CN108197497A - A kind of browser access method and mobile terminal - Google Patents

A kind of browser access method and mobile terminal Download PDF

Info

Publication number
CN108197497A
CN108197497A CN201810245239.3A CN201810245239A CN108197497A CN 108197497 A CN108197497 A CN 108197497A CN 201810245239 A CN201810245239 A CN 201810245239A CN 108197497 A CN108197497 A CN 108197497A
Authority
CN
China
Prior art keywords
user
information
target user
facial feature
feature information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810245239.3A
Other languages
Chinese (zh)
Other versions
CN108197497B (en
Inventor
姜自雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810245239.3A priority Critical patent/CN108197497B/en
Publication of CN108197497A publication Critical patent/CN108197497A/en
Application granted granted Critical
Publication of CN108197497B publication Critical patent/CN108197497B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention provides a kind of browser access method and mobile terminal, this method include:The first input of control targe browser front stage operation is received, acquires user's characteristic information, objective browser running background;If target user's information of the user's characteristic information and the objective browser mismatches, objective browser described in front stage operation, and limits the data for accessing the target user.In this way, when the user's characteristic information of acquisition and target user's information of objective browser mismatch, the data for accessing the target user can be limited, so as to protect the privacy of user, prevent the leakage of privacy of user.

Description

A kind of browser access method and mobile terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of browser access method and mobile terminals.
Background technology
With the rapid development of mobile terminal, mobile terminal has become essential a kind of tool in people's life, And the various aspects for user's life are brought great convenience.User can consult some privacies of oneself using browser Information (such as the bank account of oneself either fund account etc.) browser can be switched to after access backstage or Exit etc..
It, may be also due to the memory function of browser but when user is again by browser from running background to foreground It can show some privacy informations browsed before, be easy to cause the leakage of user information.
Invention content
The embodiment of the present invention provides a kind of browser access method and mobile terminal, with solve the browser of mobile terminal from During running background to foreground, it is easy to cause the problem of user information is revealed.
In order to solve the above-mentioned technical problem, the invention is realized in this way:A kind of browser access method, including:
The first input of control targe browser front stage operation is received, acquires user's characteristic information, the objective browser Running background;
If target user's information of the user's characteristic information and the objective browser mismatches, mesh described in front stage operation Browser is marked, and limits the data for accessing the target user.
In a first aspect, an embodiment of the present invention provides a kind of browser access method, including:
The first input of control targe browser front stage operation is received, acquires user's characteristic information, the objective browser Running background;
If target user's information of the user's characteristic information and the objective browser mismatches, mesh described in front stage operation Browser is marked, and limits the data for accessing the target user.
Second aspect, the embodiment of the present invention also provide a kind of mobile terminal, including:
Acquisition module for receiving the first of control targe browser front stage operation the input, acquires user's characteristic information, institute State objective browser running background;
Module is run, if being mismatched for target user's information of the user's characteristic information and the objective browser, Objective browser described in front stage operation, and limit the data for accessing the target user.
The third aspect, the embodiment of the present invention also provide a kind of mobile terminal, including processor, memory and are stored in described It is real when the computer program is performed by the processor on memory and the computer program that can run on the processor The step of existing above-mentioned browser access method.
Fourth aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, the computer program realizes the step of above-mentioned browser access method when being executed by processor Suddenly.
In embodiments of the present invention, the first input of control targe browser front stage operation, acquisition user characteristics letter are received Breath, objective browser running background;If target user's information of the user's characteristic information and the objective browser It mismatches, objective browser described in front stage operation, and limits the data for accessing the target user.In this way, as the user of acquisition When target user's information of characteristic information and objective browser mismatches, the data for accessing the target user can be limited, from And the privacy of user is protected, prevent the leakage of privacy of user.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present invention, For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these attached drawings Obtain other attached drawings.
Fig. 1 is one of flow chart of browser access method provided in an embodiment of the present invention;
Fig. 2 is the two of the flow chart of browser access method provided in an embodiment of the present invention;
Fig. 3 is a kind of control display schematic diagram provided in an embodiment of the present invention;
Fig. 4 is the three of the flow chart of browser access method provided in an embodiment of the present invention;
Fig. 5 is one of structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 6 is one of structure chart of operation module of mobile terminal provided in an embodiment of the present invention;
Fig. 7 is one of structure chart of the first operation submodule of mobile terminal provided in an embodiment of the present invention;
Fig. 8 is the two of the structure chart of the first operation submodule of mobile terminal provided in an embodiment of the present invention;
Fig. 9 is the two of the structure chart of the operation module of mobile terminal provided in an embodiment of the present invention;
Figure 10 is the two of the structure chart of mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is the flow chart of browser access method provided in an embodiment of the present invention, as shown in Figure 1, including Following steps:
Step 101, the first input for receiving control targe browser front stage operation, acquire user's characteristic information, the mesh Mark browser running background.
In the embodiment of the present invention, above-mentioned objective browser can be browser or can also be that mobile terminal carries Third party's browser that mobile terminal is downloaded etc..Above-mentioned control targe browser front stage operation first input, can be Touch control operation on mobile terminal can also be phonetic entry that mobile terminal receives user etc..Above-mentioned user characteristics Information, can be user's facial feature information of camera acquisition or can also be the user of microphone acquisition sound it is special Reference breath etc..
If step 102, the user's characteristic information and target user's information of the objective browser mismatch, foreground fortune The row objective browser, and limit the data for accessing the target user.
In the embodiment of the present invention, above-mentioned target user can be the use user of mobile terminal.Above-mentioned target user's information, Can be mobile terminal using the advance typing of user voice messaging or can also be mobile terminal using user it is advance Facial information of typing etc..Target user's information of above-mentioned user's characteristic information and the objective browser mismatches, can be with It is that the voice messaging that mobile terminal receives mismatches or can also be that the facial information of mobile terminal acquisition mismatches. The data of above-mentioned target user can be that target user browses the historical data of some webpages or can also be target user Information of some pages of collection etc., is not construed as limiting this embodiment of the present invention.
In the embodiment of the present invention, when user's characteristic information is the facial feature information of user, it can be determined that the face of user Portion's characteristic information whether target user's information match with objective browser.And " safety " that can be under " setting ", " peace It is configured in " anti-to divulge a secret " entirely "." if anti-to divulge a secret " option is set to starting state, camera can be started and shoot a use The facial photo at family, and using the photo as above-mentioned target user's information.Then " the target browsing in list can also be chosen Device ", after setting, when starting objective browser, it is possible to which the automatic facial feature information for starting camera acquisition user carries out Matching.
In the embodiment of the present invention, if target user's information phase of the user's characteristic information and the objective browser Match, then can allow to access the data of above-mentioned target user.
In the embodiment of the present invention, if target user's information of the user's characteristic information and the objective browser is not Match, objective browser described in front stage operation, and limit the data for accessing the target user.In this way even user there are one at one's side Also have no relations during a little others users, since limitation accesses the data of the target user, so as to which other users not can be appreciated that mesh The data of user are marked, the privacy of user is protected in this way, prevents the leakage of privacy of user.
In the embodiment of the present invention, above-mentioned mobile terminal can be mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital Assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
A kind of browser access method of the embodiment of the present invention, receive control targe browser front stage operation first are defeated Enter, acquire user's characteristic information, objective browser running background;If the user's characteristic information is browsed with the target Target user's information of device mismatches, objective browser described in front stage operation, and limits the data for accessing the target user.This Sample when the user's characteristic information of acquisition and target user's information of objective browser mismatch, can limit and access the mesh The data of user are marked, so as to protect the privacy of user, prevent the leakage of privacy of user.
Referring to Fig. 2, Fig. 2 is the flow chart of browser access method provided in an embodiment of the present invention.The present embodiment with it is last The main distinction of embodiment is facial feature information of the user's characteristic information for camera acquisition in this method.As shown in Fig. 2, Include the following steps:
Step 201, the first input for receiving control targe browser front stage operation, acquire user's characteristic information, the mesh Browser running background is marked, the user's characteristic information is the facial feature information of camera acquisition.
In the embodiment of the present invention, above-mentioned objective browser can be browser or can also be that mobile terminal carries Third party's browser that mobile terminal is downloaded etc..Above-mentioned control targe browser front stage operation first input, can be Touch control operation on mobile terminal can also be phonetic entry that mobile terminal receives user etc..
In the facial feature information that step 202, the detection camera acquire, if the first face comprising target user The second facial feature information except characteristic information.
In the embodiment of the present invention, the facial feature information of above-mentioned camera acquisition, can be mobile terminal front camera The facial feature information of acquisition can also be the facial feature information that mobile terminal rear camera acquires.Above-mentioned target User can be understood as the use user of mobile terminal, and above-mentioned first facial feature information can be understood as the use of mobile terminal The pre-set facial feature information of user, above-mentioned second facial feature information can be understood as the use use in addition to mobile terminal The facial feature information of some other user except family.
If in the facial feature information of step 203, the camera acquisition, the first face comprising the target user is special The second facial feature information except reference breath, then objective browser described in front stage operation, and limit and access the target user Data.
In the embodiment of the present invention, if in the facial feature information of camera acquisition, the comprising the target user The second facial feature information except one facial feature information then illustrates that user has others when using mobile terminal at one's side User, then can be in objective browser described in front stage operation, and limit the data for accessing the target user.So as in this way The privacy of user can be protected, prevents the leakage of privacy of user.
Certainly, it during camera acquires facial feature information, can preferably be adopted using front camera Collection.Because if front camera can collect the facial feature information of other users, then illustrate that other users easily see To the content used on mobile terminal, the data for accessing the target user can be limited at this time, protect the privacy of user.And When mobile terminal rear camera collects the facial feature information of other users, these users, which differ, surely sees movement eventually The content shown on end.It is advantageous to, the facial feature information that can be acquired to front camera judges.
It should be noted that if in the facial feature information of camera acquisition, the not comprising the target user The second facial feature information except one facial feature information can continue to detect, can also terminate flow, the embodiment of the present invention Fig. 2 be illustrated with terminating flow.
Optionally, if in the facial feature information of camera acquisition, the first face comprising the target user The second facial feature information except portion's characteristic information, then objective browser described in front stage operation, and limit and access the target The step of data of user, including:
If in the facial feature information of camera acquisition, the first facial feature information comprising the target user it The second outer facial feature information, then show preset control, and the preset control is used to control the data of the target user Access rights;
If receiving touch control operation of the user to the preset control, objective browser described in front stage operation, and limit Access the data of the target user.
In present embodiment, above-mentioned preset control can be circular control, can be rectangle control or can also It is the control of some other shapes.The above-mentioned touch control operation to the preset control, can be one click, it is primary double-click or Long-press etc..In addition to this it can also be some other touch control operations, this present embodiment be not construed as limiting.
In present embodiment, if in the facial feature information of camera acquisition, the first of the target user is included The second facial feature information except facial feature information, user is prompted by showing preset control, so as to which user can be certainly The main data for choosing whether limitation and accessing the target user.Such as:When user is on subway, the second facial feature information can To be the facial feature information of some passengers at one's side, such user can touch-control preset control, so as to limit described in access The data of target user;Or when user is in some markets, the second facial feature information can be some customers at one's side Facial feature information, such user, so as to limit the data for accessing the target user, can also prevent from using with touch-control preset control The leakage of family information.
It, can be with if preset control is not received by the touch control operation of user within the regular hour in present embodiment Allow the data of access target user.User does not have touch-control preset control then to illustrate that current environment may be safer, even At one's side there are some users, these users see that the content of oneself browsing does not have too big influence yet, so as to allow access target The data of user.In this way by showing preset control, the access rights of the data of the autonomous selection target user of user, Ke Yiman The individual demand of sufficient user under various circumstances, the privacy for the protection user for making mobile terminal more intelligent.
Certainly, there may be different regions in preset control to control different permissions.For a better understanding, we Fig. 3 can be referred to, Fig. 3 is a kind of control display schematic diagram provided in an embodiment of the present invention.It can see in Fig. 3, preset control Upper different region shows different words, " attending to anything else " and " startup ".When user clicks " startup ", it is possible to allow to access The data of target user;When user clicks " attending to anything else ", it is possible to limit the data of access target user.In this way, When the user's characteristic information of camera acquisition represents there are other users, can be determined not by the different selection of user Same permission, so as to meet the individual demand of user under various circumstances.
For example, when user together with a team when carrying out some project, camera may collect other users Facial feature information, at this time user can click the display location of " startup " two words, so as to allow access target user Data, some data consulted before user can also discuss with the member of team.When user is on bus, camera shooting Head may collect the facial feature information of other users, and user can click the display position of " attending to anything else " two words at this time It puts, so as to limit the data of access target user, good protection can be played to the privacy of oneself, prevent letting out for privacy of user Dew.
Optionally, if in the facial feature information of camera acquisition, the first face comprising the target user is special The second facial feature information except reference breath, then objective browser described in front stage operation, and limit and access the target user Data the step of, including:
If in the facial feature information of camera acquisition, the first facial feature information comprising the target user it The second outer facial feature information then receives the finger print information that user inputs in predeterminated position;
If the finger print information and preset fingerprint information match, objective browser described in front stage operation, and limit visit Ask the data of the target user.
In present embodiment, above-mentioned predeterminated position can be the position of fingerprint module or can also be that display screen is taken up an official post One position of meaning.Such as the upper left corner, the upper right corner, the lower left corner, the lower right corner or objective browser icon display location etc..When When the finger print information of predeterminated position input is with preset fingerprint information match, the number for accessing the target user can be limited According to.
In present embodiment, the access rights of the data of target user by finger print information can be quickly set, make user Operation it is more convenient, well protect user privacy, prevent the leakage of privacy.
Certainly, user can also use different fingerprints to set different permissions, be determined whether by different fingerprints It can be with the data of access target user.For example, when user is at one's side there are during some other users, user can be in default position The finger print information of input forefinger is put, the data for accessing the target user can be limited at this time;When user's Home Alone, The finger print information that can refer in predeterminated position input allows for accessing at this time the data of the target user.In this way, Different access rights can be controlled by different fingerprints, the safety of oneself privacy can be both protected, difference can also be met The requirements for access different to browser under environment.
A kind of browser access method of the embodiment of the present invention, receive control targe browser front stage operation first are defeated Enter, acquire user's characteristic information, running background, the user's characteristic information are the face of camera acquisition to the objective browser Portion's characteristic information;In the facial feature information for detecting the camera acquisition, if the first face feature comprising target user The second facial feature information except information;If in the facial feature information of the camera acquisition, the target user is included The first facial feature information except the second facial feature information, then objective browser described in front stage operation, and limit access The data of the target user.In this way, when in the facial feature information of camera acquisition, the first face comprising the target user The second facial feature information except portion's characteristic information can limit the data for accessing the target user, so as to protect use The privacy at family prevents the leakage of privacy of user.
Referring to Fig. 4, Fig. 4 is the flow chart of browser access method provided in an embodiment of the present invention.The present embodiment with it is last The main distinction of embodiment is acoustic information of the user's characteristic information for microphone acquisition in this method.As shown in figure 4, including Following steps:
Step 401, the first input for receiving control targe browser front stage operation, acquire user's characteristic information, the mesh Browser running background is marked, the user's characteristic information is the acoustic information of microphone acquisition.
In the embodiment of the present invention, above-mentioned objective browser can be browser or can also be that mobile terminal carries Third party's browser that mobile terminal is downloaded etc..Above-mentioned control targe browser front stage operation first input, can be Touch control operation on mobile terminal can also be phonetic entry that mobile terminal receives user etc..
Step 402, detection microphone acquisition acoustic information whether the preset sound information with the target user Match.
In the embodiment of the present invention, above-mentioned target user can be understood as the use user of mobile terminal.Above-mentioned preset sound Information can be the acoustic information of the advance typing of user of mobile terminal.And detect microphone acquisition acoustic information whether With the preset sound information match of the target user, can be sentenced by the frequency of sound or tone color etc. etc. It is disconnected.
If the acoustic information of step 403, the microphone acquisition is mismatched with the preset sound information, front stage operation The objective browser, and limit the data for accessing the target user.
In the embodiment of the present invention, if the acoustic information of microphone acquisition is mismatched with the preset sound information, that Illustrate that there may be some other users, so as to limit the data for accessing the target user, protection under current environment The privacy of user prevents the leakage of privacy of user.Certainly, user can also send out the data that number voice carrys out control targe user Access rights etc., this embodiment of the present invention is not construed as limiting.
It, can be with it should be noted that if the acoustic information and the preset sound information match of microphone acquisition Continue to detect, flow can also be terminated, Fig. 4 of the embodiment of the present invention is illustrated with terminating flow.
A kind of browser access method of the embodiment of the present invention, receive control targe browser front stage operation first are defeated Enter, acquire user's characteristic information, running background, the user's characteristic information are the sound of microphone acquisition to the objective browser Message ceases;Detect microphone acquisition acoustic information whether the preset sound information match with the target user;If The acoustic information of the microphone acquisition is mismatched with the preset sound information, then objective browser described in front stage operation, and Limitation accesses the data of the target user.In this way, when microphone acquisition acoustic information and the preset sound information not Timing can limit the data for accessing the target user, so as to protect the privacy of user, prevent the leakage of privacy of user.
Referring to Fig. 5, Fig. 5 is the structure chart of mobile terminal provided in an embodiment of the present invention, can be realized clear in above-described embodiment It lookes at the details of device access method, and achievees the effect that identical.As shown in figure 5, mobile terminal 500 includes acquisition module 501 and fortune Row module 502, acquisition module 501 and operation module 502 connect, wherein:
Acquisition module 501, for receiving the first of control targe browser front stage operation the input, acquisition user characteristics letter Breath, objective browser running background;
Run module 502, if for the user's characteristic information and the objective browser target user's information not Match, objective browser described in front stage operation, and limit the data for accessing the target user.
Optionally, the user's characteristic information is the facial feature information of camera acquisition, as shown in fig. 6, the operation Module 502, including:
First detection sub-module 5021, for detecting in the facial feature information of the camera acquisition, if include mesh Mark the second facial feature information except the first facial feature information of user;
First operation submodule 5022, if detecting the face of the camera acquisition for first detection sub-module 5021 In portion's characteristic information, the second facial feature information except the first facial feature information comprising the target user, then foreground The objective browser is run, and limits the data for accessing the target user.
Optionally, as shown in fig. 7, described first runs submodule 5022, including:
Display unit 50221, if the face that the camera acquisition is detected for first detection sub-module 5021 is special In reference breath, the second facial feature information except the first facial feature information comprising the target user, then display is default Control, the preset control are used to control the access rights of the data of the target user;
First running unit 50222, if for receiving touch control operation of the user to the preset control, front stage operation The objective browser, and limit the data for accessing the target user.
Optionally, as shown in figure 8, described first runs submodule 5022, including:
Receiving unit 50223, if the face that the camera acquisition is detected for first detection sub-module 5021 is special In reference breath, the second facial feature information except the first facial feature information comprising the target user then receives user In the finger print information of predeterminated position input;
Second running unit 50224, if for the finger print information and preset fingerprint information match, front stage operation institute Objective browser is stated, and limits the data for accessing the target user.
Optionally, the user's characteristic information is the acoustic information of microphone acquisition, as shown in figure 9, the operation module 502, including:
Second detection sub-module 5023, for detect the acoustic information of microphone acquisition whether with the target user Preset sound information match;
Second operation submodule 5024, if detecting the sound of the microphone acquisition for second detection sub-module 5023 Message is ceased to be mismatched with the preset sound information, then objective browser described in front stage operation, and is limited and accessed the target use The data at family.
Mobile terminal 500 can realize each process that mobile terminal is realized in the embodiment of the method for Fig. 1 to Fig. 4, to avoid It repeats, which is not described herein again.
The mobile terminal 500 of the embodiment of the present invention, receives the first input of control targe browser front stage operation, and acquisition is used Family characteristic information, objective browser running background;If the target of the user's characteristic information and the objective browser User information mismatches, objective browser described in front stage operation, and limits the data for accessing the target user.In this way, when adopting When the user's characteristic information of collection and target user's information of objective browser mismatch, it can limit and access the target user's Data so as to protect the privacy of user, prevent the leakage of privacy of user.
Referring to Figure 10, a kind of hardware architecture diagram of Figure 10 mobile terminals of each embodiment to realize the present invention should Mobile terminal 1000 includes but not limited to:Radio frequency unit 1001, network module 1002, audio output unit 1003, input unit 1004th, sensor 1005, display unit 1006, user input unit 1007, interface unit 1008, memory 1009, processor The components such as 1010 and power supply 1011.It will be understood by those skilled in the art that the mobile terminal structure shown in Figure 10 not structure The restriction of pairs of mobile terminal, mobile terminal can include than illustrate more or fewer components or the certain components of combination or The different component arrangement of person.In embodiments of the present invention, mobile terminal includes but not limited to mobile phone, tablet computer, notebook electricity Brain, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 1010 for receiving the first of control targe browser front stage operation the input, acquire user characteristics Information, objective browser running background;If the target user of the user's characteristic information and the objective browser believes Breath mismatches, objective browser described in front stage operation, and limits the data for accessing the target user.In this way, when the use of acquisition When target user's information of family characteristic information and objective browser mismatches, the data for accessing the target user can be limited, So as to protect the privacy of user, the leakage of privacy of user is prevented.
Optionally, the user's characteristic information is the facial feature information of camera acquisition, and processor 1010 is additionally operable to examine It surveys in the facial feature information of the camera acquisition, if second except the first facial feature information comprising target user Facial feature information;If in the facial feature information of the camera acquisition, the first face feature comprising the target user The second facial feature information except information, then objective browser described in front stage operation, and limit and access the target user's Data.
Optionally, processor 1010 if being additionally operable in the facial feature information of the camera acquisition, include the target The second facial feature information except the first facial feature information of user, then show preset control, and the preset control is used for Control the access rights of the data of the target user;If receive touch control operation of the user to the preset control, foreground The objective browser is run, and limits the data for accessing the target user.If the face feature letter of the camera acquisition In breath, the second facial feature information except the first facial feature information comprising the target user then shows preset control, The preset control is used to control the access rights of the data of the target user;If user is received to the preset control Touch control operation, then objective browser described in front stage operation, and limit the data for accessing the target user.
Optionally, processor 1010 if being additionally operable in the facial feature information of the camera acquisition, include the target The second facial feature information except the first facial feature information of user then receives the fingerprint letter that user inputs in predeterminated position Breath;If the finger print information and preset fingerprint information match, objective browser described in front stage operation, and limit described in access The data of target user.
Optionally, the user's characteristic information is the acoustic information of microphone acquisition, and processor 1010 is additionally operable to detection institute State microphone acquisition acoustic information whether the preset sound information match with the target user;If the microphone acquisition Acoustic information and the preset sound information mismatch, then objective browser described in front stage operation, and limit and access the mesh Mark the data of user.
It should be understood that the embodiment of the present invention in, radio frequency unit 1001 can be used for receive and send messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, handled to processor 1010;In addition, by uplink Data are sent to base station.In general, radio frequency unit 1001 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 1001 can also by radio communication system and network and other Equipment communicates.
Mobile terminal has provided wireless broadband internet to the user by network module 1002 and has accessed, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
It is that audio output unit 1003 can receive radio frequency unit 1001 or network module 1002 or in memory The audio data stored in 1009 is converted into audio signal and exports as sound.Moreover, audio output unit 1003 can be with The relevant audio output of specific function performed with mobile terminal 1000 is provided (for example, call signal receives sound, message sink Sound etc.).Audio output unit 1003 includes loud speaker, buzzer and receiver etc..
Input unit 1004 is used to receive audio or video signal.Input unit 1004 can include graphics processor (Graphics Processing Unit, GPU) 10041 and microphone 10042, graphics processor 10041 in video to capturing In pattern or image capture mode by image capture apparatus (such as camera) obtain static images or video image data into Row processing.Treated, and picture frame may be displayed on display unit 1006.Through treated the picture frame of graphics processor 10041 It can be stored in memory 1009 (or other storage mediums) or be carried out via radio frequency unit 1001 or network module 1002 It sends.Microphone 10042 can receive sound, and can be audio data by such acoustic processing.Audio that treated Data can be converted to the lattice that mobile communication base station can be sent to via radio frequency unit 1001 in the case of telephone calling model Formula exports.
Mobile terminal 1000 further includes at least one sensor 1005, for example, optical sensor, motion sensor and other Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to ring The light and shade of border light adjusts the brightness of display panel 10061, proximity sensor can when mobile terminal 1000 is moved in one's ear, Close display panel 10061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions The size of (generally three axis) acceleration, can detect that size and the direction of gravity, can be used to identify mobile terminal appearance when static State (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) Deng;Sensor 1005 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, gas Meter, hygrometer, thermometer, infrared ray sensor etc. are pressed, details are not described herein.
Display unit 1006 is used to show by information input by user or be supplied to the information of user.Display unit 1006 can Including display panel 10061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes may be used Forms such as (Organic Light-Emitting Diode, OLED) are managed display panel 10061 is configured.
User input unit 1007 can be used for receiving the number inputted or character information and generation and the use of mobile terminal The key signals input that family is set and function control is related.Specifically, user input unit 1007 include touch panel 10071 with And other input equipments 10072.Touch panel 10071, also referred to as touch screen collect user on it or neighbouring touch are grasped Make (for example user uses any suitable objects such as finger, stylus or attachment on touch panel 10071 or in touch panel Operation near 10071).Touch panel 10071 may include both touch detecting apparatus and touch controller.Wherein, it touches The touch orientation of detection device detection user is touched, and detects the signal that touch operation is brought, transmits a signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1010, It receives the order that processor 1010 is sent and is performed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface The multiple types such as sound wave realize touch panel 10071.In addition to touch panel 10071, user input unit 1007 can also include Other input equipments 10072.Specifically, other input equipments 10072 can include but is not limited to physical keyboard, function key (ratio Such as volume control button, switch key), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 10071 can be covered on display panel 10061, when touch panel 10071 detects After touch operation on or near it, processor 1010 is sent to determine the type of touch event, is followed by subsequent processing device 1010 Corresponding visual output is provided on display panel 10061 according to the type of touch event.Although in Fig. 10, touch panel 10071 realize the function that outputs and inputs of mobile terminal with display panel 10061 is the component independent as two, but In some embodiments, touch panel 10071 with display panel 10061 can be integrated and realize outputting and inputting for mobile terminal Function does not limit specifically herein.
Interface unit 1008 is the interface that external device (ED) is connect with mobile terminal 1000.For example, external device (ED) can include Wired or wireless headphone port, external power supply (or battery charger) port, wired or wireless data port, storage card Port, the port for device of the connection with identification module, audio input/output (I/O) port, video i/o port, earphone Port etc..Interface unit 1008 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) simultaneously And one or more elements that the input received is transferred in mobile terminal 1000 or it can be used in mobile terminal Data are transmitted between 1000 and external device (ED).
Memory 1009 can be used for storage software program and various data.Memory 1009 can mainly include storage program Area and storage data field, wherein, storing program area can storage program area, needed at least one function application program (such as Sound-playing function, image player function etc.) etc.;Storage data field can be stored uses created data (ratio according to mobile phone Such as audio data, phone directory) etc..In addition, memory 1009 can include high-speed random access memory, can also include non- Volatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 1010 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part is stored in storage by running or performing the software program being stored in memory 1009 and/or module and call Data in device 1009 perform the various functions of mobile terminal and processing data, so as to carry out integral monitoring to mobile terminal.Place Reason device 1010 may include one or more processing units;Preferably, processor 1010 can integrate application processor and modulation /demodulation Processor, wherein, the main processing operation system of application processor, user interface and application program etc., modem processor master Handle wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1010.
Mobile terminal 1000 can also include the power supply 1011 (such as battery) powered to all parts, it is preferred that power supply 1011 can be logically contiguous by power-supply management system and processor 1010, so as to realize that management is filled by power-supply management system The functions such as electricity, electric discharge and power managed.
In addition, mobile terminal 1000 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 1010, memory 1009, storage On memory 1009 and the computer program that can be run on the processor 1010, the computer program is by processor 1010 Each process of above-mentioned browser access embodiment of the method is realized during execution, and identical technique effect can be reached, to avoid weight Multiple, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned browser access embodiment of the method when being executed by processor, and Identical technique effect can be reached, repeated to avoid, which is not described herein again.Wherein, the computer readable storage medium, such as Read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those elements, and And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or device institute Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this Also there are other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal (can be mobile phone, computer services Device, air conditioner or network equipment etc.) perform method described in each embodiment of the present invention.
The embodiment of the present invention is described above in conjunction with attached drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned specific embodiment is only schematical rather than restricted, those of ordinary skill in the art Under the enlightenment of the present invention, present inventive concept and scope of the claimed protection are not being departed from, can also made very much Form is belonged within the protection of the present invention.

Claims (12)

  1. A kind of 1. browser access method, which is characterized in that including:
    Receive control targe browser front stage operation first input, acquire user's characteristic information, the objective browser after Platform is run;
    If target user's information of the user's characteristic information and the objective browser mismatches, target described in front stage operation is clear It lookes at device, and limits the data for accessing the target user.
  2. 2. according to the method described in claim 1, it is characterized in that, the user's characteristic information is special for the face of camera acquisition Reference ceases, if target user's information of the user's characteristic information and the objective browser mismatches, front stage operation institute The step of stating objective browser, and limiting the data for accessing the target user, including:
    In the facial feature information for detecting the camera acquisition, if except the first facial feature information comprising target user The second facial feature information;
    If in the facial feature information of the camera acquisition, except the first facial feature information comprising the target user Second facial feature information, then objective browser described in front stage operation, and limit the data for accessing the target user.
  3. 3. if the according to the method described in claim 2, it is characterized in that, facial feature information of camera acquisition In, the second facial feature information except the first facial feature information comprising the target user, then mesh described in front stage operation The step of marking browser, and limiting the data for accessing the target user, including:
    If in the facial feature information of the camera acquisition, except the first facial feature information comprising the target user Second facial feature information, then show preset control, and the preset control is used to control the access of the data of the target user Permission;
    If receiving touch control operation of the user to the preset control, objective browser described in front stage operation, and limit access The data of the target user.
  4. 4. if the according to the method described in claim 2, it is characterized in that, facial feature information of camera acquisition In, the second facial feature information except the first facial feature information comprising the target user, then mesh described in front stage operation The step of marking browser, and limiting the data for accessing the target user, including:
    If in the facial feature information of the camera acquisition, except the first facial feature information comprising the target user Second facial feature information then receives the finger print information that user inputs in predeterminated position;
    If the finger print information and preset fingerprint information match, objective browser described in front stage operation, and limit and access institute State the data of target user.
  5. 5. according to the method described in claim 1, it is characterized in that, sound letter of the user's characteristic information for microphone acquisition Breath, if target user's information of the user's characteristic information and the objective browser mismatches, mesh described in front stage operation The step of marking browser, and limiting the data for accessing the target user, including:
    Detect microphone acquisition acoustic information whether the preset sound information match with the target user;
    If the acoustic information of the microphone acquisition is mismatched with the preset sound information, target described in front stage operation browses Device, and limit the data for accessing the target user.
  6. 6. a kind of mobile terminal, which is characterized in that including:
    Acquisition module for receiving the first of control targe browser front stage operation the input, acquires user's characteristic information, the mesh Mark browser running background;
    Module is run, if being mismatched for target user's information of the user's characteristic information and the objective browser, foreground The objective browser is run, and limits the data for accessing the target user.
  7. 7. mobile terminal according to claim 6, which is characterized in that the user's characteristic information is the face of camera acquisition Portion's characteristic information, the operation module, including:
    First detection sub-module, for detecting in the facial feature information of the camera acquisition, if include target user's The second facial feature information except first facial feature information;
    First operation submodule, if detecting the facial feature information of the camera acquisition for first detection sub-module In, the second facial feature information except the first facial feature information comprising the target user, then mesh described in front stage operation Browser is marked, and limits the data for accessing the target user.
  8. 8. mobile terminal according to claim 7, which is characterized in that the first operation submodule, including:
    Display unit, if being detected for first detection sub-module in the facial feature information that the camera acquires, comprising The second facial feature information except the first facial feature information of the target user then shows preset control, described default Control is used to control the access rights of the data of the target user;
    First running unit, if for receiving touch control operation of the user to the preset control, target described in front stage operation Browser, and limit the data for accessing the target user.
  9. 9. mobile terminal according to claim 7, which is characterized in that the first operation submodule, including:
    Receiving unit, if being detected for first detection sub-module in the facial feature information that the camera acquires, comprising The second facial feature information except the first facial feature information of the target user then receives user and is inputted in predeterminated position Finger print information;
    Second running unit, if for the finger print information and preset fingerprint information match, target described in front stage operation is clear It lookes at device, and limits the data for accessing the target user.
  10. 10. mobile terminal according to claim 6, which is characterized in that the user's characteristic information is microphone acquisition Acoustic information, the operation module, including:
    Second detection sub-module, for detect the acoustic information of microphone acquisition whether the default sound with the target user Sound information match;
    Second operation submodule, if for second detection sub-module detect the acoustic information of microphone acquisition with it is described Preset sound information mismatches, then objective browser described in front stage operation, and limit the data for accessing the target user.
  11. 11. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 5 is realized when the computer program is performed by the processor Any one of described in browser access method the step of.
  12. 12. a kind of computer readable storage medium, which is characterized in that computer journey is stored on the computer readable storage medium Sequence realizes the browser access method as described in any one of claim 1 to 5 when the computer program is executed by processor The step of.
CN201810245239.3A 2018-03-23 2018-03-23 browser access method and mobile terminal Active CN108197497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810245239.3A CN108197497B (en) 2018-03-23 2018-03-23 browser access method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810245239.3A CN108197497B (en) 2018-03-23 2018-03-23 browser access method and mobile terminal

Publications (2)

Publication Number Publication Date
CN108197497A true CN108197497A (en) 2018-06-22
CN108197497B CN108197497B (en) 2019-12-06

Family

ID=62595848

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810245239.3A Active CN108197497B (en) 2018-03-23 2018-03-23 browser access method and mobile terminal

Country Status (1)

Country Link
CN (1) CN108197497B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102214286A (en) * 2010-04-08 2011-10-12 鸿富锦精密工业(深圳)有限公司 Network content restricted browsing control system and method
CN105227572A (en) * 2015-10-19 2016-01-06 武汉大学 Based on the access control system of context aware and method on a kind of mobile platform
CN105701378A (en) * 2014-11-24 2016-06-22 中兴通讯股份有限公司 Terminal device control method and device
CN105760746A (en) * 2016-01-28 2016-07-13 福州瑞芯微电子股份有限公司 Authority management method, authority distribution method and equipment
CN106599663A (en) * 2016-12-14 2017-04-26 广东欧珀移动通信有限公司 Information security protecting method and mobile terminal
CN107437012A (en) * 2016-05-27 2017-12-05 阿里巴巴集团控股有限公司 The guard method of data and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102214286A (en) * 2010-04-08 2011-10-12 鸿富锦精密工业(深圳)有限公司 Network content restricted browsing control system and method
CN105701378A (en) * 2014-11-24 2016-06-22 中兴通讯股份有限公司 Terminal device control method and device
CN105227572A (en) * 2015-10-19 2016-01-06 武汉大学 Based on the access control system of context aware and method on a kind of mobile platform
CN105760746A (en) * 2016-01-28 2016-07-13 福州瑞芯微电子股份有限公司 Authority management method, authority distribution method and equipment
CN107437012A (en) * 2016-05-27 2017-12-05 阿里巴巴集团控股有限公司 The guard method of data and device
CN106599663A (en) * 2016-12-14 2017-04-26 广东欧珀移动通信有限公司 Information security protecting method and mobile terminal

Also Published As

Publication number Publication date
CN108197497B (en) 2019-12-06

Similar Documents

Publication Publication Date Title
CN108491133A (en) A kind of application control method and terminal
CN109194818A (en) A kind of information processing method and terminal
CN110109593A (en) A kind of screenshotss method and terminal device
CN108874352A (en) A kind of information display method and mobile terminal
CN109284150A (en) A kind of method and terminal starting application program
CN107831891A (en) A kind of brightness adjusting method and mobile terminal
CN108376096A (en) A kind of message display method and mobile terminal
CN109145552A (en) Information ciphering method and terminal device
CN110149628A (en) A kind of information processing method and terminal device
CN108171034A (en) A kind of method and terminal for protecting privacy
CN108108111A (en) A kind of inspection method, device and the mobile terminal of screen locking pictorial information
CN110457935A (en) A kind of authority configuring method and terminal device
CN110457879A (en) Object displaying method and terminal device
CN109981904A (en) A kind of method for controlling volume and terminal device
CN109993010A (en) A kind of information display method and mobile terminal
CN108920040A (en) A kind of application icon method for sorting and mobile terminal
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN108153460A (en) A kind of icon hiding method and terminal
CN108287738A (en) A kind of application control method and device
CN110213438A (en) A kind of processing method and terminal device of application program
CN110012151A (en) A kind of information display method and terminal device
CN110012152A (en) A kind of interface display method and terminal device
CN109828668A (en) A kind of display control method and electronic equipment
CN107885423A (en) The processing method and mobile terminal of a kind of picture
CN110471590A (en) Icon exchange method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant