CN109543390A - A kind of information security management method and system - Google Patents

A kind of information security management method and system Download PDF

Info

Publication number
CN109543390A
CN109543390A CN201811590510.3A CN201811590510A CN109543390A CN 109543390 A CN109543390 A CN 109543390A CN 201811590510 A CN201811590510 A CN 201811590510A CN 109543390 A CN109543390 A CN 109543390A
Authority
CN
China
Prior art keywords
user
electronic equipment
screen
information
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811590510.3A
Other languages
Chinese (zh)
Other versions
CN109543390B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinrun Ark Technology Co.,Ltd.
Original Assignee
Guangzhou Zhi Hong Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhi Hong Science And Technology Co Ltd filed Critical Guangzhou Zhi Hong Science And Technology Co Ltd
Priority to CN201811590510.3A priority Critical patent/CN109543390B/en
Publication of CN109543390A publication Critical patent/CN109543390A/en
Application granted granted Critical
Publication of CN109543390B publication Critical patent/CN109543390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

A kind of information security management method and system, this method comprises: showing unlocking manner on the screen and inputting;It is verified, information is configured and is managed, authentication failed then continues to input and verify;The presentation content when starting the application program of privacy involved in electronic equipment;Selected and setting is stored the content with peep-proof and leakage;It will be wait store with peep-proof and the progress format conversion of the content of leakage and store;When attempting display, shown on the screen by calling.This method and system can carry out information setting and scientific management to electronic equipment, the information security of the owner be protected, from causing personal information, privacy information, kith and kin's information and the leakage for associating data;It can be returned after promoting electronic equipment to lose;Flexibility and the user experience of unlock can be improved according to the use habit dynamic micro-adjustments parameter of user;It can guarantee that the data of storage can not be restored by cracking incomer, effectively improve data-handling efficiency, improve user experience.

Description

A kind of information security management method and system
Technical field
The present invention relates to electric data processing fields, and more specifically, are related to a kind of Information Security Management System and side Method.
Background technique
With the fast development of economic society, electronic equipment is more and more applied in people's lives, such as As means of communication, social tool, mobile internet access and information acquisition instrument, converter tools, image and video capture and Storage tool, information equipments of recording, shopping at network and mobile payment tool etc..It can be said that electronic equipment is at for people's lives Helper, significantly improve and enrich substance and the cultural life of people.However, just because of electronic equipment effect increasingly Obviously, so the safety problem of electronic equipment is also increasingly prominent.For example, electronic equipment is by nonowners in use, may cause Personal information leakage therein, or lead to the economic loss of the owner.Such as following scene: the mobile terminal of the owner is unfortunate It loses, causes the people found that can obtain the Alipay or wechat wallet or Third-party payment account of the owner, to give the owner When economic loss, the especially owner being brought to be provided with no password payment in order to convenient or exempt from password payment, the people found can It is transferred accounts with realizing with the slightest effort, brings great riches to lose to the owner.Alternatively, the mobile terminal of the owner is by friend Friend obtains, and enters application program and watch, and may cause the condition of individual privacy leakage or embarrassment, for example, the owner's shows Appoint friends of the opposite sex that may undoubtedly browse to picture, chat record, communications records, mark of former friends of the opposite sex of the owner etc. Deng causing the owner difficult to get at the truth.For another example nonowners may browse the letter of the other users in the mobile terminal of the owner Breath, the information such as name, work unit, telephone number, Email, communications records of kith and kin, so as to utilize these Information pretends to be the owner to swindle, and perhaps peddles personal information or carries out precision marketing, negative reputation is brought to the owner Or adverse effect.It is therefore desirable to carry out information setting and scientific management for electronic equipment, to preferably protect the owner Information security, from cause personal information, privacy information, kith and kin's information and associate data leakage.However in the prior art Often both for electronic equipment carry out screen locking setting, thus by input password, input biometric information, input gesture and It slides or generates pattern to unlock, and security level is not high, such as nonowners can attempt to continually enter password, Huo Zhegen Unlocking pin is inferred according to the scratch on electronic equipment screen, or is obtained owner's fingerprint by unlawful means and passed through instead Fingerprint mold is manufactured to engineering to unlock;In addition, even if unlock after, for the information in electronic equipment can not carry out classification or Setting, causes nonowners to see the content that should not be seen;In addition, if electronic equipment is often difficult to be returned once losing Also, so the return for the electronic equipment lost and its anti-leak of content ensure that the prior art lacks relevant measure.
Based on this, it is necessary to invent a kind of information security management method for being able to solve problem above and system.
Summary of the invention
An object of the present invention is to provide a kind of information security management method and system, can carry out to electronic equipment Information setting and scientific management, thus preferably protect the owner information security, from cause personal information, privacy information, Kith and kin's information and the leakage for associating data;And it can be returned after promoting electronic equipment to lose;It can be practised according to the use of user Used dynamic micro-adjustments parameter, improves flexibility and the user experience of unlock;It can guarantee that the number of storage can not be restored by cracking incomer According to effectively improving data-handling efficiency, improve user experience.
A kind of technical solution that the present invention takes to solve above-mentioned technical problem are as follows: information security management method, comprising: When electronic equipment is triggered, unlocking manner is shown on the screen;User inputs according to unlocking manner;If the verification passes Then the information of electronic equipment is configured and is managed, continue if authentication failed input and verify, until by verifying or Reach pre-determined number;When starting the application program of privacy involved in electronic equipment after user's checking, in application program presentation Hold;User is directed to the content stored with peep-proof and leakage, is selected and is arranged;Will wait store with peep-proof and The content of leakage carries out format conversion and stores;When the user clicks the icon with attempt display when, by call it is stored to prevent The content pried through and revealed, shows on the screen.
In one embodiment, this method further comprises: step 1, when electronic equipment is triggered, showing on the screen First unlocking manner;Step 2, user inputs according to the first unlocking manner, then enters step 7 if the verification passes, otherwise Enter step 3;Step 3, the second unlocking manner is shown on the screen;Step 4, user inputs according to the second unlocking manner, 7 are then entered step if the verification passes, otherwise enter step 5;Step 5, step 4 is repeated, if the second unlocking manner of user loses It loses number and reaches first threshold, then suspend unlock up to a period;Step 6, start involved in electronic equipment after user's checking When the application program of privacy, the application program presentation content;Step 7: user is directed to and is stored with peep-proof and leakage Content, selected and be arranged, and select to store after storage or enciphering transformation after simple transformation;Step 8: if it is simple Stored after transformation, then format conversion will be carried out with peep-proof and the content of leakage and store wait store, and the content up and down When literary information is shown, display icon in side's is on the screen to prompt to have stored the content with peep-proof and leakage, and executes step Rapid 10;Step 9, if it is storing after enciphering transformation, then format conversion will be carried out simultaneously with peep-proof and the content of leakage wait store Part, and when the contextual information of the content is shown, display icon in side's is on the screen to have prompted to have stored with peep-proof With the content of leakage, and step 10 is executed;Step 10, when the icon is when the user clicks to attempt display, the application prompts User inputs password, after verified, the stored content with peep-proof and leakage is called, to show on the screen.
In one embodiment, in steps of 5, step 4 is being repeated, if user's the second unlocking manner frequency of failure reaches First threshold is then suspended and is unlocked up to after a period, and by the camera lens of electronic equipment, shooting unlocks the user's of failure Image, and send the image to intended destination and/or be displayed on the screen.
It in one embodiment, in step 8, then will be wait store with peep-proof and let out if it is being stored after simple transformation The content of dew carries out format conversion and stores the specified region for arriving electronic equipment.
It in one embodiment, in step 9, then will be wait store with peep-proof and let out if it is being stored after enciphering transformation The content of dew carries out format conversion, and the specified region of the electronic equipment is arrived in part storage, and part in addition is stored to remote equipment.
In one embodiment, in step 10, when the icon is when the user clicks to attempt display, the application prompts User inputs password, after verified, from the specified region of the specified region of the electronic equipment or the electronic equipment and long-range The stored content with peep-proof and leakage of equipment calls, to show on the screen.
It in one embodiment, in step 10, will when user exits the application program or browsing other applications Transfer it is stored deleted from buffer with peep-proof and the content of leakage, and guarantee to be only stored in the specified of electronic equipment On region or the specified region and remote equipment of the electronic equipment.
In one embodiment, the first unlocking manner and the second unlocking manner are Password Inputs, slidably input, biological characteristic Identification input, any one in action input.
In one embodiment, the first unlocking manner is living things feature recognition input, wherein in step 2, user according to First unlocking manner carries out input and verifying includes: that Fingerprint Identification Unit and finger pressure sensor are provided in electronic equipment, when When finger is placed on Fingerprint Identification Unit by user, Fingerprint Identification Unit acquires and identifies its finger print information, and in reservations database Preset fingerprint be compared, and fingerprint results are transmitted to the determination module in electronic equipment;Finger is placed in fingerprint by user While on identifier, other fingers are placed on the finger pressure sensor on electronic equipment screen, the finger pressure sensor The pressure of other fingers application is acquired, and determines that pressure value is greater than the number of the dot matrix of second threshold in finger and screen contact area Amount, and calculate apply the satisfactory touch area of pressure accordingly, and then according to by the third threshold value in historian database And the 4th the default touch areal extent that limits between threshold value determine that user applies whether the satisfactory touch area of pressure falls Enter the default touch areal extent of the restriction, and the result for the default touch areal extent for whether falling into the restriction is transmitted to electricity Determination module in sub- equipment;Whether the determination module is by according to fingerprint results and falling into the default touch area of the restriction The result of range determines whether through verifying, when there are matching relationships for the preset fingerprint in fingerprint and reservations database, and When user's application satisfactory touch area of pressure is fallen into the default touch areal extent of the restriction, which will be tested The unlocked state that the result passed through is output to electronic equipment is demonstrate,proved, otherwise the result of authentication failed is output to electronics by the determination module The unlocked state of equipment;Wherein the preset fingerprint in fingerprint and reservations database is needed with the presence or absence of in the judgement of matching relationship Determine whether the similar proportion of the preset fingerprint in fingerprint and reservations database is greater than the 5th threshold value, is matched if it is greater than then existing Otherwise matching relationship is not present in relationship;Wherein every time in verifying, fallen into whenever user applies the satisfactory touch area of pressure When by the default touch areal extent that is limited between third threshold value and the 4th threshold value, after this time verifying, by the use of this time Family applies the satisfactory numerical value for touching area of pressure and is input in historian database, touches with the N item in historical record The record for touching area is averaged, and positive and negative a certain proportion of range of the average result is selected as new third threshold value and the 4th Threshold value improves flexibility and the user experience of unlock so that the use habit for making it possible to according to user is finely adjusted, and guarantees electricity The information security of sub- equipment;And second unlocking manner be living things feature recognition input, wherein in step 4, user is according to the Two unlocking manners carry out input and verifying include: be provided in electronic equipment environment light determination module, eye determination module and Movement sensing module containing gravity sensor;When entering the second unlocking manner, environment light determination module determines environment light Power passes if meeting strong environment cursor criterion starting eye determination module if meeting weak environment cursor criterion starting movement Feel module, and the selection mode of starting is shown on a display screen;Wherein eye determination module is for shooting by the camera lens of camera The video of the mobile variation of family eye, and the position of eyeball in every frame in the video is analyzed, the mobile change of comprehensive judgement user's eye Change, and the mobile variation track of user's eye is compared with the record in eye determination module, when determining matching degree symbol Lock screen is solved when conjunction requires, and user is notified to unlock failure when determining that matching degree is undesirable;It shoots and analysis operation Are as follows: when screen shows eye determination module, image or text prompt user on screen watch the Front camera of electronic equipment attentively And eyeball is at the appointed time moved in section, and keep specified distance range with Front camera, keep palm grip electronics Equipment is not shaken, which can guarantee that camera can capture the movement of user eyeball, while camera opens screening-mode, and Multiple frames in the video of the shooting are obtained in designated time period, by analyzing the big region of the grey scale change in every frame image, It locks eyes and determines the gray scale in close on two pixels especially by sequentially scanning in the horizontal and vertical directions When the variation of value is greater than seven threshold values, rest of pixels sequence in this direction is calculated, and the variation of gray value is depicted as curve, Show the boundary for reaching sclera and iris when there is maximum, show pupil position when there is minimum, when appearance second Show the boundary for reaching iris and sclera when a maximum, executes same operation to capture another eyes in this frame image Location information and coordinate values;The position of two pupils in consecutive frame is successively analyzed later, and according to each in every frame image The coordinate values of a pupil draw the moving curve of eyes of user;And it will be in the eyes curve of drafting and eye determination module Record is compared, and solves lock screen when determining that at least one in eyes and the matching degree of record meet the requirements;If met Weak environment cursor criterion starts movement sensing module, and the selection mode of starting is shown on a display screen, and user is reminded to hold The electronic equipment is shaken with certain track in the electronic equipment and at the appointed time section, the motion-sensing in the electronic equipment Gravity sensor in module is drawn according to the variation of the acceleration in electronic equipment at the appointed time section by movement sensing module Acceleration change curve processed, to be compared with the record in movement sensing module, when determining acceleration change curve and note One matching degree in the acceleration change curve of record solves lock screen when meeting the requirements.
In one embodiment, a kind of Information Security Management System is also disclosed, which includes storage Device, processor, application program, Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, environment light determine mould Block, eye determination module, movement sensing module, gravity sensor, camera, camera lens, social application program, conversion module, the whole world Positioning system program module, the application program for starting mobile communication, timing module, which includes for executing above- mentioned information The program of method for managing security, program in the invoked memory of the processor with application program, Fingerprint Identification Unit, determine mould Block, finger pressure sensor, unlocked state, environment light determination module, eye determination module, movement sensing module, gravity sensitive Device, camera, camera lens, social application program, conversion module, global positioning system program module, the application journey for starting mobile communication Sequence, timing module execute one or more of the step of above- mentioned information method for managing security together.
Detailed description of the invention
In the accompanying drawings by way of example rather than the embodiment of the present invention is shown by way of limitation, wherein phase Same appended drawing reference indicates identical element, in which:
According to an exemplary embodiment of the invention, the general flow chart of Fig. 1 pictorial information method for managing security.
According to an exemplary embodiment of the invention, the structure chart of Fig. 2 pictorial information safety management system.
Specific embodiment
Before carrying out following specific embodiments, certain words and phrase used in the patent document are illustrated Definition may be advantageous: term " includes " and "comprising" and its derivative mean to include without limiting;Term "or" is Include, it is meant that and/or;Phrase " with ... it is associated ", " associated with it " and its derivative might mean that including quilt Be included in ... it is interior, with ... interconnection, include be comprised in ... it is interior, be connected to ... or with ... connect, be coupled to ... or With ... couple, can be with ... communicate, with ... cooperation interweaves, and side by side, approaches ..., be bound to ... or with ... binding, tool Have, attribute having ..., etc.;And term " controller " mean to control any equipment of at least one operation, system or its Component, such equipment may be realized with some combinations of hardware, firmware or software or wherein at least two.It should be noted that : functionality associated with any specific controller may be centralization or distributed, either local or remote Journey.The definition for being used for certain words and phrase is provided through patent document, it should be understood by those skilled in the art that: if not In most cases, in many cases, such definition is suitable for word and phrase existing and define in this way not To use.
In the following description, several specific embodiments with reference to attached drawing and are diagrammatically shown.It will be appreciated that It is contemplated that and other embodiments can be made without departing from the scope of the present disclosure or spirit.Therefore, described in detail below should not be by Think in a limiting sense.
According to an exemplary embodiment of the invention, Fig. 1 illustrates a kind of general flow chart of information security management method.Specifically Ground, this method comprises:
Step 1, when electronic equipment is triggered, the first unlocking manner is shown on the screen;
Step 2, user inputs according to the first unlocking manner, then enters step 7 if the verification passes, otherwise enters step Rapid 3;
Step 3, the second unlocking manner is shown on the screen;
Step 4, user inputs according to the second unlocking manner, then enters step 7 if the verification passes, otherwise enters step Rapid 5;
Step 5, step 4 is repeated to suspend unlock if user's the second unlocking manner frequency of failure reaches first threshold and reach One period, and by the camera lens of electronic equipment, the image of the user of shooting unlock failure, and send the image to pre- Determine destination and/or is displayed on the screen;
Step 6, when starting the application program of privacy involved in electronic equipment after user's checking, in application program presentation Hold;
Step 7: user is directed to the content stored with peep-proof and leakage, is selected and is arranged, and selected It is stored after storage or enciphering transformation after simple transformation;
Step 8: if it is storing after simple transformation, then format change will be carried out with peep-proof and the content of leakage wait store It changes, the specified region of electronic equipment is arrived in storage, and when the contextual information of the content is shown, on the screen side's display icon There is the content stored with peep-proof and leakage with prompt, and executes step 10;
Step 9, if it is storing after enciphering transformation, then format change will be carried out with peep-proof and the content of leakage wait store It changes, the specified region of the electronic equipment is arrived in part storage, and part in addition is stored to remote equipment, and in the context of the content When information is shown, display icon in side's is on the screen to prompt to have stored the content with peep-proof and leakage, and executes step 10;
Step 10, when the icon is when the user clicks to attempt display, application prompts user inputs password, verified Later, it is called from the specified region and remote equipment of the specified region of the electronic equipment or the electronic equipment stored with peep-proof Depending on and leakage content, to show on the screen;It, will and when user exits the application program or browsing other applications Transfer it is stored deleted from buffer with peep-proof and the content of leakage, and guarantee to be only stored in the specified of electronic equipment On region or the specified region and remote equipment of the electronic equipment.
According to an exemplary embodiment of the invention, the first unlocking manner and the second unlocking manner can be Password Input, cunning Dynamic input, living things feature recognition input, any one in action input.
According to an exemplary embodiment of the invention, the first unlocking manner is living things feature recognition input, wherein in step 2 In, user inputs according to the first unlocking manner and verifying includes: that Fingerprint Identification Unit and finger pressure are provided in electronic equipment Power sensor, when finger is placed on Fingerprint Identification Unit by user, Fingerprint Identification Unit acquires and identifies its finger print information, and with it is pre- The preset fingerprint determined in database is compared, and fingerprint results are transmitted to the determination module in electronic equipment;User is by hand While finger is placed on Fingerprint Identification Unit, other fingers are placed on the finger pressure sensor on electronic equipment screen, the finger Pressure sensor acquires the pressure of other fingers application, and determines that pressure value is greater than second threshold in finger and screen contact area Dot matrix quantity, and calculate apply the satisfactory touch area of pressure accordingly, and then according to by historian database Third threshold value and the 4th threshold value between the default touch areal extent that limits determine that user applies the satisfactory touch of pressure Whether area falls into the default touch areal extent of the restriction, and by whether fall into the restriction default touch areal extent knot Fruit is transmitted to the determination module in electronic equipment;Whether the determination module is by according to fingerprint results and falling into the pre- of the restriction If touching the result of areal extent to determine whether to match by verifying when fingerprint exists with the preset fingerprint in reservations database Relationship, and user applies pressure satisfactory touch area when falling into the default touch areal extent of the restriction, and this is sentenced The result being verified is output to the unlocked state of electronic equipment by cover half block, and otherwise the determination module is by the result of authentication failed It is output to the unlocked state of electronic equipment;Wherein fingerprint whether there is sentencing for matching relationship with the preset fingerprint in reservations database In fixed, need to determine whether the similar proportion of the preset fingerprint in fingerprint and reservations database is greater than the 5th threshold value, if it is greater than Then there is matching relationship, matching relationship is otherwise not present;Wherein every time in verifying, whenever user applies the satisfactory touching of pressure When touching area and falling into the default touch areal extent by being limited between third threshold value and the 4th threshold value, after this time verifying, The user of this time is applied the satisfactory numerical value for touching area of pressure to be input in historian database, with historical record In N item touch the record of area and be averaged, and the range of the positive and negative certain proportion of the average result (± M%) is selected as newly Third threshold value and the 4th threshold value improve the flexibility of unlock so that the use habit for making it possible to according to user is finely adjusted And user experience, guarantee the information security of electronic equipment.
According to an exemplary embodiment of the invention, the second unlocking manner is living things feature recognition input, wherein in step 4 In, user inputs according to the second unlocking manner and verifying includes: that environment light determination module, eye are provided in electronic equipment Determination module and movement sensing module containing gravity sensor;When entering the second unlocking manner, environment light determination module The power of environment light is determined, if meeting strong environment cursor criterion starting eye determination module, if meeting weak environment light standard Then start movement sensing module, and the selection mode of starting is shown on a display screen;Wherein eye determination module passes through camera Camera lens, the video of the mobile variation of shooting user's eye, and analyze the position of eyeball in every frame in the video, comprehensive judgement user The mobile variation of eye, and the mobile variation track of user's eye is compared with the record in eye determination module, when true Determine to solve lock screen when matching degree meets the requirements, user is notified to unlock failure when determining that matching degree is undesirable.It is clapped Take the photograph and analyze operation are as follows: when screen shows eye determination module, image or text prompt user on screen are watched electronics attentively and set Standby Front camera simultaneously moves eyeball at the appointed time in section, and keeps specified distance range with Front camera, keeps Palm grip electronic equipment does not shake, which can guarantee that camera can capture the movement of user eyeball, while camera is opened Screening-mode, and at the appointed time multiple frames in section in the video of the acquisition shooting, pass through the gray scale analyzed in every frame image Change big region, locks eyes especially by sequentially scanning in the horizontal and vertical directions and determine close on two When the variation of gray value in pixel is greater than seven threshold values, rest of pixels sequence in this direction is calculated, and by the change of gray value Change is depicted as curve, shows the boundary for reaching sclera and iris when there is maximum, shows pupil position when there is minimum It sets, shows the boundary for reaching iris and sclera when there is second maximum, execute same operation to capture another eye Eyeball location information in this frame image and coordinate values;The position of two pupils in consecutive frame, and root are successively analyzed later The moving curve of eyes of user is drawn according to the coordinate values of each pupil in every frame image;And by the eyes curve and eye of drafting Record in portion's determination module is compared, the unlock when determining that at least one in eyes and the matching degree of record meet the requirements Screen.Such as when user has pre-registered " √ " shape unlocking pin in record, the movement of at least one in the eyes of drafting The matching degree of curve and record meets the requirements, then being shown to be the user is the owner.In addition, if meeting weak environment light standard Then start movement sensing module, and the selection mode of starting is shown on a display screen, user is reminded to hold the electronic equipment simultaneously The electronic equipment is shaken with certain track in section at the appointed time, the gravity in movement sensing module in the electronic equipment Sensor is changed according to the variation of the acceleration in electronic equipment at the appointed time section by movement sensing module rendering accelerating degree Curve, to be compared with the record in movement sensing module, when the acceleration for determining acceleration change curve and record becomes Change when one matching degree in curve meets the requirements and solves lock screen.Such as when user has pre-registered " N " shape in record When unlocking pin, when user hold electronic equipment and at the appointed time the estimation moved in section be also N, and acceleration change song When the matching degree of the acceleration change curve of line and record meets the requirements, then being shown to be the user is the owner.
According to an exemplary embodiment of the invention, step 5 further comprises: if user's the second unlocking manner frequency of failure Reach first threshold, then suspends unlock up to a period T, after period T, if user still passes through the second unlocking manner Attempt unlock, then after the unlock frequency of failure sum accumulation of its second method reaches greater than the 6th threshold value of first threshold, choosing It selects one of following manner: extending pause unlocked time section T ', wherein T ' > T;Start third unlocking manner, wherein third solution Lock mode is Password Input, slidably input, living things feature recognition input, any one in action input, if third unlocks When the mode frequency of failure is up to six threshold values, failure signal is sent to electronics processors to shut down by unlocked state.It is shutting down Before, when unlock the frequency of failure reach first threshold or six threshold values when, illustrate attempt unlock user be nonowners or The changed owner of person's biological characteristic recognition information passes through the camera mirror of electronic equipment at this time in order to ensure information safety Head, the image of the user of shooting unlock failure, and send the image to intended destination and/or be displayed on the screen;Wherein It is sent to the operation of intended destination are as follows: the owner is in advance by unlocked state and social application program, global positioning system application Program, the application program for starting mobile communication are associated, match and are arranged, when aforementioned unlock unsuccessfully reaches certain number, solution Lock module opens global positioning system application program and starts the application program of mobile communication, and by searching for the table of electronic equipment Widget (widget) on face simultaneously starts social application program, inquiry wherein preset contact person, by shooting The present image for unlocking the user of failure is transferred to preset contact person, and passes through social application program, via mobile network The positioning of the geographical coordinate of the electronic equipment is sent to preset contact person by network, so that preset contact person obtains The position of the electronic equipment and the information for attempting the people unlocked;In addition, in order to promote the people for attempting to unlock that can give back the electronics Equipment, the screen of the electronic equipment also show the image of the user of the unlock failure of shooting, and show owner's contact method Or the contact method of its kith and kin.By the setting, the safety of the information of electronic equipment can be effectively facilitated.
Preferably, the owner of the electronic equipment is in advance by the social applications such as unlocked state and wechat (wechat), positioning Program, wireless network startup program are associated, match and are arranged, and when aforementioned unlock unsuccessfully reaches certain number, unlocked state is opened It opens global positioning system application program and starts the application program of mobile communication, and by searching for the window on the desktop of electronic equipment Mouth widget simultaneously starts the social applications such as wechat, inquires wherein preset contact person (for example, " wife Zhang Qing "), will shoot The present image of user of unlock failure be transferred to wife Zhang Qing, and by the social applications such as wechat, via wireless network, pass through Finder the positioning (such as " position " in the social applications such as wechat) of the geographical coordinate of the electronic equipment is sent to (such as Start " sending position " function or " shared real time position " function in " position " in the social applications such as wechat) wife The mountain valley with clumps of trees and bamboo, so that wife opens the information that the mountain valley with clumps of trees and bamboo obtains the position of the electronic equipment and attempts the people of unlock;In addition, in order to promote to attempt to unlock People can give back the electronic equipment, the screen of the electronic equipment also shows the image of the user of the unlock failure of shooting, and Show owner's contact method or the contact method of its kith and kin;Preferably, " position " in the social applications such as starting wechat In " shared real time position " function after, keep the state of activation of the function, wait preset contact person according to the position Confidence breath carries out the position positioning of electronic equipment or finds the electronic equipment accordingly, in order to be able to guarantee electronic equipment as early as possible Ground is returned or is found, and reduces the loss of information leakage bring.
According to an exemplary embodiment of the invention, in step 8, simple transformation are as follows: the window that user is presented in application program In mouthful, finger is stopped at some position in the application (such as chat record, short message, picture) up to a timing Between, keep touch screen to move up or down later, pullup or pulldown is reached user's phase by the window of the application program at this time When hoping at the position of storage, at another position of user's finger in the application (such as another chat record, another Short message, another picture) it stops up to certain time, when user's finger is removed from touch screen, at some described position Information between to another position is chosen.Selected information is converted to figure by screenshot mode by conversion module later Piece format, and execute following operation: the pixel of the picture is calculated, u × v pixel is obtained, which is divided into P mutually without weight Folded image tiles (tile) obtain image tiles by the pixel value of the image tiles according to quantity sequential from less to more Sequence tile1, tile2 ... ..., tilew takes the median in the sequence to obtain the median image tile of the sequence, wherein When w is even number, the image tiles that sequence number is w value half is taken to take sequence when w is odd number as median image tile Number is the image tiles of the integer part of w value half as median image tile;Calculate the median image tile and the sequence In other image tiles pixel w-1 quantity it is poor;Later by the number of median image tile and the pixel of each image tile fragment Amount difference is modified, to generate offset: wherein when quantity difference is bigger than the 8th threshold value as positive integer, by median image watt The quantity difference of the pixel of piece and the image tile fragment adds one, and when quantity difference is smaller than the opposite number of the 8th threshold value as positive integer When, by the quantity subtractive one of median image tile and the pixel of the image tile fragment, and when quantity difference is between the 8th threshold value and its phase Anti- number and when including between two endpoints, median image tile and the quantity difference of the pixel of the image tile fragment are constant;It traverses later The quantity of corresponding each pixel is poor in image tiles, according to before by the pixel of median image tile and each image tile fragment Quantity difference is modified the offset of generation, binary password position is inserted into the vacancy of offset formation, and in image watt It is inserted into departure indications between block, so that format conversion will be carried out wait store with peep-proof and the content of leakage by realizing, and then stores Into the specified region of electronic equipment, and when the contextual information of the content is shown, display icon in side's is on the screen to mention It is shown with the content stored with peep-proof and leakage.
At some position to the information between another position it is chosen during, pressure sensor is for selected Position is judged, and when detecting that effective pressure stops at some position on the touchscreen, trigger signal is sent to Timing module simultaneously starts timing, stops timing when detecting that pressure limit is mobile, and executes similarly at another position Operation;Only when timer determines that the period at two positions is above pre-provisioning request, just it is considered effectively selected Process;Wherein at some position determination carry out selected step are as follows: by the information of the application program according to default unit (such as According to every chat record, every short message, every picture) be divided into different parts, by the part and preceding section Between the upper bound of the middle line as the part, using the middle line between back to back part of the part as under the part Boundary, using the rectangular area between the upper bound, lower bound and the screen left and right sides as the region of the part;When user's finger touches When, pressure sensor first determines the satisfactory effective touch range of pressure value, and calculates effective touch range and be located at not The part is determined as selected portion when being fully located at some part by pixel quantity and its ratio in the same part Point, when touching across middle line, the part that ratio is more than half is determined as selected part, and when ratio is just half When, remind user to select again on the screen, and then repeat the above operation to determine selected part.
According to an exemplary embodiment of the invention, enciphering transformation is the following steps are included: the window that user is presented in application program In mouthful, finger is stopped at some position in the application (such as chat record, short message, picture) up to a timing Between, finger is removed from touch screen later, and within another specified time, realizes the window of application program by pulling scroll bar Pullup or pulldown, when reaching at the position of user's expectation storage, at another position of user's finger in the application (such as Another chat record, another short message, another picture) it stops and reaches certain time, then when user's finger is from touch screen It is chosen to the information between another position at some described position when removal.Conversion module passes through screenshot side later Selected information is converted to picture format, and executes following operation by formula: the image decomposed, it will using wavelet transformation The image is transformed to horizontal component, vertical component, diagonal components and other components, and other components and diagonal line are divided The specified region of the electronic equipment is arrived in amount storage, and horizontal component and vertical component are stored to remote equipment;Wherein storage is to far Journey equipment includes: to be inserted into the key of user's input between based on horizontal component and vertical component, to generate the first number According to sequence;The first data sequence is sent to the remote equipment of such as cloud server etc, so that remote equipment is according to first Data sequence carries out the first verifying, and forms identifying code;The identifying code that remote equipment returns is received, and the identifying code is stored in In the specified region of the electronic equipment, use when subsequent calls is remained.Hereby it is possible to guarantee the safety of information in electronic equipment, Guarantee that electronic equipment is lost or cracks unlock by nonowners, into after the application program, can guarantee that data information is endless It is whole, so that the partial data can not be restored by cracking incomer, it ensure that information is not leaked;Simultaneously because do not need to all to Storage is encrypted with peep-proof and the content of leakage, can effectively improve data-handling efficiency, improves user experience.
According to an exemplary embodiment of the invention, in step 10, when icon is when the user clicks to attempt display, the application Program reminds user to input password, after verified, the application program launching mobile network communication, from the specified of the electronic equipment The stored content with peep-proof and leakage is called in the specified region and remote equipment of region or the electronic equipment, when being simple When storing after transformation, binary password position is inputted, and then remove by binary password position, according to division from the content of storage When departure indications extract each image tiles, than generating the pixel of image tiles according to quantity sequential from less to more Quantity is poor, and traverses each image tiles, when the quantity difference of intermediate value image tiles and the pixel of each image tile fragment is greater than the Eight threshold values a period of time, by the quantity subtractive one, when the quantity difference of intermediate value image tiles and the pixel of each image tile fragment is less than the 8th When threshold value adds one opposite number, which is added one, when quantity difference is between the opposite to that number of the 8th threshold value and including two ends When between point, median image tile and the quantity difference of the pixel of the image tile fragment are constant;Thus realize the image tiles of image Inverse offset restores the peep-proof of storage and the content of leakage by the splicing of image tiles;It is stored after for enciphering transformation When, identifying code is transferred from the specified region of electronic equipment, and send it to remote equipment, is carried out going back original shape by remote equipment At the first data sequence and the first data sequence is sent back, based on the key of user's input, is reduced into horizontal component and vertical point Amount, and other components and diagonal components stored in specified region are combined, original image is obtained by inverse transformation.
According to an exemplary embodiment of the invention, the structure chart of Fig. 2 pictorial information safety management system.The information security pipe Reason system include memory, processor, application program, Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, Environment light determination module, movement sensing module, gravity sensor, camera, camera lens, social application program, becomes eye determination module Block, global positioning system program module, the application program for starting mobile communication, timing module are changed the mold, which includes being used for The program for executing above- mentioned information method for managing security, program in the invoked memory of the processor with application program, fingerprint Identifier, determination module, finger pressure sensor, unlocked state, environment light determination module, eye determination module, motion-sensing Module, gravity sensor, camera, camera lens, social application program, conversion module, global positioning system program module, starting movement One or more of the step of application program of communication, timing module execute above- mentioned information method for managing security together.
Above-mentioned each technical term is the routine techniques term with common meaning in this field, in order not to obscure this The emphasis of invention, is not further explained it herein.
It to sum up, in the inventive solutions, can be to electronics by using a kind of information security management method Equipment carries out information setting and scientific management, to preferably protect the information security of the owner, from causing personal information, hidden Personal letter breath, kith and kin's information and the leakage for associating data;And it can be returned after promoting electronic equipment to lose;It can be according to user's Use habit dynamic micro-adjustments parameter improves flexibility and the user experience of unlock;It can guarantee to crack incomer restore and deposit The data of storage, effectively improve data-handling efficiency, improve user experience.
It will be appreciated that example and reality of the invention can be realized in the form of the combination of hardware, software or hardware and software Apply example.As described above, any main body for executing this method can be stored, in the form of volatility or non-volatile holographic storage, such as Equipment is stored, as ROM, whether no matter can erasing or is rewritable, or in the form of a memory, such as RAM, storage core Piece, equipment or integrated circuit or on the readable medium of light or magnetic, such as CD, DVD, disk or tape.It will be appreciated that Storage equipment and storage medium are suitable for storing the example of the machine readable storage of one or more programs, upon being performed, One or more of programs realize example of the invention.Via any medium, such as it is loaded with by wired or wireless coupling Signal of communication can electronically transmit example of the invention, and example suitably includes identical content.
It is to be noted that because the present invention, which solves, to carry out information setting and scientific management to electronic equipment, from And the information security of the owner is preferably protected, from causing letting out for personal information, privacy information, kith and kin's information and contacts data Dew;And it can be returned after promoting electronic equipment to lose;Unlock can be improved according to the use habit dynamic micro-adjustments parameter of user Flexibility and user experience;It can guarantee that the data of storage can not be restored by cracking incomer, effectively improve data processing effect Rate, the technical issues of improving user experience, use in field of computer technology technical staff after reading this description Technological means to understand is instructed according to it, and obtains advantageous effects, so requiring to protect in the following claims The scheme of shield belongs to the technical solution on patent law purposes.In addition, because the claimed technical solution of appended claims can To make or use in the industry, therefore the program has practicability.
The above, preferable specific embodiment only of the invention, but protection scope of the present invention is not limited to This, anyone skilled in the art in the technical scope disclosed by the present invention, the variation that can readily occur in or replaces It changes, should all forgive within protection scope of the present invention.Unless be otherwise expressly recited, otherwise disclosed each feature is only It is equivalent or similar characteristics a example for general series.Therefore, protection scope of the present invention should be with claims Subject to protection scope.

Claims (10)

1. a kind of information security management method, comprising:
When electronic equipment is triggered, unlocking manner is shown on the screen;
User inputs according to unlocking manner;
Then the information of electronic equipment is configured and is managed if the verification passes,
Continue to input if authentication failed and verify, until by verifying or reaching pre-determined number;
When starting the application program of privacy involved in electronic equipment after user's checking, the application program presentation content;
User is directed to the content stored with peep-proof and leakage, is selected and is arranged;
It will be wait store with peep-proof and the progress format conversion of the content of leakage and store;
When the icon is when the user clicks to attempt display, by calling the stored content with peep-proof and leakage, on the screen Display.
2. information security management method according to claim 1, wherein this method further comprises:
Step 1, when electronic equipment is triggered, the first unlocking manner is shown on the screen;
Step 2, user inputs according to the first unlocking manner, then enters step 7 if the verification passes, otherwise enters step 3;
Step 3, the second unlocking manner is shown on the screen;
Step 4, user inputs according to the second unlocking manner, then enters step 7 if the verification passes, otherwise enters step 5;
Step 5, step 4 is repeated, if user's the second unlocking manner frequency of failure reaches first threshold, suspends unlock up to for the moment Between section;
Step 6, when starting the application program of privacy involved in electronic equipment after user's checking, the application program presentation content;
Step 7: user is directed to the content stored with peep-proof and leakage, is selected and is arranged, and selects simple It is stored after storage or enciphering transformation after transformation;
Step 8:, then will be wait store with peep-proof and the progress format conversion of the content of leakage and deposit if it is being stored after simple transformation Storage, and when the contextual information of the content is shown, on the screen side's display icon to have prompted to have stored with peep-proof and The content of leakage, and execute step 10;
Step 9, if it is storing after enciphering transformation, then format conversion and portion will be carried out with peep-proof and the content of leakage wait store Point, and when the contextual information of the content is shown, on the screen side's display icon to have prompted to have stored with peep-proof and The content of leakage, and execute step 10;And
Step 10, when the user clicks the icon with attempt display when, application prompts user input password, it is verified it Afterwards, the stored content with peep-proof and leakage is called, to show on the screen.
3. information security management method according to claim 2, in which:
In steps of 5, suspend unlock if user's the second unlocking manner frequency of failure reaches first threshold in repetition step 4 Up to after a period, by the camera lens of electronic equipment, the image of the user of shooting unlock failure, and the image is sent To intended destination and/or it is displayed on the screen.
4. information security management method according to claim 3, in which:
In step 8, if it is storing after simple transformation, then format conversion will be carried out with peep-proof and the content of leakage wait store And store the specified region for arriving electronic equipment.
5. information security management method according to claim 4, in which:
In step 9, if it is storing after enciphering transformation, then format change will be carried out with peep-proof and the content of leakage wait store It changes, the specified region of the electronic equipment is arrived in part storage, and part in addition is stored to remote equipment.
6. information security management method according to claim 5, in which:
In step 10, when the icon is when the user clicks to attempt display, application prompts user inputs password, verified Later, it is called from the specified region and remote equipment of the specified region of the electronic equipment or the electronic equipment stored with peep-proof Depending on and leakage content, to show on the screen.
7. information security management method according to claim 6, in which:
In step 10, stored with peep-proof by what is transferred when user exits the application program or browsing other applications Depending on and the content of leakage deleted from buffer, and guarantee to be only stored in specified region or the electronic equipment of electronic equipment Specified region and remote equipment on.
8. information security management method according to claim 7, in which:
First unlocking manner and the second unlocking manner be Password Input, slidably input, living things feature recognition input, in action input Any one.
9. information security management method according to claim 8, in which:
First unlocking manner is living things feature recognition input, wherein in step 2, user inputs according to the first unlocking manner Include: to be provided with Fingerprint Identification Unit and finger pressure sensor in electronic equipment with verifying, knows when finger is placed in fingerprint by user When on other device, Fingerprint Identification Unit acquires and identifies its finger print information, and is compared with the preset fingerprint in reservations database, and Determination module fingerprint results being transmitted in electronic equipment;While finger is placed on Fingerprint Identification Unit by user, other hands Refer on the finger pressure sensor being placed on electronic equipment screen, which acquires the pressure of other fingers application Power, and determine that finger is greater than the quantity of the dot matrix of second threshold with pressure value in screen contact area, and calculate apply pressure accordingly The satisfactory touch area of power, and then according to by limiting between the third threshold value and the 4th threshold value in historian database The default areal extent that touches determines that user applies the satisfactory default touch surface for touching area and whether falling into the restriction of pressure Range is accumulated, and the result for the default touch areal extent for whether falling into the restriction is transmitted to the determination module in electronic equipment; The determination module according to the result of fingerprint results and the default touch areal extent for whether falling into the restriction by determining to be It is no by verifying, when there are matching relationships for the preset fingerprint in fingerprint and reservations database, and user applies pressure and conforms to When the touch area asked is fallen into the default touch areal extent of the restriction, which is output to the result being verified The unlocked state of electronic equipment, otherwise the result of authentication failed is output to the unlocked state of electronic equipment by the determination module;Its Preset fingerprint in middle fingerprint and reservations database needs to determine fingerprint and tentation data with the presence or absence of in the judgement of matching relationship Whether the similar proportion of the preset fingerprint in library is greater than the 5th threshold value, if it is greater than then there is matching relationship, otherwise there is no With relationship;Wherein every time in verifying, fall into whenever user applies the satisfactory touch area of pressure by third threshold value and the 4th When in the default touch areal extent limited between threshold value, after this time verifying, the user of this time is applied into pressure and is conformed to The numerical value for the touch area asked is input in historian database, and the record for touching area with the N item in historical record carries out It is average, and positive and negative a certain proportion of range of the average result is selected as to new third threshold value and the 4th threshold value, to make it possible to It is enough to be finely adjusted according to the use habit of user, flexibility and the user experience of unlock are improved, guarantees the information peace of electronic equipment Entirely;And
Second unlocking manner is living things feature recognition input, wherein in step 4, user inputs according to the second unlocking manner It include: environment light determination module, eye determination module to be provided in electronic equipment and containing the fortune of gravity sensor with verifying Dynamic sensing module;When entering the second unlocking manner, environment light determination module determines the power of environment light, if meeting strong environment Cursor criterion starts eye determination module, if meeting weak environment cursor criterion starting movement sensing module, and by the choosing of starting The mode of selecting is shown on a display screen;Wherein camera lens of the eye determination module by camera, the view of the mobile variation of shooting user's eye Frequently, and the position of eyeball in every frame in the video is analyzed, the mobile variation of comprehensive judgement user's eye, and by the shifting of user's eye Dynamic variation track is compared with the record in eye determination module, and lock screen is solved when determining that matching degree meets the requirements, when It determines and user is notified to unlock failure when matching degree is undesirable;It shoots and analysis operation are as follows: when screen shows that eye is sentenced When cover half block, image or text prompt user on screen watch the Front camera of electronic equipment attentively and make eyeball at the appointed time It is moved in section, and keeps the distance range specified with Front camera, palm grip electronic equipment is kept not shake, which can Guarantee that camera can capture the movement of user eyeball, while camera opens screening-mode, and the bat is at the appointed time obtained in section Multiple frames in the video taken the photograph lock eyes, specific behaviour by analyzing the big region of the grey scale change in every frame image As: smooth operation is executed to every frame image using filter, obtains the convolution results of present image and filter;Difference Calculation The gradient magnitude of adjacent pixel, when gradient is greater than the threshold value of setting, the region where determining the image is area-of-interest, and Record its coordinate value in this frame image;The grayscale information of the area-of-interest is counted, and carries out binaryzation;By in level With sequentially scanned in vertical direction, determine the gray value in close on two pixels variation be greater than seven threshold values when, calculate should Rest of pixels sequence on direction, and the variation of gray value is depicted as curve, show to reach when there is maximum sclera and The boundary of iris, shows pupil position when there is minimum, shows to reach iris and sclera when there is second maximum Boundary, execute same operation to capture another eyes location information in this frame image and coordinate values;Later according to The position of two pupils in secondary analysis consecutive frame, and user's eye is drawn according to the coordinate values of each pupil in every frame image The moving curve of eyeball;And be compared the eyes curve of drafting with the record in eye determination module, when determining in eyes extremely The matching degree lacking one and recording solves lock screen when meeting the requirements;If meeting weak environment cursor criterion starting motion-sensing mould Block, and the selection mode of starting is shown on a display screen, remind user to hold the electronic equipment and at the appointed time in section The electronic equipment is shaken with certain track, the gravity sensor in movement sensing module in the electronic equipment is set according to electronics The variation of acceleration in standby section at the appointed time, by movement sensing module rendering accelerating degree change curve, thus with movement Record in sensing module is compared, when one 's in the acceleration change curve for determining acceleration change curve and record Lock screen is solved when matching degree meets the requirements.
10. a kind of Information Security Management System is applied in electronic equipment, which includes memory, place Manage device, application program, Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, environment light determination module, eye Determination module, movement sensing module, gravity sensor, camera, camera lens, social application program, conversion module, global positioning system Program module, the application program for starting mobile communication, timing module, which includes for executing above- mentioned information safety management The program of method, program in the invoked memory of the processor with application program, Fingerprint Identification Unit, determination module, finger Pressure sensor, unlocked state, environment light determination module, eye determination module, movement sensing module, gravity sensor, camera, Camera lens, social application program, conversion module, global positioning system program module, the application program for starting mobile communication, timing mould Block together perform claim require 9 described in information security management method the step of.
CN201811590510.3A 2018-12-25 2018-12-25 Information security management method and system Active CN109543390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811590510.3A CN109543390B (en) 2018-12-25 2018-12-25 Information security management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811590510.3A CN109543390B (en) 2018-12-25 2018-12-25 Information security management method and system

Publications (2)

Publication Number Publication Date
CN109543390A true CN109543390A (en) 2019-03-29
CN109543390B CN109543390B (en) 2020-08-14

Family

ID=65858093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811590510.3A Active CN109543390B (en) 2018-12-25 2018-12-25 Information security management method and system

Country Status (1)

Country Link
CN (1) CN109543390B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287677A (en) * 2019-06-28 2019-09-27 Oppo广东移动通信有限公司 Control method, electronic equipment and the readable storage medium storing program for executing of application program
CN110881033A (en) * 2019-11-07 2020-03-13 腾讯科技(深圳)有限公司 Data encryption method, device, equipment and readable storage medium
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN112989292A (en) * 2019-12-17 2021-06-18 中移(成都)信息通信科技有限公司 Interface display method, device and medium
CN113095843A (en) * 2021-05-08 2021-07-09 中国工商银行股份有限公司 User authentication method, user authentication device, user authentication system, and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104966009A (en) * 2015-06-12 2015-10-07 联想(北京)有限公司 Information processing method and electronic equipment
CN105094443A (en) * 2015-08-21 2015-11-25 深圳市汇顶科技股份有限公司 Touch pressure detecting device and method
CN105530356A (en) * 2015-12-21 2016-04-27 珠海格力电器股份有限公司 Mobile communication terminal and data protection method and device thereof
CN105844241A (en) * 2016-03-23 2016-08-10 深圳市金立通信设备有限公司 Method and terminal for detecting touch control pressure
CN108076426A (en) * 2017-12-11 2018-05-25 广东欧珀移动通信有限公司 Terminal tracing method, apparatus, storage medium and terminal device
CN108289141A (en) * 2017-12-27 2018-07-17 努比亚技术有限公司 A kind of the screen locking unlocking method and mobile terminal of mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104966009A (en) * 2015-06-12 2015-10-07 联想(北京)有限公司 Information processing method and electronic equipment
CN105094443A (en) * 2015-08-21 2015-11-25 深圳市汇顶科技股份有限公司 Touch pressure detecting device and method
CN105530356A (en) * 2015-12-21 2016-04-27 珠海格力电器股份有限公司 Mobile communication terminal and data protection method and device thereof
CN105844241A (en) * 2016-03-23 2016-08-10 深圳市金立通信设备有限公司 Method and terminal for detecting touch control pressure
CN108076426A (en) * 2017-12-11 2018-05-25 广东欧珀移动通信有限公司 Terminal tracing method, apparatus, storage medium and terminal device
CN108289141A (en) * 2017-12-27 2018-07-17 努比亚技术有限公司 A kind of the screen locking unlocking method and mobile terminal of mobile terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287677A (en) * 2019-06-28 2019-09-27 Oppo广东移动通信有限公司 Control method, electronic equipment and the readable storage medium storing program for executing of application program
CN110287677B (en) * 2019-06-28 2021-09-24 Oppo广东移动通信有限公司 Control method of application program, electronic device and readable storage medium
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN110881033A (en) * 2019-11-07 2020-03-13 腾讯科技(深圳)有限公司 Data encryption method, device, equipment and readable storage medium
WO2021088571A1 (en) * 2019-11-07 2021-05-14 腾讯科技(深圳)有限公司 Data encryption method and apparatus, and device and readable storage medium
CN112989292A (en) * 2019-12-17 2021-06-18 中移(成都)信息通信科技有限公司 Interface display method, device and medium
CN113095843A (en) * 2021-05-08 2021-07-09 中国工商银行股份有限公司 User authentication method, user authentication device, user authentication system, and storage medium

Also Published As

Publication number Publication date
CN109543390B (en) 2020-08-14

Similar Documents

Publication Publication Date Title
CN109543390A (en) A kind of information security management method and system
JP4177598B2 (en) Face image recording apparatus, information management system, face image recording method, and information management method
EP3806514A1 (en) Screen-analysis based device security
CN105869235B (en) A kind of safety door inhibition method and system
US7734547B2 (en) Display control apparatus, display control method, and storage medium storing display control program
KR20140072858A (en) Method and computer program for providing authentication to control access to a computer system
CN104169933A (en) Method, apparatus, and computer-readable recording medium for authenticating a user
CN105261105A (en) Safety access control method
CN109814964B (en) Interface display method, terminal equipment and computer readable storage medium
JP2006235718A (en) Facial authentication device, its facial authentication method, electronic equipment integrated with the facial authentication device and recording medium with the facial authentication program stored thereon
CN109389028A (en) Face identification method, device, equipment and storage medium based on motion analysis
US9117067B2 (en) Mobile information terminal and gripping-feature learning method
TWI754964B (en) Authentication system, authentication device, authentication method, and program product
Mecke et al. Open sesame! user perception of physical, biometric, and behavioural authentication concepts to open doors
CN109636979A (en) Article access method, locker, backstage face identification system and electronic equipment
CN110163241A (en) Data sample generation method, device, computer equipment and storage medium
CN109543389A (en) A kind of information protecting method and system
Alariki et al. TOUCH GESTURE AUTHENTICATION FRAMEWORK FOR TOUCH SCREEN MOBILE DEVICES.
CN103984415B (en) A kind of information processing method and electronic equipment
CN109684810A (en) A kind of information processing method and system
KR20180093294A (en) Method and Device for Authenticating using Pressure Information
Zolotarev et al. Liveness detection methods implementation to face identification reinforcement in gaming services
EP3270313B1 (en) Optical authorization method for programs and files
KR102443449B1 (en) System for qr code-based security clearance authentication system
US10977357B2 (en) Method of device unlocking and device utilizing the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200714

Address after: Room 1, Unit 13-14, Building 1, Zheshang International, Chagu Avenue, Liuwu New District, Lhasa City, Tibet Autonomous Region, 850000

Applicant after: Jinrun Ark Technology Co.,Ltd.

Address before: 510000 A30 house 68 (1), Nanxiang Road, Whampoa District, Guangzhou, Guangdong.

Applicant before: GUANGZHOU ZHIHONG TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant