CN106778158A - A kind of information protection device and method - Google Patents

A kind of information protection device and method Download PDF

Info

Publication number
CN106778158A
CN106778158A CN201611059841.5A CN201611059841A CN106778158A CN 106778158 A CN106778158 A CN 106778158A CN 201611059841 A CN201611059841 A CN 201611059841A CN 106778158 A CN106778158 A CN 106778158A
Authority
CN
China
Prior art keywords
user
application program
mobile terminal
allowing
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611059841.5A
Other languages
Chinese (zh)
Other versions
CN106778158B (en
Inventor
李成
陈鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HEYU HEALTH TECHNOLOGY Co.,Ltd.
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201611059841.5A priority Critical patent/CN106778158B/en
Publication of CN106778158A publication Critical patent/CN106778158A/en
Application granted granted Critical
Publication of CN106778158B publication Critical patent/CN106778158B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Telephone Function (AREA)

Abstract

The present invention proposes a kind of information protection device and method, and the method includes:Mobile terminal detects the biometric feature of user;Mobile terminal is based on the biometric feature of the user for detecting, and the corresponding application program for allowing to use of the user is presented;Mobile terminal is detecting the user when the application program of the presentation is triggered, and according to the right of using functions for being pre-configured with the corresponding application program for allowing to use of the user, the corresponding function of the application program for allowing and using is provided for the user.A kind of information protection device of the present invention and method, can effectively improve the information security of mobile terminal, the information in effectively preventing the other users outside owner from stealing mobile terminal.

Description

A kind of information protection device and method
Technical field
The present invention relates to field of information security technology, more particularly to a kind of information protection device and method.
Background technology
As mobile terminal is quickly popularized, the information security of mobile terminal is more and more important.When mobile terminal is lost, or move When dynamic terminal is used by other users outside mobile terminal owner, the important information in mobile terminal is (for example, short message or wechat letter Breath etc.) may reveal;Mobile payment function (for example, Alipay or bank application) in mobile terminal may be stolen With.
The content of the invention
The technical problem to be solved in the present invention is to provide a kind of information protection device and method, can overcome prior art Middle mobile terminal when the user outside by owner uses, information easily leakage defect.
To achieve the above object, a kind of information protection device that the present invention is provided, including:
Detection module, the biometric feature for detecting user;
First protection module, for the biometric feature based on the user for detecting, is presented user's correspondence The application program for allowing to use;
Second protection module, for detecting the user when the application program of the presentation is triggered, according to advance The right of using functions of the corresponding application program for allowing to use of the user is configured, described allows to use for the user provides Application program corresponding function.
Preferably, described device also includes:
Logging modle, it is mobile for after corresponding function of the user using the application program for allowing and using Terminal stores the application program usage record of the user on backstage, and makes to the application program that setting user provides the user With record.
Preferably, described device also includes:
Recovery module, for after corresponding function of the user using the application program for allowing and using, if institute State user and revise information in the application program for allowing and using, then in the biometric feature of the setting user for detecting When, recover the information that the user revises.
Preferably, described device also includes:
Closedown module, for after corresponding function of the user using the application program for allowing and using, setting The user is forbidden to use the corresponding function of the application program for allowing and using after fixed duration.
Preferably, the user biological identification feature at least includes one below:
User fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint.
Additionally, to achieve the above object, the present invention also proposes a kind of information protecting method, including:
Mobile terminal detects the biometric feature of user;
Mobile terminal is based on the biometric feature of the user for detecting, and the presentation user is corresponding to be allowed to use Application program;
Mobile terminal detecting the user when the application program of the presentation is triggered, according to being pre-configured with the use The right of using functions of the corresponding application program for allowing to use in family, for the user provides the application program for allowing and using Corresponding function.
Preferably, methods described also includes:User described in access right in configuration user's correspondence application program makes After corresponding function with the application program for allowing and using, mobile terminal makes in the application program that backstage stores the user With record, and the application program usage record of the user is provided to setting user.
Preferably, methods described also includes:
The user is configured using the corresponding function of the application program for allowing and using apply journey in the user After the access right of sequence, if the user deletes in the application program for allowing the application program for using to obtain access right Breath is converted to, then in the biometric feature of the setting user for detecting, mobile terminal recovers the information that the user revises.
Preferably, methods described also includes:
After corresponding function of the user using the application program for allowing and using, mobile terminal setting when The user is forbidden to use the corresponding function of the application program for allowing and using after length.
Preferably, the user biological identification feature at least includes one below:
User fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint.
A kind of information protection device of the present invention and method, can effectively improve the information security of mobile terminal, effectively Information in preventing the other users outside owner from stealing mobile terminal.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram of the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the schematic diagram according to user fingerprints hide application program of first embodiment of the invention;
Fig. 3 is the information protecting method flow chart of first embodiment of the invention;
Fig. 4 is the information protecting method flow chart of second embodiment of the invention;
Fig. 5 is the information protection device composition structural representation of third embodiment of the invention;
Fig. 6 is the information protection device composition structural representation of fourth embodiment of the invention.
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the invention is realized referring now to Description of Drawings.In follow-up description, use For represent element such as " module ", " part " or " unit " suffix only for being conducive to explanation of the invention, itself Not specific meaning.Therefore, " module " can be used mixedly with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is that the hardware configuration of the mobile terminal for realizing each embodiment of the invention is illustrated.
Mobile terminal 1 00 can include wireless communication unit 110, A/V (audio/video) input block 120, user input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190 Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups for showing Part.More or less component can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 1 00 and wireless communication system Or the radio communication between network.For example, wireless communication unit can include broadcasting reception module 111, mobile communication module 112nd, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 is received.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of DMB (DMB) The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast Receiver module 111 can receive signal and broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111 Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video Broadcast-hand-held (DVB-H), Radio Data System, the received terrestrial digital broadcasting integrated service of forward link media (MediaFLO@) Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/ Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module Typical case be GPS (global positioning system).According to current technology, GPS module 115 is calculated and comes from three or more satellites Range information and correct time information and the Information application triangulation for calculating, so as to according to longitude, latitude Highly accurately calculate three-dimensional current location information.Currently, defended using three for calculating the method for position and temporal information Star and the position that is calculated by using other satellite correction and the error of temporal information.Additionally, GPS module 115 Can be by Continuous plus current location information in real time come calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121 Microphone 122, the static images that 121 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus Or the view data of video is processed.Picture frame after treatment may be displayed on display unit 151.Processed through camera 121 Picture frame afterwards can be stored in memory 160 (or other storage mediums) or sent out via wireless communication unit 110 Send, two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone calling model, note Sound (voice data) is received via microphone in record pattern, speech recognition mode etc. operational mode, and can be by so Acoustic processing be voice data.Audio (voice) data after treatment can be converted in the case of telephone calling model can The form for being sent to mobile communication base station via mobile communication module 112 is exported.Microphone 122 can implement various types of making an uproar Sound eliminates (or suppression) algorithm to eliminate the noise or dry that (or suppression) produces during reception and transmission audio signal Disturb.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user input Plant operation.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, touch Plate (for example, detection due to being touched caused by resistance, pressure, electric capacity etc. change sensitive component), roller, rocking bar etc. Deng.Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, (for example, mobile terminal 1 00 opens or closes shape State), the presence or absence of the contact (that is, touch input) of the position of mobile terminal 1 00, user for mobile terminal 1 00, mobile terminal The acceleration or deceleration movement of 100 orientation, mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00 The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed The sliding-type phone is opened or closed.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 can will be combined below including proximity transducer 141 Touch-screen is described to this.
Interface unit 170 is connected the interface that can pass through with mobile terminal 1 00 as at least one external device (ED).For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know Other device can be connected via port or other attachment means with mobile terminal 1 00.Interface unit 170 can be used for reception and come from The input (for example, data message, electric power etc.) of the external device (ED) and input that will be received is transferred in mobile terminal 1 00 One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity Power provides to the path of mobile terminal 1 00 from base or can serve as allowing the various command signals being input into from base to pass through it It is transferred to the path of mobile terminal.Be can serve as recognizing that mobile terminal is from the various command signals or electric power of base input The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio and/or tactile manner Go out signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include display Unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, show video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit 151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired implementation method, mobile terminal 1 00 can include two or more display units (or other display devices), for example, moving Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect touch Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is that wireless communication unit 110 is received or in memory 160 when under the isotypes such as speech recognition mode, broadcast reception mode The voice data transducing audio signal of middle storage and it is output as sound.And, dio Output Modules 152 can be provided and movement The audio output (for example, call signal receives sound, message sink sound etc.) of the specific function correlation that terminal 100 is performed. Dio Output Modules 152 can include loudspeaker, buzzer etc..
Alarm unit 153 can provide output and be notified to mobile terminal 1 00 with by event.Typical event can be with Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit 153 can in a different manner provide output with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating Output is provided, when calling, message or some other entrance communication (incomingcommunication) are received, alarm list Unit 153 can provide tactile output (that is, vibrating) to notify to user.Exported by providing such tactile, even if When in pocket of the mobile phone of user in user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.
Memory 160 can store software program for the treatment and control operation performed by controller 180 etc., Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And, memory 160 can store the vibration of various modes on being exported when touching and being applied to touch-screen and audio signal Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data Communication, video calling etc. related control and treatment.In addition, controller 180 can be included for reproducing (or playback) many matchmakers The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or can be structured as and control Device 180 is separated.Controller 180 can be with execution pattern identifying processing, the handwriting input that will be performed on the touchscreen or picture Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Appropriate electric power needed for part and component.
Various implementation methods described herein can be with use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implemented.Implement for hardware, implementation method described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein At least one in electronic unit is implemented, and in some cases, such implementation method can be implemented in controller 180. For software implementation, the implementation method of such as process or function can with allow to perform the single of at least one function or operation Software module is implemented.Software code can be come by the software application (or program) write with any appropriate programming language Implement, software code can be stored in memory 160 and performed by controller 180.
So far, oneself according to its function through describing mobile terminal.Below, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is used as showing Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 1 00 as shown in Figure 1 may be constructed such that using via frame or packet transmission data it is all if any Line and wireless communication system and satellite-based communication system are operated.
First embodiment of the invention, a kind of information protecting method, as shown in figures 2-3, including step in detail below:
Step S101, mobile terminal detects the biometric feature of user.
Wherein, user biological identification feature at least includes one below:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known Other feature.
The biometric feature of mobile terminal detection user is prior art, be will not be described here.
Step S102, mobile terminal is based on the biometric feature of the user for detecting, and presentation user is corresponding to be allowed to make Application program;
Specifically, step S102, including:
Mobile terminal is based on the biometric feature of the user for detecting, and hides the corresponding application journey for prohibitting the use of of user Sequence, the corresponding application program for allowing to use of presentation user.
For example:As shown in Fig. 2 mobile terminal is based on the mobile phone that the fingerprint sensor at mobile terminal back is detected The fingerprint of main child, hides corresponding various game, bank application and the payment for prohibitting the use of of child owner in Fig. 2 square frames The application programs such as treasured;The corresponding educational application program of mobile terminal child owner is presented.
The application programs such as the various game of mobile terminal child owner addiction can effectively be avoided;And can effectively keep away Exempt from mobile terminal child owner due to being propped up caused by the internet payment application program such as maloperation bank application and Alipay The behavior of paying;Child is encouraged to use educational application program;While having cultivated child's good habits and customs, movement is effectively protected The financial security of terminal owner.
Step S103, mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with user The right of using functions of the corresponding application program for allowing to use, provides the user the corresponding work(of the application program for allowing to use Energy.
Specifically, step S103, including:
Mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user The right of using functions of the application program for using, provides the user whole corresponding functions or the part of the application program for allowing to use Corresponding function.
For example:Mobile terminal is based on the client iris of the borrow mobile terminal user for detecting, according to being pre-configured with borrow The right of using functions of the corresponding application program for allowing to use of mobile terminal user, permission is provided to borrow mobile terminal user Whole corresponding functions or wechat program circle of friends function of the voice call for using, and it is micro- to forbid borrow mobile terminal user to use The other functions of letter program.Can effectively avoid immobile terminal owner user from borrowing temporarily when mobile terminal is used and usurp machine Main wechat payment function is paid, and is effectively protected the safety of payment of mobile terminal owner.Meanwhile, it is capable to effectively keep away Exempt from immobile terminal owner user and borrow the instant communication message that mobile terminal owner is peeped when mobile terminal is used temporarily, and/ Or message is sent to the contact person in wechat by the wechat of mobile terminal owner malice, it is effectively protected mobile terminal owner Individual privacy and information security.
And for example:Mobile terminal is based on the user fingerprints of the borrow mobile terminal user for detecting, according to being pre-configured with borrow The access right of the corresponding application program for allowing to use of mobile terminal user, allows to use for borrow mobile terminal user provides Voice call whole corresponding functions or the look facility of stock application program, and forbid borrow mobile terminal user use stock The Stock Trading function of ticket application program.Can effectively avoid immobile terminal owner user from borrowing mobile terminal temporarily to use When usurp the stock application program of owner and carry out Stock Trading, be effectively protected the property safety of mobile terminal owner.
Second embodiment of the invention, a kind of information protecting method, as shown in figure 4, including step in detail below:
Step S201, mobile terminal detects the biometric feature of user.
Wherein, user biological identification feature at least includes one below:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known Other feature.
The biometric feature of mobile terminal detection user is prior art, be will not be described here.
Step S202, mobile terminal is based on the biometric feature of the user for detecting, and presentation user is corresponding to be allowed to make Application program;
Specifically, step S202, including:
Mobile terminal is based on the biometric feature of the user for detecting, and hides the corresponding application journey for prohibitting the use of of user Sequence, the corresponding application program for allowing to use of presentation user.
For example:The finger of mobile terminal child owner that the fingerprint sensor that mobile terminal is based on mobile terminal back is detected Line, hides the application programs such as corresponding various game, bank application and the Alipay for prohibitting the use of of child owner;Present and move Move the corresponding educational application program of terminal child owner.
The application programs such as the various game of mobile terminal child owner addiction can effectively be avoided;And can effectively keep away Exempt from mobile terminal child owner due to being propped up caused by the internet payment application program such as maloperation bank application and Alipay The behavior of paying;Child is encouraged to use educational application program;While having cultivated child's good habits and customs, movement is effectively protected The financial security of terminal owner.
Step S203, mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with user The right of using functions of the corresponding application program for allowing to use, provides the user the corresponding work(of the application program for allowing to use Energy.
Specifically, step S203, including:
Mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user The right of using functions of the application program for using, provides the user whole corresponding functions or the part of the application program for allowing to use Corresponding function.
For example:Mobile terminal is based on the client iris of the borrow mobile terminal user for detecting, according to being pre-configured with borrow The right of using functions of the corresponding application program for allowing to use of mobile terminal user, permission is provided to borrow mobile terminal user Whole corresponding functions or wechat program circle of friends function of the voice call for using, and it is micro- to forbid borrow mobile terminal user to use The other functions of letter program.Can effectively avoid immobile terminal owner user from borrowing temporarily when mobile terminal is used and usurp machine Main wechat payment function is paid, and is effectively protected the safety of payment of mobile terminal owner.Meanwhile, it is capable to effectively keep away Exempt from immobile terminal owner user and borrow the instant communication message that mobile terminal owner is peeped when mobile terminal is used temporarily, and/ Or message is sent to the contact person in wechat by the wechat of mobile terminal owner malice, it is effectively protected mobile terminal owner Individual privacy and information security.
And for example:Mobile terminal is based on the user fingerprints of the borrow mobile terminal user for detecting, according to being pre-configured with borrow The access right of the corresponding application program for allowing to use of mobile terminal user, allows to use for borrow mobile terminal user provides Voice call whole corresponding functions or the look facility of stock application program, and forbid borrow mobile terminal user use stock The Stock Trading function of ticket application program.Can effectively avoid immobile terminal owner user from borrowing mobile terminal temporarily to use When usurp the stock application program of owner and carry out Stock Trading, be effectively protected the property safety of mobile terminal owner.
Step S204, mobile terminal stores the application program usage record of user on backstage, and provides use to setting user The application program usage record at family.
Specifically, step S204, including:
After corresponding function of the user using the application program for allowing to use, mobile terminal should backstage storage user's Program usage record is used, and the application program usage record of user is provided to setting user.
Setting user can be the other users of owner, or mobile terminal the owner setting of mobile terminal.
For example:Borrowing repertoire and wechat of the mobile terminal user using the voice call application program for allowing to use After program circle of friends function, mobile terminal backstage storage borrow mobile terminal user application program usage record, and to Mobile terminal owner provides the application program usage record for borrowing mobile terminal user.
It is capable of the user of prompting mobile terminal owner borrow mobile terminal using the situation of application program, such as by voice Talk application program malicious call 110 or 119 is expected someone's call;Or malice replys wechat program circle of friends.
And for example:After repertoire of child owner using the game application for allowing to use, mobile terminal is rear Platform stores the application program usage record of child owner, and uses note to the application program that mobile terminal owner provides child owner Record.
Parent can be helped effectively to monitor the time of child play game, and play game playing habits, child can be helped to set up Good habits and customs.
Step S205, if user revises information in the application program for allowing to use, the setting user's for detecting During biometric feature, mobile terminal recovers the information that user revises.
Specifically, step S205, including:
If user modification or deletion information in the application program for obtaining access right, mobile terminal are stored on backstage and used Family modification or the information before deleting in the application program for obtaining access right, and know in the biological of the setting user for detecting During other feature, recover user modification or the information deleted in the application program for obtaining access right.
For example:If borrowing mobile terminal user malicious modification or to be deleted in the instant messaging application program for obtaining access right Except information, then mobile terminal borrows mobile terminal user in the instant messaging application program for obtaining access right in backstage storage Information before modification or deletion, and in the biometric feature of the owner for detecting, recover borrow mobile terminal user and exist Obtain the information of modification or deletion in the instant messaging application program of access right.It is effectively protected information security.
And for example:If child owner changes unintentionally or deletes letter in the instant messaging application program for obtaining access right Cease, then mobile terminal is changed in the instant messaging application program for obtaining access right in backstage storage child owner or deletes it Preceding information, and in the biometric feature of the owner for detecting, recover child owner and obtaining the IMU of access right Modification or the information deleted in news application program.It is effectively protected the information security of owner.
Step S206, mobile terminal forbids user to use the corresponding of the application program for allowing to use after the duration of setting Function.
For example:After repertoire of child owner using the game application for allowing to use, mobile terminal is setting Fixed duration forbids child owner to use the repertoire of the game application for allowing to use for 30 minutes afterwards.
The time that parent can be helped effectively to control child play to play, and game playing habits are played, child can be helped to set up Good habits and customs.
Third embodiment of the invention, it is corresponding with first embodiment, as shown in figure 5, the present embodiment introduces a kind of information protection Device, including consisting of part:
Detection module 161, the biometric feature for detecting user.
Wherein, user biological identification feature at least includes one below:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known Other feature.
The biometric feature of mobile terminal detection user is prior art, be will not be described here.
First protection module 162, for the biometric feature based on the user for detecting, the corresponding permission of presentation user The application program for using;
Specifically, the first protection module 162, is used for:
Mobile terminal is based on the biometric feature of the user for detecting, and hides the corresponding application journey for prohibitting the use of of user Sequence, the corresponding application program for allowing to use of presentation user.
For example:The finger of mobile terminal child owner that the fingerprint sensor that mobile terminal is based on mobile terminal back is detected Line, hides the application programs such as corresponding various game, bank application and the Alipay for prohibitting the use of of child owner;Present and move Move the corresponding educational application program of terminal child owner.
The application programs such as the various game of mobile terminal child owner addiction can effectively be avoided;And can effectively keep away Exempt from mobile terminal child owner due to being propped up caused by the internet payment application program such as maloperation bank application and Alipay The behavior of paying;Child is encouraged to use educational application program;While having cultivated child's good habits and customs, movement is effectively protected The financial security of terminal owner.
Second protection module 163, for when user is detected in the application program that triggering is presented, according to being pre-configured with use The right of using functions of the corresponding application program for allowing to use in family, provides the user the corresponding work(of the application program for allowing to use Energy.
Specifically, the second protection module 163, is used for:
Mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user The right of using functions of the application program for using, provides the user whole corresponding functions or the part of the application program for allowing to use Corresponding function.
For example:Second protection module 163, for based on detect borrow mobile terminal user client iris, according to The right of using functions for borrowing the corresponding application program for allowing to use of mobile terminal user is pre-configured with, to borrow mobile terminal User provides whole corresponding functions or wechat program circle of friends function of the voice call for allowing to use, and forbids borrowing mobile whole End subscriber uses the other functions of wechat program.Immobile terminal owner user can be effectively avoided to borrow mobile terminal temporarily The wechat payment function that owner is usurped when using is paid, and is effectively protected the safety of payment of mobile terminal owner.Meanwhile, Can effectively avoid immobile terminal owner user from borrowing temporarily when mobile terminal is used and peep the instant of mobile terminal owner Communication information, and/or message is sent to the contact person in wechat by the wechat of mobile terminal owner malice, it is effectively protected The individual privacy and information security of mobile terminal owner.
And for example:Second protection module 163, for based on detect borrow mobile terminal user user fingerprints, according to The access right for borrowing the corresponding application program for allowing to use of mobile terminal user is pre-configured with, to borrow mobile terminal user Offer allows whole corresponding functions or the look facility of stock application program of the voice call for using, and forbids borrowing mobile whole End subscriber uses the Stock Trading function of stock application program.Immobile terminal owner user can be effectively avoided to borrow temporarily The stock application program that owner is usurped when mobile terminal is used carries out Stock Trading, is effectively protected the wealth of mobile terminal owner Produce safety.
Fourth embodiment of the invention, corresponding with second embodiment, the present embodiment introduces a kind of information protection device, such as Fig. 4 It is shown, including consisting of part:
Detection module 161, the biometric feature for detecting user.
Wherein, user biological identification feature at least includes one below:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known Other feature.
The biometric feature of mobile terminal detection user is prior art, be will not be described here.
First protection module 162, for the biometric feature based on the user for detecting, the corresponding permission of presentation user The application program for using;
Specifically, the first protection module 162, is used for:
Mobile terminal is based on the biometric feature of the user for detecting, and hides the corresponding application journey for prohibitting the use of of user Sequence, the corresponding application program for allowing to use of presentation user.
For example:The finger of mobile terminal child owner that the fingerprint sensor that mobile terminal is based on mobile terminal back is detected Line, hides the application programs such as corresponding various game, bank application and the Alipay for prohibitting the use of of child owner;Present and move Move the corresponding educational application program of terminal child owner.
The application programs such as the various game of mobile terminal child owner addiction can effectively be avoided;And can effectively keep away Exempt from mobile terminal child owner due to being propped up caused by the internet payment application program such as maloperation bank application and Alipay The behavior of paying;Child is encouraged to use educational application program;While having cultivated child's good habits and customs, movement is effectively protected The financial security of terminal owner.
Second protection module 163, for when user is detected in the application program that triggering is presented, according to being pre-configured with use The right of using functions of the corresponding application program for allowing to use in family, provides the user the corresponding work(of the application program for allowing to use Energy.
Specifically, the second protection module 163, is used for:
Mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user The right of using functions of the application program for using, provides the user whole corresponding functions or the part of the application program for allowing to use Corresponding function.
For example:Second protection module 163, for based on detect borrow mobile terminal user client iris, according to The right of using functions for borrowing the corresponding application program for allowing to use of mobile terminal user is pre-configured with, to borrow mobile terminal User provides whole corresponding functions or wechat program circle of friends function of the voice call for allowing to use, and forbids borrowing mobile whole End subscriber uses the other functions of wechat program.Immobile terminal owner user can be effectively avoided to borrow mobile terminal temporarily The wechat payment function that owner is usurped when using is paid, and is effectively protected the safety of payment of mobile terminal owner.Meanwhile, Can effectively avoid immobile terminal owner user from borrowing temporarily when mobile terminal is used and peep the instant of mobile terminal owner Communication information, and/or message is sent to the contact person in wechat by the wechat of mobile terminal owner malice, it is effectively protected The individual privacy and information security of mobile terminal owner.
And for example:Second protection module 163, for based on detect borrow mobile terminal user user fingerprints, according to The access right for borrowing the corresponding application program for allowing to use of mobile terminal user is pre-configured with, to borrow mobile terminal user Offer allows whole corresponding functions or the look facility of stock application program of the voice call for using, and forbids borrowing mobile whole End subscriber uses the Stock Trading function of stock application program.Immobile terminal owner user can be effectively avoided to borrow temporarily The stock application program that owner is usurped when mobile terminal is used carries out Stock Trading, is effectively protected the wealth of mobile terminal owner Produce safety.
Logging modle 164, the application program usage record for storing user on backstage, and provide user to setting user Application program usage record.
Specifically, logging modle 164, is used for:
After corresponding function of the user using the application program for allowing to use, mobile terminal should backstage storage user's Program usage record is used, and the application program usage record of user is provided to setting user.
Setting user can be the other users of owner, or mobile terminal the owner setting of mobile terminal.
For example:Logging modle 164, for using the voice call application program for allowing to use in borrow mobile terminal user Repertoire and wechat program circle of friends function after, mobile terminal backstage storage borrow mobile terminal user application journey Sequence usage record, and the application program usage record for borrowing mobile terminal user is provided to mobile terminal owner.
It is capable of the user of prompting mobile terminal owner borrow mobile terminal using the situation of application program, such as by voice Talk application program malicious call 110 or 119 is expected someone's call;Or malice replys wechat program circle of friends.
And for example:Logging modle 164, for child owner using the game application for allowing to use repertoire it Afterwards, mobile terminal stores the application program usage record of child owner on backstage, and provides child owner to mobile terminal owner Application program usage record.
Parent can be helped effectively to monitor the time of child play game, and play game playing habits, child can be helped to set up Good habits and customs.
Recovery module 165, if revising information in the application program for allowing to use for user, in the setting for detecting During the biometric feature of user, recover the information that user revises.
Specifically, recovery module 165, is used for:
If user modification or deletion information in the application program for obtaining access right, mobile terminal are stored on backstage and used Family modification or the information before deleting in the application program for obtaining access right, and know in the biological of the setting user for detecting During other feature, recover user modification or the information deleted in the application program for obtaining access right.
For example:Recovery module 165, if obtaining the instant messaging application journey of access right for borrowing mobile terminal user In sequence malicious modification or delete information, then mobile terminal backstage storage borrow mobile terminal user obtain access right i.e. When messaging application in modification or the information before deleting, and in the biometric feature of the owner for detecting, recover to borrow With the information of mobile terminal user's modification or deletion in the instant messaging application program for obtaining access right.It is effectively protected Information security.
And for example:Recovery module 165, if being not intended in the instant messaging application program for obtaining access right for child owner Information is deleted in middle modification, then mobile terminal is obtaining the instant messaging application program of access right in backstage storage child owner Information before middle modification or deletion, and in the biometric feature of the owner for detecting, recovering child owner is made With the information changed in the instant messaging application program of authority or delete.It is effectively protected the information security of owner.
Closedown module 166, for forbidding user to use the corresponding of the application program for allowing to use after the duration of setting Function.
For example:Closedown module 166, for child owner using the game application for allowing to use repertoire it Afterwards, the duration in setting forbids child owner to use the repertoire of the game application for allowing to use for 30 minutes afterwards.
The time that parent can be helped effectively to control child play to play, and game playing habits are played, child can be helped to set up Good habits and customs.
It should be noted that herein, term " including ", "comprising" or its any other variant be intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also include other key elements being not expressly set out, or also include for this process, method, article or device institute are intrinsic Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably implementation method.Based on such understanding, technical scheme is substantially done to prior art in other words The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used to so that a station terminal equipment (can be mobile phone, computer, clothes Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of information protection device, it is characterised in that including:
Detection module, the biometric feature for detecting user;
First protection module, for the biometric feature based on the user for detecting, is presented the user corresponding fair Perhaps the application program for using;
Second protection module, for detecting the user when the application program of the presentation is triggered, according to being pre-configured with The right of using functions of the corresponding application program for allowing to use of the user, for the user provide it is described allow to use should With the corresponding function of program.
2. device according to claim 1, it is characterised in that described device also includes:
Logging modle, for after corresponding function of the user using the application program for allowing and using, mobile terminal The application program usage record of the user is stored on backstage, and note is used to the application program that setting user provides the user Record.
3. device according to claim 1, it is characterised in that described device also includes:
Recovery module, for after corresponding function of the user using the application program for allowing and using, if the use Information is revised in family in the application program for allowing and using, then extensive in the biometric feature of the setting user for detecting The information that the multiple user revises.
4. device according to claim 1, it is characterised in that described device also includes:
Closedown module, for after corresponding function of the user using the application program for allowing and using, in setting The user is forbidden to use the corresponding function of the application program for allowing and using after duration.
5. device according to any one of claim 1 to 4, it is characterised in that the user biological identification feature is at least Including one below:
User fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint.
6. a kind of information protecting method, it is characterised in that including:
Mobile terminal detects the biometric feature of user;
Mobile terminal is based on the biometric feature of the user for detecting, and the presentation user is corresponding to allow what is used to answer Use program;
Mobile terminal detecting the user when the application program of the presentation is triggered, according to being pre-configured with the user couple The right of using functions of the application program for allowing to use answered, the phase of the application program for allowing and using is provided for the user Answer function.
7. method according to claim 6, it is characterised in that methods described also includes:
After corresponding function of the user using the application program for allowing and using, mobile terminal is described in backstage storage The application program usage record of user, and the application program usage record of the user is provided to setting user.
8. method according to claim 6, it is characterised in that methods described also includes:
After corresponding function of the user using the application program for allowing and using, if the user allows to make described Revise information in the application program of application program acquisition access right, then it is special in the bio-identification of the setting user for detecting When levying, mobile terminal recovers the information that the user revises.
9. method according to claim 6, it is characterised in that methods described also includes:
After corresponding function of the user using the application program for allowing and using, mobile terminal setting duration it The user is forbidden to use the corresponding function of the application program for allowing and using afterwards.
10. the method according to any one of claim 6 to 9, it is characterised in that the user biological identification feature is at least Including one below:
User fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint.
CN201611059841.5A 2016-11-25 2016-11-25 A kind of information protection device and method Active CN106778158B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611059841.5A CN106778158B (en) 2016-11-25 2016-11-25 A kind of information protection device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611059841.5A CN106778158B (en) 2016-11-25 2016-11-25 A kind of information protection device and method

Publications (2)

Publication Number Publication Date
CN106778158A true CN106778158A (en) 2017-05-31
CN106778158B CN106778158B (en) 2019-08-30

Family

ID=58911613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611059841.5A Active CN106778158B (en) 2016-11-25 2016-11-25 A kind of information protection device and method

Country Status (1)

Country Link
CN (1) CN106778158B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107526958A (en) * 2017-08-30 2017-12-29 努比亚技术有限公司 A kind of operating mode control method, terminal and computer-readable recording medium
CN109086103A (en) * 2018-08-02 2018-12-25 Oppo广东移动通信有限公司 Application display method, device, storage medium and electronic equipment
CN112494950A (en) * 2019-08-26 2021-03-16 上海海姆网络科技有限公司 Online game addiction prevention system and method
CN114675897A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Application program starting method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942481A (en) * 2014-05-04 2014-07-23 上海鼎为电子科技(集团)有限公司 Application access method and mobile terminal
CN104427089A (en) * 2013-08-21 2015-03-18 上海晨兴希姆通电子科技有限公司 Mobile terminal and mobile terminal authority management method
CN105760731A (en) * 2016-01-25 2016-07-13 惠州Tcl移动通信有限公司 Method for starting application program based on mobile terminal and mobile terminal
CN106055949A (en) * 2016-05-26 2016-10-26 宇龙计算机通信科技(深圳)有限公司 System access and authorization method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104427089A (en) * 2013-08-21 2015-03-18 上海晨兴希姆通电子科技有限公司 Mobile terminal and mobile terminal authority management method
CN103942481A (en) * 2014-05-04 2014-07-23 上海鼎为电子科技(集团)有限公司 Application access method and mobile terminal
CN105760731A (en) * 2016-01-25 2016-07-13 惠州Tcl移动通信有限公司 Method for starting application program based on mobile terminal and mobile terminal
CN106055949A (en) * 2016-05-26 2016-10-26 宇龙计算机通信科技(深圳)有限公司 System access and authorization method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107526958A (en) * 2017-08-30 2017-12-29 努比亚技术有限公司 A kind of operating mode control method, terminal and computer-readable recording medium
CN109086103A (en) * 2018-08-02 2018-12-25 Oppo广东移动通信有限公司 Application display method, device, storage medium and electronic equipment
CN109086103B (en) * 2018-08-02 2021-08-24 Oppo广东移动通信有限公司 Application display method and device, storage medium and electronic equipment
CN112494950A (en) * 2019-08-26 2021-03-16 上海海姆网络科技有限公司 Online game addiction prevention system and method
CN114675897A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Application program starting method and related device

Also Published As

Publication number Publication date
CN106778158B (en) 2019-08-30

Similar Documents

Publication Publication Date Title
CN104915582B (en) unlocking method and device
CN104618605B (en) Mobile terminal locating method and device
CN106657458A (en) Terminal and hot-plug camera device for terminal
CN105094532B (en) Data access method and device
CN106775402A (en) A kind of mobile terminal and its method for realizing control
CN106778158B (en) A kind of information protection device and method
CN106909851A (en) A kind of secure storage method of data and device
CN106778523A (en) Fingerprint input method and device
CN106791187A (en) A kind of mobile terminal and NFC method
CN105488372B (en) Verification method and device
CN106484279A (en) A kind of identification and method and the terminal of processing terminal abnormal operation
CN104820797B (en) Using the management method and device of account
CN106856541A (en) A kind of terminal and method for secret protection
CN106952090A (en) Payment verification device and method
CN106817481A (en) A kind of terminal and terminal children's lock setting method
CN107133508A (en) Application management method and mobile terminal
CN106445148A (en) Method and device for triggering terminal application
CN106548081A (en) A kind of end message display packing and device
CN106535181A (en) Mobile terminal and information management method thereof
CN106775673A (en) Many account entering devices and method of a kind of application program
CN106534596A (en) Anti-harassment call filtering method and filtering system thereof
CN106600261A (en) Mobile payment device and method
CN106846562A (en) A kind of method verified device and send checking information
CN106792644A (en) Mobile terminal, server and information processing method
CN106604271A (en) Mobile terminal and message check method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201207

Address after: 241000 No.32 Chunjiang Road, Qingshui street, Jiujiang District, Wuhu City, Anhui Province

Patentee after: Yang Jiawei

Address before: 518057 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor

Patentee before: NUBIA TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210127

Address after: Room 2003, 1801, 1804, No.13-1, Hai'an Road, Tianhe District, Guangzhou, Guangdong 510627

Patentee after: HEYU HEALTH TECHNOLOGY Co.,Ltd.

Address before: 241000 No.32 Chunjiang Road, Qingshui street, Jiujiang District, Wuhu City, Anhui Province

Patentee before: Yang Jiawei

TR01 Transfer of patent right