception or more
Multiple antennas are covered.Each BS 270 may be constructed such that the multiple frequency distribution of support, and each frequency distribution with specific frequency
Spectrum (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed intersect can be referred to as CDMA Channel.BS 270 can also be referred to as base station transceiver
System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly representing single BSC
275 and at least one BS 270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS 270 can be claimed
For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to broadcsting transmitter (BT) 295 mobile terminal operated in system
100.Broadcasting reception module 111 is arranged at mobile terminal 1 00 to receive the broadcast sent by BT 295 as shown in Figure 1
Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.Satellite 300 helps position multiple mobile terminals
At least one of 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that be, it is possible to use any number of satellite obtains useful
Location information.Location information module 115 as shown in Figure 1 is (such as:GPS) it is generally configured to coordinate to obtain with satellite 300
The location information that must be wanted.Substitute GPS tracking techniques or outside GPS tracking techniques, it is possible to use can track mobile whole
Other technologies of the position at end.In addition, at least one gps satellite 300 can optionally or additionally process satellite dmb biography
It is defeated.
Used as a typical operation of wireless communication system, BS 270 receives the reverse strand from various mobile terminal 1s 00
Road signal.Mobile terminal 1 00 generally participates in call, information receiving and transmitting and other types of communication.Each of certain base station reception is anti-
Processed in specific BS 270 to link signal.The data of acquisition are forwarded to the BSC 275 of correlation.BSC provides logical
Words resource allocation and the mobile management function of the coordination including the soft switching process between BS 270.BSC 275 will also be received
Data be routed to MSC 280, its provide for PSTN 290 formed interface extra route service.Similarly, PSTN
290 form interfaces with MSC280, and MSC and BSC 275 form interface, and BSC 275 correspondingly controls BS 270 with by forward direction
Link signal is sent to mobile terminal 1 00.
Based on above-mentioned mobile terminal hardware configuration and communication system, the application method each embodiment is proposed.
As shown in figure 3, the embodiment of the present invention proposes a kind of method of protection terminal privacy, including:
S310, under screen lock state, detects the PUK of user input;
S320, if the second PUK is detected, and system is not run under low memorymodel, then solve lock screen, make system
Run into low memorymodel;If detecting the first PUK, and system being run under low memorymodel, then solve lock screen, make
System exits low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy;
Methods described can also include following features:
Alternatively, after the PUK of the detection user input, methods described also includes:If detecting the second PUK,
And system is run under low memorymodel, then judge the currently available internal memory of system whether more than or equal to threshold value;If so, then unlock
Screen, makes system continue to run under low memorymodel;If it is not, then keeping screen lock state;
Alternatively, it is described the system is run into low memorymodel, including:
Start internal memory filling process, the internal memory filling process applies for specified quantity from system according to default initial value
Memory headroom, and gradually apply for memory headroom from system according to predetermined policy;
It is described to make the system exit low memorymodel operation, including:
The internal memory filling process is closed, all memory headrooms that the internal memory fills process application are discharged;
Alternatively, the predetermined policy includes:When listening to user operation every time, step value is reduced according to default internal memory
Apply for the memory headroom of specified quantity from system;And/or step value Shen from system is reduced according to default internal memory periodically
Please specified quantity memory headroom;
Alternatively, the memory headroom that step value applies for specified quantity from system is reduced according to default internal memory, including:
Judge the currently available internal memory of system whether more than or equal to threshold value, be then according to default internal memory reduce step value from
Apply for the memory headroom of specified quantity in system;
In other implementations, system can have two kinds of mode of operations, if it is defeated under screen lock state to detect user
The second PUK for entering, and system operation is in the first mode of operation, then solve lock screen, and by described the first of the system operation
Mode of operation switches to the second mode of operation;If the first PUK of user input is detected under screen lock state, and system fortune
Row solves lock screen and second mode of operation of the system operation is switched to described the in second mode of operation, then
One mode of operation;Wherein, first mode of operation is the mode of operation that process is not filled to memory headroom, described second
Mode of operation is the mode of operation that process is filled to memory headroom;The filling is processed and is referred to:System starts internal memory filling
Process, internal memory filling process apply for the memory headroom of specified quantity from system according to default initial value, and according to
Predetermined policy gradually applies for memory headroom from system.
As shown in figure 4, the embodiment of the present invention proposes a kind of terminal, including:
Detection module 401, for, under screen lock state, detecting the PUK of user input;
Unblock processing module 402, if for detecting the second PUK, and system is not run under low memorymodel, then
Solution lock screen, makes system run into low memorymodel;If detecting the first PUK, and system being transported under low memorymodel
OK, then lock screen is solved, makes system exit low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
Alternatively, processing module 402 is unlocked, for making the system run into low memorymodel, including:Start internal memory
Filling process, the internal memory filling process apply for the memory headroom of specified quantity from system according to default initial value, and
Gradually apply for memory headroom from system according to predetermined policy;
Unblock processing module, for making the system exit low memorymodel operation, including:Close the internal memory to be filled into
Journey, discharges all memory headrooms that the internal memory fills process application.
Alternatively, the predetermined policy includes:When listening to user operation every time, step value is reduced according to default internal memory
Apply for the memory headroom of specified quantity from system;And/or step value Shen from system is reduced according to default internal memory periodically
Please specified quantity memory headroom.
Alternatively, processing module 402 is unlocked, and applies specifying number for step value being reduced according to default internal memory from system
The memory headroom of amount, including:Judge that the currently available internal memory of system, whether more than or equal to threshold value, is subtracted according to default internal memory
Few step value applies for the memory headroom of specified quantity from system.
Alternatively, processing module 402 is unlocked, if it is additionally operable to detect the second PUK, and system is under low memorymodel
Whether operation, then judge the currently available internal memory of system more than or equal to threshold value;If so, lock screen is then solved, system is continued low
Run under memorymodel;If it is not, then keeping screen lock state
Example 1
As shown in figure 5, a kind of method of protection terminal privacy of this example, comprises the following steps:
Step S501, detects whether the PUK of user input is received in mobile phone locking screen interface, is then execution step
S502, otherwise execution step S501;
Step S502, determines the type of the PUK, when the PUK is the PUK of general mode, performs step
Rapid S508, when the PUK is the PUK of low memorymodel, execution step S503;
Step S503, mobile phone screen unblock, (internal memory is filled out to start a Resident Process for filling internal memory in system background
It is charged into journey), the internal memory filling process reduces memory headroom of the initial value to system application specified quantity according to default internal memory,
System enters low memorymodel;
Wherein, the internal memory reduces initial value and is system default value or is set by user oneself;Such as, in system default
It is 200M bytes to deposit reduction initial value;
Step S504, judges whether to listen to user operation (such as, starting new page, list slip etc.), is to perform
Step S505, otherwise execution step S504;
Step S505, judges currently available internal memory whether more than or equal to threshold value, is then execution step S506, otherwise performs
Step S507;
Wherein, the threshold value is system default value or is set by user oneself;Such as, threshold value described in system default is
300M bytes;
Step S506, the internal memory filling process reduce step value according to default internal memory and apply for specified quantity from system
Memory headroom, return to step S504;
Wherein, the internal memory reduces step value and is system default value or is set by user oneself;Such as, in system default
It is 100M bytes to deposit reduction step value;
Wherein, as the free memory in mobile phone is less and less, Android (Android) system can carry out frequently Gc
(Garbage Collection, garbage reclamation), so as to cause system to become interim card when responding to user.System operation
Interim card can reduce the desire that user uses mobile phone.
By Android JNI, (locally exploitation connects the internal memory filling process for Java Native Interface, Java
Mouthful) call Native (local framework) layer method to carry out the mode of internal memory application, can realize that a process is allowed in Android
In the range of application to larger internal memory without there is OOM (Out ofMemory, internal memory overflow) extremely.By internal memory is filled
Process is set to foreground and is served by, and the process under low memory condition can be avoided to be killed by Android reclaim mechanisms.
Step S507, judges that whether mobile phone enters screen lock state, is then return to step S501, otherwise execution step S507;
Step S508, judges system whether in low memorymodel, is then execution step S509, otherwise execution step
S510;
Step S509, closes internal memory filling process, discharges the memory headroom (Installed System Memory that the internal memory fills process application
Recover normal), system exits low memorymodel;
Step S510, mobile phone are unlocked, in the normal mode runtime;
The method of above-mentioned protection terminal privacy, can be used for following scene:
(1) other people require to use mobile phone to user;
(2) user informs that other people can enter the PUK (the second PUK) of low memorymodel;
(3) other people after locking screen interface is input into second PUK, mobile phone is unlocked and enters low memorymodel;
(3) other people start mobile phone of leafing through, for example, open wechat;
(4) other people perform multi-pass operation (such as, into wechat, multiple slip wechat list, the behaviour such as chat record of leafing through
Make) after, mobile phone enters the state of obvious interim card;
(5) other people run interim card due to mobile phone, and the desire of mobile phone of leafing through declines rapidly, mobile phone will be returned user;
(6) user after the PUK (the first PUK) that locking screen interface is input under normal use pattern, mobile phone exits low
Memorymodel, Installed System Memory recover normal, and user normally uses mobile phone.
It should be noted that herein, term " including ", "comprising" or its any other variant are intended to non-row
His property is included, so that a series of process, method, article or device including key elements not only include those key elements, and
And also include other key elements being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element for being limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), use so that a station terminal equipment including some instructions (can be mobile phone, computer, clothes
Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the present invention is not thereby limited, it is every using this
Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
1. it is a kind of protection terminal privacy method, including:
Under screen lock state, the PUK of user input is detected;
If detecting the second PUK, and system not being run under low memorymodel, then solve lock screen, system is made to enter low internal memory
Mode operation;If detecting the first PUK, and system being run under low memorymodel, then solve lock screen, exit system low
Memorymodel runs;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
2. method according to claim 1, it is characterised in that:It is described system is included into the operation of low memorymodel:
Start internal memory filling process, the internal memory filling process is applied in specified quantity from system according to default initial value
Space is deposited, and gradually applies for memory headroom from system according to predetermined policy;
It is described to make system exit the operation of low memorymodel to include:
The internal memory filling process is closed, all memory headrooms that the internal memory fills process application are discharged.
3. method according to claim 2, it is characterised in that:The predetermined policy includes:
When listening to user operation every time, step value is reduced according to default internal memory and applies for that the internal memory of specified quantity is empty from system
Between;And/or the memory headroom that step value applies for specified quantity from system is reduced according to default internal memory periodically.
4. method according to claim 3, it is characterised in that:It is described according to default internal memory reduce step value from system
The memory headroom of application specified quantity includes:
Whether the currently available internal memory of system is judged more than or equal to threshold value, be that step value is reduced from system according to default internal memory then
The memory headroom of middle application specified quantity.
5. the method according to any one of claim 1-4, it is characterised in that the PUK of the detection user input it
Afterwards, methods described also includes:
If detecting the second PUK, and system being run under low memorymodel, then judge whether the currently available internal memory of system is big
In or be equal to threshold value;If so, lock screen is then solved, makes system continue to run under low memorymodel;If it is not, then keeping screen locking shape
State.
6. a kind of terminal, including:
Detection module, for, under screen lock state, detecting the PUK of user input;
Unblock processing module, if for detecting the second PUK, and system is not run under low memorymodel, then solve screen locking
Curtain, makes system run into low memorymodel;If detecting the first PUK, and system being run under low memorymodel, then solve
Lock screen, makes system exit low memorymodel operation;
Wherein, the low memorymodel is the mode of operation that system free memory is gradually decreased according to predetermined policy.
7. terminal according to claim 6, it is characterised in that:
Unblock processing module, for making the system run into low memorymodel, including:
Start internal memory filling process, the internal memory filling process is applied in specified quantity from system according to default initial value
Space is deposited, and gradually applies for memory headroom from system according to predetermined policy;
Unblock processing module, for making the system exit low memorymodel operation, including:
The internal memory filling process is closed, all memory headrooms that the internal memory fills process application are discharged.
8. terminal according to claim 7, it is characterised in that:The predetermined policy includes:
When listening to user operation every time, step value is reduced according to default internal memory and applies for that the internal memory of specified quantity is empty from system
Between;And/or the memory headroom that step value applies for specified quantity from system is reduced according to default internal memory periodically.
9. terminal according to claim 8, it is characterised in that:
Unblock processing module, for reducing the memory headroom that step value applies for specified quantity from system according to default internal memory,
Including:Judge that the currently available internal memory of system, whether more than or equal to threshold value, is, step value is reduced from being according to default internal memory
Apply for the memory headroom of specified quantity in system.
10. the terminal according to any one of claim 6-9, it is characterised in that:
Unblock processing module, if it is additionally operable to detect the second PUK, and system is run under low memorymodel, then judge system
Whether currently available internal memory is more than or equal to threshold value;If so, lock screen is then solved, makes system continue to run under low memorymodel;
If it is not, then keeping screen lock state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610963309.XA CN106529346B (en) | 2016-10-28 | 2016-10-28 | Method for protecting terminal privacy and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610963309.XA CN106529346B (en) | 2016-10-28 | 2016-10-28 | Method for protecting terminal privacy and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106529346A true CN106529346A (en) | 2017-03-22 |
CN106529346B CN106529346B (en) | 2020-02-14 |
Family
ID=58326360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610963309.XA Active CN106529346B (en) | 2016-10-28 | 2016-10-28 | Method for protecting terminal privacy and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529346B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102271332A (en) * | 2011-07-18 | 2011-12-07 | 中兴通讯股份有限公司 | Method and device for maintaining secrecy of terminal information |
CN103945456A (en) * | 2014-05-12 | 2014-07-23 | 武汉邮电科学研究院 | LTE (long term evolution) base station user plane efficient UDP (user datagram protocol) data transmission optimization method based on Linux system |
CN104967736A (en) * | 2015-06-04 | 2015-10-07 | 上海卓易科技股份有限公司 | Multi-user switching method and apparatus |
CN105897430A (en) * | 2016-06-22 | 2016-08-24 | 浙江德景电子科技有限公司 | User management method and system for intelligent terminal |
-
2016
- 2016-10-28 CN CN201610963309.XA patent/CN106529346B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102271332A (en) * | 2011-07-18 | 2011-12-07 | 中兴通讯股份有限公司 | Method and device for maintaining secrecy of terminal information |
CN103945456A (en) * | 2014-05-12 | 2014-07-23 | 武汉邮电科学研究院 | LTE (long term evolution) base station user plane efficient UDP (user datagram protocol) data transmission optimization method based on Linux system |
CN104967736A (en) * | 2015-06-04 | 2015-10-07 | 上海卓易科技股份有限公司 | Multi-user switching method and apparatus |
CN105897430A (en) * | 2016-06-22 | 2016-08-24 | 浙江德景电子科技有限公司 | User management method and system for intelligent terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106529346B (en) | 2020-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105100476B (en) | A kind of mobile terminal unlocking device and method | |
CN106231087B (en) | A kind of method and apparatus of front and back sides dual-screen display device false-touch prevention | |
CN106654424A (en) | Charging method and terminal | |
CN106027795B (en) | A kind of switching method and terminal of double-sided screen | |
CN105208219A (en) | Mobile terminal falling reminding method and device | |
CN104679890B (en) | Picture method for pushing and device | |
CN106527933A (en) | Control method and device of edge gesture of mobile terminal | |
CN105430258B (en) | A kind of method and apparatus of self-timer group photo | |
CN104836884A (en) | Standby unlocking method of mobile terminal, and mobile terminal | |
CN106775372A (en) | A kind of display adjusting method of suspension procedure disk, device and terminal | |
CN104735254B (en) | terminal screen locking method and system | |
CN106412328B (en) | A kind of method and apparatus obtaining field feedback | |
CN104883454B (en) | A kind of display control method and display control terminal | |
CN106681722A (en) | Process processing method and electronic device | |
CN107133508A (en) | Application management method and mobile terminal | |
CN106792607A (en) | Mobile terminal and the method for reducing mobile terminal power consumption | |
CN106484534A (en) | Control method for the mobile terminal of displaying and control device | |
CN106488035A (en) | A kind of mobile terminal and control method | |
CN106911486B (en) | A kind of message push processing method, apparatus and system | |
CN106897010A (en) | Touch screen terminal and control method | |
CN106777251A (en) | A kind of file management method and device | |
CN106792603A (en) | Mobile terminal and its call forwarding method | |
CN106792878A (en) | A kind of data traffic monitoring method and device | |
CN106856617A (en) | A kind of terminal and residence reselecting | |
CN106412877A (en) | Activation method and activation device for SIM card of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200115 Address after: Room 301, floor 3, building 2, No.28, Jiuhe Road, Jianggan District, Hangzhou City, Zhejiang Province Applicant after: Qishitong Group Co., Ltd Address before: 518000 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor Applicant before: Nubian Technologies Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |