WO2017185658A1 - Security protection method and apparatus, mobile terminal, and electronic device - Google Patents

Security protection method and apparatus, mobile terminal, and electronic device Download PDF

Info

Publication number
WO2017185658A1
WO2017185658A1 PCT/CN2016/101857 CN2016101857W WO2017185658A1 WO 2017185658 A1 WO2017185658 A1 WO 2017185658A1 CN 2016101857 W CN2016101857 W CN 2016101857W WO 2017185658 A1 WO2017185658 A1 WO 2017185658A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint information
mobile terminal
information
secure
stored
Prior art date
Application number
PCT/CN2016/101857
Other languages
French (fr)
Chinese (zh)
Inventor
于学伟
Original Assignee
乐视控股(北京)有限公司
乐视移动智能信息技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 乐视控股(北京)有限公司, 乐视移动智能信息技术(北京)有限公司 filed Critical 乐视控股(北京)有限公司
Publication of WO2017185658A1 publication Critical patent/WO2017185658A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a security protection method, device, mobile terminal, and electronic device.
  • the lock screen can prevent most illegal users from using stolen mobile phones, for some illegal users who know more about mobile phone technology, it is possible to start the stolen mobile phone into the flashing mode to clear the original lock screen settings of the mobile phone user to unlock.
  • the phone lock screen function is ineffective.
  • the technical problem to be solved by the embodiments of the present application is to overcome the defects that the illegal user in the prior art can enter the flash mode to clear the original lock screen setting of the mobile terminal, resulting in the same function of the lock screen and the poor security performance of the mobile terminal.
  • the embodiment of the present application provides a security protection method for a mobile terminal, including the following steps: after receiving an instruction to switch to the flash mode, acquiring fingerprint information of a current mobile terminal user; and the fingerprint information and the pre-stored fingerprint The information is matched; if the match is successful, switch to the brush mode.
  • the method of the embodiment of the present application preferably further includes: if the matching is unsuccessful, acquiring current geographic location information of the mobile terminal; and sending the geographical location information to a preset secure mobile phone number and/or a secure email address. in.
  • the method of the embodiment of the present application preferably further includes: acquiring facial image information of the current mobile terminal user if the matching is unsuccessful; transmitting the facial image information to a preset secure mobile phone number and/or security In the mailbox.
  • the embodiment of the present application further provides a security protection device, including: a fingerprint information acquiring unit, configured to acquire fingerprint information of a current mobile terminal user after receiving an instruction to switch to the brush mode; and a matching unit, configured to: The fingerprint information is matched with the pre-stored fingerprint information; the mode switching unit is configured to switch to the brush mode after the matching is successful.
  • a security protection device including: a fingerprint information acquiring unit, configured to acquire fingerprint information of a current mobile terminal user after receiving an instruction to switch to the brush mode; and a matching unit, configured to: The fingerprint information is matched with the pre-stored fingerprint information; the mode switching unit is configured to switch to the brush mode after the matching is successful.
  • the device of the embodiment of the present application further includes: a location information acquiring unit, configured to match If the data is unsuccessful, the current geographic location information of the mobile terminal is obtained, and the sending unit is configured to send the geographical location information to a preset secure mobile phone number and/or a secure email address.
  • the device further comprising: a facial image acquiring unit, configured to acquire facial image information of the current mobile terminal user when the matching is unsuccessful; the sending unit is further configured to send the The facial image information is sent to a pre-set secure mobile phone number and/or secure mailbox.
  • the embodiment of the present application further provides a mobile terminal, including the foregoing security protection device and a fingerprint collection device, where the fingerprint collection device is configured to collect fingerprint information of a current mobile terminal user and send the fingerprint information to the security protection device;
  • the protection device is configured to start the fingerprint collection device to perform fingerprint collection after receiving the instruction to switch into the brush mode, and match the received fingerprint information of the current mobile terminal user with the pre-stored fingerprint information, if the matching is successful , control the mobile terminal to enter the brush mode.
  • the mobile terminal of the embodiment of the present application preferably further includes: a GPS module and a communication module; the security protection device is further configured to start the GPS module to the mobile terminal when the fingerprint information is unsuccessful The current geographic location is located, and the communication module is controlled to send the geographical location information acquired by the GPS module to a preset secure mobile phone number and/or a secure mailbox.
  • the mobile terminal preferably further includes: a photographing device; the security protection device is further configured to start the photographing device to capture facial image information of a current mobile terminal user when the fingerprint information is unsuccessful, And controlling the communication module to send the facial image information acquired from the photographing device to a preset secure mobile phone number and/or a secure mailbox.
  • An embodiment of the present application further provides an electronic device including at least one processor; and a memory communicably coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor The instruction is executed by the at least one processor, so that the at least one processor can obtain the fingerprint information of the current mobile terminal user after receiving the instruction to switch to the flash mode; and the fingerprint information is pre-stored The fingerprint information is matched; if the matching is successful, the mode is switched to the brush mode.
  • the at least one processor is further configured to: obtain the current geographic location information of the mobile terminal if the matching is unsuccessful; and send the geographical location information to a preset Secure mobile number and / or secure mailbox.
  • the at least one processor is further configured to: obtain the facial image information of the current mobile terminal user if the matching is unsuccessful; and send the facial image information to a preset Secure phone number and / or secure mailbox.
  • the embodiment of the present application further provides a non-volatile computer storage medium, characterized in that the storage medium stores the computer executable instructions of the computer executable instructions, when executed by the electronic device, enabling the electronic device to: After receiving the instruction to switch to the brush mode, the fingerprint information of the current mobile terminal user is obtained; the fingerprint information is matched with the pre-stored fingerprint information; if the matching is successful, the mode is switched to the brush mode.
  • the electronic device is further configured to: obtain the current geographic location information of the mobile terminal if the matching is unsuccessful; and send the geographical location information to a preset secure mobile phone. Number and / or secure mailbox.
  • the electronic device is further capable of: If the matching is unsuccessful, the facial image information of the current mobile terminal user is acquired; and the facial image information is sent to a preset secure mobile phone number and/or a secure mailbox.
  • the computer program product of the present application further includes a computer program product stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, wherein when the program instruction When executed by a computer, the computer is caused to perform the method of any of the above.
  • the present application provides a security protection method. After receiving the instruction to switch to the flash mode, the fingerprint information of the current mobile terminal user is obtained, and then the fingerprint information is matched with the pre-stored fingerprint information, and only the matching is successful. Switch to the brush mode. For an illegal user whose connection is unsuccessful, even if it inputs an instruction to switch to the flash mode, the mobile terminal does not switch to the flash mode to clear the lock screen setting for unlocking, thereby fundamentally ensuring the information security of the mobile terminal user and improving The security performance of the mobile terminal.
  • FIG. 1 is a flowchart of a specific example of a security protection method in Embodiment 1 of the present application
  • FIG. 2 is a schematic block diagram of a specific example of a security protection device according to Embodiment 2 of the present application;
  • FIG. 3 is a schematic block diagram of a specific example of a mobile terminal in Embodiment 3 of the present application.
  • FIG. 4 is a schematic structural diagram of hardware of an electronic device according to Embodiment 4 of the present application.
  • 1-fingerprint information acquiring unit 2-matching unit; 3-mode switching unit; 4-position information acquiring unit; 5-sending unit; 6-face image acquiring unit; 11-security protection device; 12-fingerprint collecting device; - GPS module; 14 - communication module; 15 - camera; 800 - memory, 810 - processor, 830 - input device, 840 - output device.
  • installation In the description of the present application, it should be noted that the terms “installation”, “connected”, and “connected” are to be understood broadly, and may be a fixed connection, for example, unless otherwise specifically defined and defined. It can also be a detachable connection, or an integral connection; it can be a mechanical connection or an electrical connection; it can be directly connected, or can be indirectly connected through an intermediate medium, or can be internal communication between two components, and can be a wireless connection. It can also be a wired connection.
  • the specific meanings of the above terms in the present application can be understood in the specific circumstances for those skilled in the art.
  • This embodiment provides a security protection method for a mobile terminal, including but not limited to a smart phone, a pad, a notebook computer, and the like. As shown in FIG. 1, the security protection method in this embodiment includes the following steps:
  • step S11 Determine whether an instruction to switch to the flash mode is received. If yes, go to step S12, if not, repeat step S11.
  • the command to enter the flash mode is generally the button information generated by pressing the power button and the volume up button.
  • the fingerprint collection device on the mobile terminal prompts the user to input the fingerprint information, and sends the collected fingerprint information to the control chip in the mobile terminal to obtain the fingerprint information of the current mobile terminal user.
  • the control chip in the mobile terminal prompts the mobile terminal owner to input fingerprint information, and uses the fingerprint information recorded by the mobile terminal machine as a pre-storage function. Fingerprint information for security check.
  • Mode switching Further includes:
  • step S31 Determine whether the match is successful. If the matching is successful, the process proceeds to step S32, and if the match is not successful, the process proceeds to step S4 and/or S6.
  • the security protection method in this embodiment obtains the fingerprint information of the current mobile terminal user after receiving the instruction to switch to the brush mode, and then matches the fingerprint information with the pre-stored fingerprint information, and only switches successfully. Into the brush mode. For an illegal user whose connection is unsuccessful, even if it inputs an instruction to switch to the flash mode, the mobile terminal does not switch to the flash mode to clear the lock screen setting for unlocking, thereby fundamentally ensuring the information security of the mobile terminal user and improving The security performance of the mobile terminal.
  • the security protection method in this embodiment further includes:
  • S5. Send the geographical location information to a preset secure mobile phone number and/or secure email address. Specifically, after the mobile terminal owner activates the mobile terminal security protection function, the control chip in the mobile terminal prompts the mobile terminal owner to enter the secure mobile phone number and/or the secure mailbox. After receiving the instruction to switch to the brush mode and the fingerprint information is unsuccessful, the mobile terminal owner can obtain the mobile terminal by sending the current geographic location information of the mobile terminal to the preset secure mobile phone number and/or the secure mailbox. The current location information helps the mobile terminal owner to retrieve the mobile terminal in the first time.
  • the security protection method in this embodiment further includes:
  • S6 Acquire facial image information of the current mobile terminal user. Specifically, when the fingerprint information of the current mobile terminal user does not match the pre-stored fingerprint information, the camera (usually a camera) on the mobile terminal is activated to capture the current mobile terminal user, and the current mobile terminal user is captured. The facial image information is transmitted to a control chip in the mobile terminal.
  • the camera usually a camera
  • S7 Send facial image information to a preset secure mobile phone number and/or secure mailbox.
  • the mobile terminal can be made by transmitting the facial image information of the current user of the mobile terminal to a preset secure mobile phone number and/or a secure mailbox.
  • the master obtains the facial image of the illegal user, which helps the mobile terminal owner to retrieve the mobile phone at the first time.
  • This embodiment provides a security protection device, as shown in FIG. 2, including:
  • the fingerprint information acquiring unit 1 is configured to acquire fingerprint information of the current mobile terminal user after receiving the instruction to switch to the flash mode.
  • the matching unit 2 is configured to match the fingerprint information with the pre-stored fingerprint information.
  • the mode switching unit 3 is configured to switch into the brush mode after the matching is successful.
  • the security protection device in this embodiment acquires the fingerprint information of the current mobile terminal user after receiving the instruction to switch to the brush mode, and then matches the fingerprint information with the pre-stored fingerprint information, and only switches successfully. Into the brush mode. For an illegal user whose connection is unsuccessful, even if it inputs an instruction to switch to the flash mode, the mobile terminal does not switch to the flash mode to clear the lock screen setting for unlocking, thereby fundamentally ensuring the information security of the mobile terminal user and improving The security performance of the mobile terminal.
  • the security protection device in this embodiment further includes:
  • the location information obtaining unit 4 is configured to obtain the current geographic location information of the mobile terminal when the matching is unsuccessful.
  • the sending unit 5 is configured to send the geographical location information to a preset secure mobile phone number and/or a secure mailbox.
  • a preset secure mobile phone number and/or a secure mailbox By transmitting the current geographic location information of the mobile terminal to a preset secure mobile phone number and/or a secure mailbox, the mobile terminal owner can obtain the current location information of the mobile terminal, which helps the mobile terminal owner to find the first time. Go back to the mobile terminal.
  • the security protection device in this embodiment further includes:
  • the facial image obtaining unit 6 is configured to acquire facial image information of the current mobile terminal user when the matching is unsuccessful.
  • the sending unit 5 is further configured to send facial image information to a preset secure mobile phone number and/or a secure mailbox.
  • a preset secure mobile phone number and/or a secure mailbox By transmitting the facial image information of the current user of the mobile terminal to a preset In the secure mobile phone number and/or the secure mailbox, the mobile terminal owner can obtain the facial image of the illegal user, which helps the mobile terminal owner to retrieve the mobile terminal at the first time.
  • This embodiment provides a mobile terminal, including but not limited to a smart phone, a pad, a notebook computer, and the like. As shown in FIG. 3, the mobile terminal in this embodiment includes the security protection device 11 and the fingerprint collection device 12 in Embodiment 2.
  • the fingerprint collection device 12 is configured to collect fingerprint information of the current mobile terminal user and send the fingerprint information to the security protection device 11.
  • the security protection device 11 is configured to start the fingerprint collection device 12 to perform fingerprint collection after receiving the instruction to switch to the brush mode, and match the received fingerprint information of the current mobile terminal user with the pre-stored fingerprint information. Control the mobile terminal to enter the brush mode.
  • the mobile terminal in the embodiment After receiving the instruction to switch to the brush mode, the mobile terminal in the embodiment first collects and acquires the fingerprint information of the current mobile terminal user through the fingerprint collection device 12, and then uses the security protection device 11 to store the fingerprint information and the pre-stored fingerprint. The information is matched and only the matching is successful before switching to the brush mode. For an illegal user whose connection is unsuccessful, even if it inputs an instruction to switch to the flash mode, it will not switch to the flash mode to clear the lock screen setting for unlocking, which fundamentally ensures the information security of the mobile terminal user and improves the movement. The security performance of the terminal.
  • the mobile terminal in this embodiment further includes: a GPS module 13 and a communication module 14.
  • the security protection device 11 is further configured to start the GPS module 13 to locate the current geographic location of the mobile terminal when the fingerprint information matching is unsuccessful, and control the communication module 14 to be from the GPS module 13
  • the acquired geographic location information is sent to a pre-set secure mobile number and/or secure email address.
  • the mobile terminal owner can obtain the current location information of the mobile terminal, which helps the mobile terminal owner to find the first time. Go back to the mobile terminal.
  • the mobile terminal in this embodiment further includes: a photographing device 15.
  • the security protection device 11 is further configured to start the photographing device 15 to capture facial image information of the current mobile terminal user when the fingerprint information matching is unsuccessful, and control the communication module 14 to send the facial image information acquired from the photographing device 15 to a preset Secure mobile number and / or secure mailbox.
  • the mobile terminal owner can obtain the facial image of the illegal user, which helps the mobile terminal owner to find the first time. Go back to the mobile terminal.
  • the present application further provides an electronic device including at least one processor 810; and a memory 800 communicably coupled to the at least one processor 810; wherein the memory 800 stores Executing instructions executed by at least one processor 810, the instructions being executed by the at least one processor 810 to enable the at least one processor 810 to receive an instruction to switch to the flash mode and obtain a fingerprint of the current mobile terminal user Information; matching the fingerprint information with the pre-stored fingerprint information; if the matching is successful, switching to the brush mode.
  • the electronic device also includes an input device 830 and an output device 840 that are electrically coupled to the memory 800 and the processor, the electrical connections preferably being connected by a bus.
  • the electronic device preferably enables the at least one processor to Enough: if the matching is unsuccessful, obtain the current geographical location information of the mobile terminal; and send the geographical location information to a preset secure mobile phone number and/or a secure mailbox.
  • the at least one processor is further configured to: obtain the facial image information of the current mobile terminal user if the matching is unsuccessful; and send the facial image information to a preset Secure phone number and / or secure mailbox.
  • the embodiment of the present application further provides a non-volatile computer storage medium, characterized in that the storage medium stores the computer executable instructions of the computer executable instructions, when executed by the electronic device, enabling the electronic device to: After receiving the instruction to switch to the brush mode, the fingerprint information of the current mobile terminal user is obtained; the fingerprint information is matched with the pre-stored fingerprint information; if the matching is successful, the mode is switched to the brush mode.
  • the electronic device is further configured to: obtain the current geographic location information of the mobile terminal if the matching is unsuccessful; and send the geographical location information to a preset secure mobile phone. Number and / or secure mailbox.
  • the electronic device is further configured to: obtain the facial image information of the current mobile terminal user if the matching is unsuccessful; and send the facial image information to a preset security. Mobile number and / or secure mailbox.
  • the embodiment of the present application further provides a computer program product, the computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program package
  • the program instructions are arranged to cause the computer to perform the method described in the above embodiments when the program instructions are executed by a computer.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded into a computer or other programmable data processing device Having a series of operational steps performed on a computer or other programmable device to produce computer-implemented processing such that instructions executed on a computer or other programmable device are provided for implementing one or more processes in a flowchart and/or Or block diagram the steps of a function specified in a box or multiple boxes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The present invention relates to the technical field of communications, and provides a security protection method and apparatus, a mobile terminal, and an electronic device. The security protection method comprises: after receiving an instruction of switching to a root mode (S11), first obtaining fingerprint information of a current user of a mobile terminal (S12), then matching the fingerprint information with pre-stored fingerprint information (S2), and switching to the root mode only when the matching succeeds (S32). However, if the matching fails, even if an illegal user inputs an instruction of switching to a root mode, a mobile terminal does not switch to the root mode to clear screen-lock settings for unlocking, so as to fundamentally ensure information security of a user of the mobile terminal and improve security performance of the mobile terminal.

Description

一种安全保护方法、装置、移动终端及电子设备Security protection method, device, mobile terminal and electronic device
交叉引用cross reference
本申请要求在2016年04月25日提交中国专利局、申请号为201610261344.7、发明名称为“一种安全保护方法、装置及移动终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims priority to Chinese Patent Application No. 201610261344.7, entitled "A Security Protection Method, Apparatus, and Mobile Terminal", filed on April 25, 2016, the entire contents of In this application.
技术领域Technical field
本申请涉及通讯技术领域,具体涉及一种安全保护方法、装置、移动终端及电子设备。The present application relates to the field of communications technologies, and in particular, to a security protection method, device, mobile terminal, and electronic device.
背景技术Background technique
目前针对手机等移动终端的偷盗现象已成为严重的社会问题。手机被盗,不仅造成手机本身的财物损失,而且可能被盗打电话,导致电话费损失;同时因为手机内存储有用户信息,犯罪分子很可能会利用这些信息进行犯罪活动。目前大多采用手机锁屏的方式来防止非法用户使用被盗手机。锁屏后需要通过输入密码或其他用户设置的解锁方式方可进入,所以可以有效保护该***的数据安全。At present, the theft of mobile terminals such as mobile phones has become a serious social problem. Theft of the mobile phone not only causes the loss of the property of the mobile phone itself, but also may result in theft of the phone call, resulting in loss of telephone charges. At the same time, because the user information is stored in the mobile phone, criminals are likely to use this information for criminal activities. At present, most mobile phone lock screens are used to prevent illegal users from using stolen mobile phones. After the screen is locked, you need to enter the password or other user-defined unlocking method to enter, so you can effectively protect the data security of the system.
锁屏虽然可以避免大部分非法用户使用被盗手机,但对于某些对手机技术较为了解的非法用户,完全可以启动被盗手机进入刷机模式来清除手机用户原有的锁屏设置进行解锁,导致手机锁屏功能形同虚设。 Although the lock screen can prevent most illegal users from using stolen mobile phones, for some illegal users who know more about mobile phone technology, it is possible to start the stolen mobile phone into the flashing mode to clear the original lock screen settings of the mobile phone user to unlock. The phone lock screen function is ineffective.
发明内容Summary of the invention
因此,本申请实施例要解决的技术问题在于克服现有技术中的非法用户可以进入刷机模式清除移动终端原有的锁屏设置导致锁屏功能形同虚设,移动终端的安全性能差的缺陷,从而提供一种安全性能高的安全保护方法、装置、移动终端及电子设备。Therefore, the technical problem to be solved by the embodiments of the present application is to overcome the defects that the illegal user in the prior art can enter the flash mode to clear the original lock screen setting of the mobile terminal, resulting in the same function of the lock screen and the poor security performance of the mobile terminal. A security protection method, device, mobile terminal and electronic device with high security performance.
为此,本申请实施例提供了如下技术方案:To this end, the embodiment of the present application provides the following technical solutions:
本申请实施例提供了一种安全保护方法,用于移动终端,包括如下步骤:收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;将所述指纹信息与预先存储的指纹信息进行匹配;若匹配成功,切换入刷机模式。The embodiment of the present application provides a security protection method for a mobile terminal, including the following steps: after receiving an instruction to switch to the flash mode, acquiring fingerprint information of a current mobile terminal user; and the fingerprint information and the pre-stored fingerprint The information is matched; if the match is successful, switch to the brush mode.
本申请实施例所述的方法,优选地,还包括:若匹配不成功,获取所述移动终端当前的地理位置信息;发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。The method of the embodiment of the present application preferably further includes: if the matching is unsuccessful, acquiring current geographic location information of the mobile terminal; and sending the geographical location information to a preset secure mobile phone number and/or a secure email address. in.
本申请实施例所述的方法,优选地,还包括:若匹配不成功,获取所述当前移动终端用户的面部图像信息;发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。The method of the embodiment of the present application preferably further includes: acquiring facial image information of the current mobile terminal user if the matching is unsuccessful; transmitting the facial image information to a preset secure mobile phone number and/or security In the mailbox.
本申请实施例还提供了一种安全保护装置,包括:指纹信息获取单元,用于在收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;匹配单元,用于将所述指纹信息与预先存储的指纹信息进行匹配;模式切换单元,用于在匹配成功后切换入刷机模式。The embodiment of the present application further provides a security protection device, including: a fingerprint information acquiring unit, configured to acquire fingerprint information of a current mobile terminal user after receiving an instruction to switch to the brush mode; and a matching unit, configured to: The fingerprint information is matched with the pre-stored fingerprint information; the mode switching unit is configured to switch to the brush mode after the matching is successful.
本申请实施例所述的装置,还包括:位置信息获取单元,用于在匹配 不成功时,获取所述移动终端当前的地理位置信息;发送单元,用于发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。The device of the embodiment of the present application further includes: a location information acquiring unit, configured to match If the data is unsuccessful, the current geographic location information of the mobile terminal is obtained, and the sending unit is configured to send the geographical location information to a preset secure mobile phone number and/or a secure email address.
本申请实施例所述的装置,优选地,还包括:面部图像获取单元,用于在匹配不成功时获取所述当前移动终端用户的面部图像信息;所述发送单元,还用于发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。The device according to the embodiment of the present application, further comprising: a facial image acquiring unit, configured to acquire facial image information of the current mobile terminal user when the matching is unsuccessful; the sending unit is further configured to send the The facial image information is sent to a pre-set secure mobile phone number and/or secure mailbox.
本申请实施例还提供了一种移动终端,包括上述安全保护装置和指纹采集装置;所述指纹采集装置,用于采集当前移动终端用户的指纹信息并发送至所述安全保护装置;所述安全保护装置,用于在收到切换入刷机模式的指令后启动所述指纹采集装置进行指纹采集,并将接收的所述当前移动终端用户的指纹信息与预先存储的指纹信息进行匹配,若匹配成功,控制移动终端进入刷机模式。The embodiment of the present application further provides a mobile terminal, including the foregoing security protection device and a fingerprint collection device, where the fingerprint collection device is configured to collect fingerprint information of a current mobile terminal user and send the fingerprint information to the security protection device; The protection device is configured to start the fingerprint collection device to perform fingerprint collection after receiving the instruction to switch into the brush mode, and match the received fingerprint information of the current mobile terminal user with the pre-stored fingerprint information, if the matching is successful , control the mobile terminal to enter the brush mode.
本申请实施例所述的移动终端,优选地,还包括:GPS模块和通讯模块;所述安全保护装置,还用于在所述指纹信息匹配不成功时启动所述GPS模块对所述移动终端当前的地理位置进行定位,并控制所述通讯模块将从所述GPS模块获取的地理位置信息发送至预先设定的安全手机号码和/或安全邮箱中。The mobile terminal of the embodiment of the present application preferably further includes: a GPS module and a communication module; the security protection device is further configured to start the GPS module to the mobile terminal when the fingerprint information is unsuccessful The current geographic location is located, and the communication module is controlled to send the geographical location information acquired by the GPS module to a preset secure mobile phone number and/or a secure mailbox.
本申请实施例所述的移动终端,优选地,还包括:拍摄装置;所述安全保护装置,还用于在指纹信息匹配不成功时启动所述拍摄装置拍摄当前移动终端用户的面部图像信息,并控制所述通讯模块将从所述拍摄装置获取的所述面部图像信息发送至预先设定的安全手机号码和/或安全邮箱中。 The mobile terminal according to the embodiment of the present application preferably further includes: a photographing device; the security protection device is further configured to start the photographing device to capture facial image information of a current mobile terminal user when the fingerprint information is unsuccessful, And controlling the communication module to send the facial image information acquired from the photographing device to a preset secure mobile phone number and/or a secure mailbox.
本申请实施例还提供了一种电子设备,包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;将所述指纹信息与预先存储的指纹信息进行匹配;若匹配成功,切换入刷机模式。An embodiment of the present application further provides an electronic device including at least one processor; and a memory communicably coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor The instruction is executed by the at least one processor, so that the at least one processor can obtain the fingerprint information of the current mobile terminal user after receiving the instruction to switch to the flash mode; and the fingerprint information is pre-stored The fingerprint information is matched; if the matching is successful, the mode is switched to the brush mode.
本申请实施例所述的电子设备,优选地,使所述至少一个处理器还能够:若匹配不成功,获取所述移动终端当前的地理位置信息;发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。The electronic device according to the embodiment of the present application, preferably, the at least one processor is further configured to: obtain the current geographic location information of the mobile terminal if the matching is unsuccessful; and send the geographical location information to a preset Secure mobile number and / or secure mailbox.
本申请实施例所述的电子设备,优选地,使所述至少一个处理器还能够:若匹配不成功,获取所述当前移动终端用户的面部图像信息;发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。The electronic device according to the embodiment of the present application, preferably, the at least one processor is further configured to: obtain the facial image information of the current mobile terminal user if the matching is unsuccessful; and send the facial image information to a preset Secure phone number and / or secure mailbox.
本申请实施例还提供了一种非易失性计算机存储介质,其特征在于:所述存储介质存储有计算机可执行指令的所述计算机可执行指令,当由电子设备执行时使得电子设备能够:收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;将所述指纹信息与预先存储的指纹信息进行匹配;若匹配成功,切换入刷机模式。The embodiment of the present application further provides a non-volatile computer storage medium, characterized in that the storage medium stores the computer executable instructions of the computer executable instructions, when executed by the electronic device, enabling the electronic device to: After receiving the instruction to switch to the brush mode, the fingerprint information of the current mobile terminal user is obtained; the fingerprint information is matched with the pre-stored fingerprint information; if the matching is successful, the mode is switched to the brush mode.
本申请实施例所述的存储介质,优选地,使所述电子设备还能够:若匹配不成功,获取所述移动终端当前的地理位置信息;发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。In the storage medium of the embodiment of the present application, the electronic device is further configured to: obtain the current geographic location information of the mobile terminal if the matching is unsuccessful; and send the geographical location information to a preset secure mobile phone. Number and / or secure mailbox.
本申请实施例所述的存储介质,优选地,使所述电子设备还能够:若 匹配不成功,获取所述当前移动终端用户的面部图像信息;发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。The storage medium according to the embodiment of the present application, preferably, the electronic device is further capable of: If the matching is unsuccessful, the facial image information of the current mobile terminal user is acquired; and the facial image information is sent to a preset secure mobile phone number and/or a secure mailbox.
本申请实施例还提出了一种计算机程序产品所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,其特征在于,当所述程序指令被计算机执行时,使所述计算机执行上述任一所述的方法。The computer program product of the present application further includes a computer program product stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, wherein when the program instruction When executed by a computer, the computer is caused to perform the method of any of the above.
本申请的技术方案,具有如下优点:The technical solution of the present application has the following advantages:
本申请提供了一种安全保护方法,在收到切换入刷机模式的指令后,先获取当前移动终端用户的指纹信息,再将该指纹信息与预先存储的指纹信息进行匹配,只有匹配成功才会切换入刷机模式。而对匹配不成功的非法用户,即使其输入了切换入刷机模式的指令,移动终端也不会切换入刷机模式来清除锁屏设置进行解锁,从根本上确保了移动终端用户的信息安全,提升了移动终端的安全性能。The present application provides a security protection method. After receiving the instruction to switch to the flash mode, the fingerprint information of the current mobile terminal user is obtained, and then the fingerprint information is matched with the pre-stored fingerprint information, and only the matching is successful. Switch to the brush mode. For an illegal user whose connection is unsuccessful, even if it inputs an instruction to switch to the flash mode, the mobile terminal does not switch to the flash mode to clear the lock screen setting for unlocking, thereby fundamentally ensuring the information security of the mobile terminal user and improving The security performance of the mobile terminal.
附图说明DRAWINGS
为了更清楚地说明本申请具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the specific embodiments of the present application or the technical solutions in the prior art, the drawings to be used in the specific embodiments or the description of the prior art will be briefly described below, and obviously, the attached in the following description The drawings are some embodiments of the present application, and those skilled in the art can obtain other drawings based on these drawings without any creative work.
图1为本申请实施例1中安全保护方法的一个具体实例的流程图; 1 is a flowchart of a specific example of a security protection method in Embodiment 1 of the present application;
图2为本申请实施例2中安全保护装置的一个具体实例的原理框图;2 is a schematic block diagram of a specific example of a security protection device according to Embodiment 2 of the present application;
图3为本申请实施例3中移动终端的一个具体实例的原理框图;3 is a schematic block diagram of a specific example of a mobile terminal in Embodiment 3 of the present application;
图4为本申请实施例4中电子设备的硬件结构示意图。4 is a schematic structural diagram of hardware of an electronic device according to Embodiment 4 of the present application.
附图标记:Reference mark:
1-指纹信息获取单元;2-匹配单元;3-模式切换单元;4-位置信息获取单元;5-发送单元;6-面部图像获取单元;11-安全保护装置;12-指纹采集装置;13-GPS模块;14-通讯模块;15-拍摄装置;800-存储器,810-处理器,830-输入装置,840-输出装置。1-fingerprint information acquiring unit; 2-matching unit; 3-mode switching unit; 4-position information acquiring unit; 5-sending unit; 6-face image acquiring unit; 11-security protection device; 12-fingerprint collecting device; - GPS module; 14 - communication module; 15 - camera; 800 - memory, 810 - processor, 830 - input device, 840 - output device.
具体实施方式detailed description
下面将结合附图对本申请的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions of the present application are clearly and completely described in the following with reference to the accompanying drawings. It is obvious that the described embodiments are a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope are the scope of the present application.
在本申请的描述中,需要说明的是,术语“中心”、“上”、“下”、“左”、“右”、“竖直”、“水平”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本申请和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本申请的限制。此外,术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性。In the description of the present application, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inside", "outside", etc. The orientation or positional relationship of the indications is based on the orientation or positional relationship shown in the drawings, and is merely for the convenience of the description and the simplified description, and does not indicate or imply that the device or component referred to has a specific orientation, in a specific orientation. Construction and operation are therefore not to be construed as limiting the application. Moreover, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
在本申请的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接, 也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,还可以是两个元件内部的连通,可以是无线连接,也可以是有线连接。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。In the description of the present application, it should be noted that the terms "installation", "connected", and "connected" are to be understood broadly, and may be a fixed connection, for example, unless otherwise specifically defined and defined. It can also be a detachable connection, or an integral connection; it can be a mechanical connection or an electrical connection; it can be directly connected, or can be indirectly connected through an intermediate medium, or can be internal communication between two components, and can be a wireless connection. It can also be a wired connection. The specific meanings of the above terms in the present application can be understood in the specific circumstances for those skilled in the art.
此外,下面所描述的本申请不同实施方式中所涉及的技术特征只要彼此之间未构成冲突就可以相互结合。Further, the technical features involved in the different embodiments of the present application described below may be combined with each other as long as they do not constitute a conflict with each other.
实施例1Example 1
本实施例提供了一种安全保护方法,用于移动终端,移动终端包括但不限定于智能手机、Pad、笔记本电脑等。如图1所示,本实施例中的安全保护方法包括如下步骤:This embodiment provides a security protection method for a mobile terminal, including but not limited to a smart phone, a pad, a notebook computer, and the like. As shown in FIG. 1, the security protection method in this embodiment includes the following steps:
S1.指纹信息采集。进一步包括:S1. Fingerprint information collection. Further includes:
S11.判断是否收到切换入刷机模式的指令。若收到,进入步骤S12,若未收到,重复步骤S11。具体地,进入刷机模式指令一般为按下电源键和音量上键所产生的按键信息。S11. Determine whether an instruction to switch to the flash mode is received. If yes, go to step S12, if not, repeat step S11. Specifically, the command to enter the flash mode is generally the button information generated by pressing the power button and the volume up button.
S12.获取当前移动终端用户的指纹信息。具体地,收到进入刷机模式指令后,移动终端上的指纹采集装置会提示用户输入指纹信息,并将采集到的指纹信息发送至移动终端中的控制芯片以获取当前移动终端用户的指纹信息。S12. Acquire fingerprint information of the current mobile terminal user. Specifically, after receiving the instruction to enter the flash mode, the fingerprint collection device on the mobile terminal prompts the user to input the fingerprint information, and sends the collected fingerprint information to the control chip in the mobile terminal to obtain the fingerprint information of the current mobile terminal user.
S2.将指纹信息与预先存储的指纹信息进行匹配。具体地,移动终端机主启动移动终端安全保护功能后,移动终端中的控制芯片会提示移动终端机主录入指纹信息,并将移动终端机主录入的指纹信息作为预先存储的用 于安全核对的指纹信息。S2. Match the fingerprint information with the pre-stored fingerprint information. Specifically, after the mobile terminal owner activates the mobile terminal security protection function, the control chip in the mobile terminal prompts the mobile terminal owner to input fingerprint information, and uses the fingerprint information recorded by the mobile terminal machine as a pre-storage function. Fingerprint information for security check.
S3.模式切换。进一步包括:S3. Mode switching. Further includes:
S31.判断是否匹配成功。若匹配成功,进入步骤S32,若未匹配成功,进入步骤S4和/或S6。S31. Determine whether the match is successful. If the matching is successful, the process proceeds to step S32, and if the match is not successful, the process proceeds to step S4 and/or S6.
S32.切换入刷机模式。具体地,只有当前移动终端用户的指纹信息与预先存储的指纹信息匹配成功,才能说明当前移动终端用户为合法用户。此时根据收到的切换入刷机模式指令将移动终端切换入刷机模式才是安全的。如果匹配不成功,说明当前移动终端用户为非法用户,即使收到切换入刷机模式的指令,也不会将移动终端切换入刷机模式。S32. Switch to the brush mode. Specifically, only the current mobile terminal user's fingerprint information and the pre-stored fingerprint information are successfully matched, so that the current mobile terminal user is a legitimate user. At this time, it is safe to switch the mobile terminal into the brush mode according to the received switch-in brush mode command. If the match is unsuccessful, the current mobile terminal user is an illegal user. Even if an instruction to switch to the flash mode is received, the mobile terminal will not be switched to the flash mode.
本实施例中的安全保护方法,在收到切换入刷机模式的指令后,先获取当前移动终端用户的指纹信息,再将该指纹信息与预先存储的指纹信息进行匹配,只有匹配成功才会切换入刷机模式。而对匹配不成功的非法用户,即使其输入了切换入刷机模式的指令,移动终端也不会切换入刷机模式来清除锁屏设置进行解锁,从根本上确保了移动终端用户的信息安全,提升了移动终端的安全性能。The security protection method in this embodiment obtains the fingerprint information of the current mobile terminal user after receiving the instruction to switch to the brush mode, and then matches the fingerprint information with the pre-stored fingerprint information, and only switches successfully. Into the brush mode. For an illegal user whose connection is unsuccessful, even if it inputs an instruction to switch to the flash mode, the mobile terminal does not switch to the flash mode to clear the lock screen setting for unlocking, thereby fundamentally ensuring the information security of the mobile terminal user and improving The security performance of the mobile terminal.
优选地,本实施例中的安全保护方法还包括:Preferably, the security protection method in this embodiment further includes:
S4.获取移动终端当前的地理位置信息。具体地,当前移动终端用户的指纹信息与预先存储的指纹信息不匹配时,会启动移动终端上的GPS模块对移动终端当前的位置进行定位,并将移动终端当前的地理位置信息传输至手机中的控制芯片。 S4. Obtain current geographic location information of the mobile terminal. Specifically, when the fingerprint information of the current mobile terminal user does not match the pre-stored fingerprint information, the GPS module on the mobile terminal is activated to locate the current location of the mobile terminal, and the current geographic location information of the mobile terminal is transmitted to the mobile phone. Control chip.
S5.发送地理位置信息至预先设定的安全手机号码和/或安全邮箱中。具体地,移动终端机主启动移动终端安全保护功能后,移动终端中的控制芯片会提示移动终端机主录入安全手机号码和/或安全邮箱。在接收到切换入刷机模式的指令且指纹信息匹配不成功时,通过发送移动终端当前的地理位置信息至预先设定的安全手机号码和/或安全邮箱中,能够使移动终端机主获取移动终端当前的位置信息,有助于移动终端机主在第一时间找回移动终端。S5. Send the geographical location information to a preset secure mobile phone number and/or secure email address. Specifically, after the mobile terminal owner activates the mobile terminal security protection function, the control chip in the mobile terminal prompts the mobile terminal owner to enter the secure mobile phone number and/or the secure mailbox. After receiving the instruction to switch to the brush mode and the fingerprint information is unsuccessful, the mobile terminal owner can obtain the mobile terminal by sending the current geographic location information of the mobile terminal to the preset secure mobile phone number and/or the secure mailbox. The current location information helps the mobile terminal owner to retrieve the mobile terminal in the first time.
优选地,本实施例中的安全保护方法,还包括:Preferably, the security protection method in this embodiment further includes:
S6.获取当前移动终端用户的面部图像信息。具体地,当前移动终端用户的指纹信息与预先存储的指纹信息不匹配时,会启动移动终端上的拍摄装置(一般为摄像头)对当前移动终端用户进行拍摄,并将拍摄到的当前移动终端用户的面部图像信息传输至移动终端中的控制芯片。S6. Acquire facial image information of the current mobile terminal user. Specifically, when the fingerprint information of the current mobile terminal user does not match the pre-stored fingerprint information, the camera (usually a camera) on the mobile terminal is activated to capture the current mobile terminal user, and the current mobile terminal user is captured. The facial image information is transmitted to a control chip in the mobile terminal.
S7.发送面部图像信息至预先设定的安全手机号码和/或安全邮箱中。具体地,在接收到切换入刷机模式的指令且指纹信息匹配不成功时,通过发送移动终端当前用户的面部图像信息至预先设定的安全手机号码和/或安全邮箱中,能够使移动终端机主获取非法用户的面部图像,有助于移动终端机主在第一时间找回手机。S7. Send facial image information to a preset secure mobile phone number and/or secure mailbox. Specifically, when receiving the instruction to switch to the brush mode and the fingerprint information is unsuccessful, the mobile terminal can be made by transmitting the facial image information of the current user of the mobile terminal to a preset secure mobile phone number and/or a secure mailbox. The master obtains the facial image of the illegal user, which helps the mobile terminal owner to retrieve the mobile phone at the first time.
实施例2Example 2
本实施例提供了一种安全保护装置,如图2所示,包括:This embodiment provides a security protection device, as shown in FIG. 2, including:
指纹信息获取单元1,用于在收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息。 The fingerprint information acquiring unit 1 is configured to acquire fingerprint information of the current mobile terminal user after receiving the instruction to switch to the flash mode.
匹配单元2,用于将指纹信息与预先存储的指纹信息进行匹配。The matching unit 2 is configured to match the fingerprint information with the pre-stored fingerprint information.
模式切换单元3,用于在匹配成功后切换入刷机模式。The mode switching unit 3 is configured to switch into the brush mode after the matching is successful.
本实施例中的安全保护装置,在收到切换入刷机模式的指令后,先获取当前移动终端用户的指纹信息,再将该指纹信息与预先存储的指纹信息进行匹配,只有匹配成功才会切换入刷机模式。而对匹配不成功的非法用户,即使其输入了切换入刷机模式的指令,移动终端也不会切换入刷机模式来清除锁屏设置进行解锁,从根本上确保了移动终端用户的信息安全,提升了移动终端的安全性能。The security protection device in this embodiment acquires the fingerprint information of the current mobile terminal user after receiving the instruction to switch to the brush mode, and then matches the fingerprint information with the pre-stored fingerprint information, and only switches successfully. Into the brush mode. For an illegal user whose connection is unsuccessful, even if it inputs an instruction to switch to the flash mode, the mobile terminal does not switch to the flash mode to clear the lock screen setting for unlocking, thereby fundamentally ensuring the information security of the mobile terminal user and improving The security performance of the mobile terminal.
优选地,本实施例中的安全保护装置还包括:Preferably, the security protection device in this embodiment further includes:
位置信息获取单元4,用于在匹配不成功时,获取移动终端当前的地理位置信息。The location information obtaining unit 4 is configured to obtain the current geographic location information of the mobile terminal when the matching is unsuccessful.
发送单元5,用于发送地理位置信息至预先设定的安全手机号码和/或安全邮箱中。通过发送移动终端当前的地理位置信息至预先设定的安全手机号码和/或安全邮箱中,能够使移动终端机主获取移动终端当前的位置信息,有助于移动终端机主在第一时间找回移动终端。The sending unit 5 is configured to send the geographical location information to a preset secure mobile phone number and/or a secure mailbox. By transmitting the current geographic location information of the mobile terminal to a preset secure mobile phone number and/or a secure mailbox, the mobile terminal owner can obtain the current location information of the mobile terminal, which helps the mobile terminal owner to find the first time. Go back to the mobile terminal.
优选地,本实施例中的安全保护装置还包括:Preferably, the security protection device in this embodiment further includes:
面部图像获取单元6,用于在匹配不成功时获取当前移动终端用户的面部图像信息。The facial image obtaining unit 6 is configured to acquire facial image information of the current mobile terminal user when the matching is unsuccessful.
发送单元5,还用于发送面部图像信息至预先设定的安全手机号码和/或安全邮箱中。通过发送移动终端当前用户的面部图像信息至预先设定的 安全手机号码和/或安全邮箱中,能够使移动终端机主获取非法用户的面部图像,有助于移动终端机主在第一时间找回移动终端。The sending unit 5 is further configured to send facial image information to a preset secure mobile phone number and/or a secure mailbox. By transmitting the facial image information of the current user of the mobile terminal to a preset In the secure mobile phone number and/or the secure mailbox, the mobile terminal owner can obtain the facial image of the illegal user, which helps the mobile terminal owner to retrieve the mobile terminal at the first time.
实施例3Example 3
本实施例提供了一种移动终端,包括但不限定于智能手机、Pad、笔记本电脑等。如图3所示,本实施例中的移动终端包括实施例2中的安全保护装置11和指纹采集装置12。This embodiment provides a mobile terminal, including but not limited to a smart phone, a pad, a notebook computer, and the like. As shown in FIG. 3, the mobile terminal in this embodiment includes the security protection device 11 and the fingerprint collection device 12 in Embodiment 2.
指纹采集装置12,用于采集当前移动终端用户的指纹信息并发送至安全保护装置11。The fingerprint collection device 12 is configured to collect fingerprint information of the current mobile terminal user and send the fingerprint information to the security protection device 11.
安全保护装置11,用于在收到切换入刷机模式的指令后启动指纹采集装置12进行指纹采集,并将接收的当前移动终端用户的指纹信息与预先存储的指纹信息进行匹配,若匹配成功,控制移动终端进入刷机模式。The security protection device 11 is configured to start the fingerprint collection device 12 to perform fingerprint collection after receiving the instruction to switch to the brush mode, and match the received fingerprint information of the current mobile terminal user with the pre-stored fingerprint information. Control the mobile terminal to enter the brush mode.
本实施例中的移动终端,在收到切换入刷机模式的指令后,先通过指纹采集装置12采集获取当前移动终端用户的指纹信息,再通过安全保护装置11将该指纹信息与预先存储的指纹信息进行匹配,只有匹配成功才会切换入刷机模式。而对匹配不成功的非法用户,即使其输入了切换入刷机模式的指令,也不会切换入刷机模式来清除锁屏设置进行解锁,从根本上确保了移动终端用户的信息安全,提升了移动终端的安全性能。After receiving the instruction to switch to the brush mode, the mobile terminal in the embodiment first collects and acquires the fingerprint information of the current mobile terminal user through the fingerprint collection device 12, and then uses the security protection device 11 to store the fingerprint information and the pre-stored fingerprint. The information is matched and only the matching is successful before switching to the brush mode. For an illegal user whose connection is unsuccessful, even if it inputs an instruction to switch to the flash mode, it will not switch to the flash mode to clear the lock screen setting for unlocking, which fundamentally ensures the information security of the mobile terminal user and improves the movement. The security performance of the terminal.
优选地,本实施例中的移动终端还包括:GPS模块13和通讯模块14。Preferably, the mobile terminal in this embodiment further includes: a GPS module 13 and a communication module 14.
安全保护装置11,还用于在指纹信息匹配不成功时启动GPS模块13对移动终端当前的地理位置进行定位,并控制通讯模块14将从GPS模块13 获取的地理位置信息发送至预先设定的安全手机号码和/或安全邮箱中。通过发送移动终端当前的地理位置信息至预先设定的安全手机号码和/或安全邮箱中,能够使移动终端机主获取移动终端当前的位置信息,有助于移动终端机主在第一时间找回移动终端。The security protection device 11 is further configured to start the GPS module 13 to locate the current geographic location of the mobile terminal when the fingerprint information matching is unsuccessful, and control the communication module 14 to be from the GPS module 13 The acquired geographic location information is sent to a pre-set secure mobile number and/or secure email address. By transmitting the current geographic location information of the mobile terminal to a preset secure mobile phone number and/or a secure mailbox, the mobile terminal owner can obtain the current location information of the mobile terminal, which helps the mobile terminal owner to find the first time. Go back to the mobile terminal.
优选地,本实施例中的移动终端还包括:拍摄装置15。Preferably, the mobile terminal in this embodiment further includes: a photographing device 15.
安全保护装置11,还用于在指纹信息匹配不成功时启动拍摄装置15拍摄当前移动终端用户的面部图像信息,并控制通讯模块14将从拍摄装置15获取的面部图像信息发送至预先设定的安全手机号码和/或安全邮箱中。通过发送移动终端当前用户的面部图像信息至预先设定的安全手机号码和/或安全邮箱中,能够使移动终端机主获取非法用户的面部图像,有助于移动终端机主在第一时间找回移动终端。The security protection device 11 is further configured to start the photographing device 15 to capture facial image information of the current mobile terminal user when the fingerprint information matching is unsuccessful, and control the communication module 14 to send the facial image information acquired from the photographing device 15 to a preset Secure mobile number and / or secure mailbox. By transmitting the facial image information of the current user of the mobile terminal to a preset secure mobile phone number and/or a secure mailbox, the mobile terminal owner can obtain the facial image of the illegal user, which helps the mobile terminal owner to find the first time. Go back to the mobile terminal.
实施例4Example 4
如图4所示,本申请还提供了一种电子设备,包括至少一个处理器810;以及,与所述至少一个处理器810通信连接的存储器800;其中,所述存储器800存储有可被所述至少一个处理器810执行的指令,所述指令被所述至少一个处理器810执行,以使所述至少一个处理器810能够收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;将所述指纹信息与预先存储的指纹信息进行匹配;若匹配成功,切换入刷机模式。所述电子设备还包括与所述存储器800和所述处理器电连接的输入装置830和输出装置840,所述电连接优选为通过总线连接。As shown in FIG. 4, the present application further provides an electronic device including at least one processor 810; and a memory 800 communicably coupled to the at least one processor 810; wherein the memory 800 stores Executing instructions executed by at least one processor 810, the instructions being executed by the at least one processor 810 to enable the at least one processor 810 to receive an instruction to switch to the flash mode and obtain a fingerprint of the current mobile terminal user Information; matching the fingerprint information with the pre-stored fingerprint information; if the matching is successful, switching to the brush mode. The electronic device also includes an input device 830 and an output device 840 that are electrically coupled to the memory 800 and the processor, the electrical connections preferably being connected by a bus.
本申请实施例所述的电子设备,优选地,使所述至少一个处理器还能 够:若匹配不成功,获取所述移动终端当前的地理位置信息;发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。The electronic device according to the embodiment of the present application preferably enables the at least one processor to Enough: if the matching is unsuccessful, obtain the current geographical location information of the mobile terminal; and send the geographical location information to a preset secure mobile phone number and/or a secure mailbox.
本申请实施例所述的电子设备,优选地,使所述至少一个处理器还能够:若匹配不成功,获取所述当前移动终端用户的面部图像信息;发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。The electronic device according to the embodiment of the present application, preferably, the at least one processor is further configured to: obtain the facial image information of the current mobile terminal user if the matching is unsuccessful; and send the facial image information to a preset Secure phone number and / or secure mailbox.
实施例5Example 5
本申请实施例还提供了一种非易失性计算机存储介质,其特征在于:所述存储介质存储有计算机可执行指令的所述计算机可执行指令,当由电子设备执行时使得电子设备能够:收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;将所述指纹信息与预先存储的指纹信息进行匹配;若匹配成功,切换入刷机模式。The embodiment of the present application further provides a non-volatile computer storage medium, characterized in that the storage medium stores the computer executable instructions of the computer executable instructions, when executed by the electronic device, enabling the electronic device to: After receiving the instruction to switch to the brush mode, the fingerprint information of the current mobile terminal user is obtained; the fingerprint information is matched with the pre-stored fingerprint information; if the matching is successful, the mode is switched to the brush mode.
本申请实施例所述的存储介质,优选地,使所述电子设备还能够:若匹配不成功,获取所述移动终端当前的地理位置信息;发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。In the storage medium of the embodiment of the present application, the electronic device is further configured to: obtain the current geographic location information of the mobile terminal if the matching is unsuccessful; and send the geographical location information to a preset secure mobile phone. Number and / or secure mailbox.
本申请实施例所述的存储介质,优选地,使所述电子设备还能够:若匹配不成功,获取所述当前移动终端用户的面部图像信息;发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。In the storage medium of the embodiment of the present application, the electronic device is further configured to: obtain the facial image information of the current mobile terminal user if the matching is unsuccessful; and send the facial image information to a preset security. Mobile number and / or secure mailbox.
实施例6Example 6
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包 括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述实施例所述的方法。The embodiment of the present application further provides a computer program product, the computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program package The program instructions are arranged to cause the computer to perform the method described in the above embodiments when the program instructions are executed by a computer.
本领域内的技术人员应明白,本申请的实施例可提供为方法、***、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present application can be provided as a method, system, or computer program product. Thus, the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware. Moreover, the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
本申请是参照根据本申请实施例的方法、设备(***)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the present application. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备 上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded into a computer or other programmable data processing device Having a series of operational steps performed on a computer or other programmable device to produce computer-implemented processing such that instructions executed on a computer or other programmable device are provided for implementing one or more processes in a flowchart and/or Or block diagram the steps of a function specified in a box or multiple boxes.
显然,上述实施例仅仅是为清楚地说明所作的举例,而并非对实施方式的限定。对于所属领域的普通技术人员来说,在上述说明的基础上还可以做出其它不同形式的变化或变动。这里无需也无法对所有的实施方式予以穷举。而由此所引伸出的显而易见的变化或变动仍处于本申请创造的保护范围之中。 It is apparent that the above-described embodiments are merely illustrative of the examples, and are not intended to limit the embodiments. Other variations or modifications of the various forms may be made by those skilled in the art in light of the above description. There is no need and no way to exhaust all of the implementations. Obvious changes or variations resulting therefrom are still within the scope of protection created by this application.

Claims (16)

  1. 一种安全保护方法,用于移动终端,其特征在于,包括如下步骤:A security protection method for a mobile terminal, comprising the steps of:
    收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;After receiving the instruction to switch to the flash mode, acquiring the fingerprint information of the current mobile terminal user;
    将所述指纹信息与预先存储的指纹信息进行匹配;Matching the fingerprint information with pre-stored fingerprint information;
    若所述指纹信息与预先存储的指纹信息匹配成功,切换入刷机模式。If the fingerprint information is successfully matched with the pre-stored fingerprint information, the mode is switched to the brush mode.
  2. 根据权利要求1所述的方法,其特征在于,还包括:The method of claim 1 further comprising:
    若所述指纹信息与预先存储的指纹信息匹配不成功,获取所述移动终端当前的地理位置信息;If the fingerprint information is not successfully matched with the pre-stored fingerprint information, obtain the current geographic location information of the mobile terminal;
    发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。Send the geographic location information to a pre-set secure mobile number and/or secure email address.
  3. 根据权利要求2所述的方法,其特征在于,还包括:The method of claim 2, further comprising:
    若所述指纹信息与预先存储的指纹信息匹配不成功,获取所述当前移动终端用户的面部图像信息;If the fingerprint information is not successfully matched with the pre-stored fingerprint information, acquiring facial image information of the current mobile terminal user;
    发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。Sending the facial image information to a preset secure mobile phone number and/or secure mailbox.
  4. 一种安全保护装置,其特征在于,包括:A safety protection device, comprising:
    指纹信息获取单元(1),用于在收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;The fingerprint information acquiring unit (1) is configured to acquire fingerprint information of the current mobile terminal user after receiving the instruction to switch to the brush mode;
    匹配单元(2),用于将所述指纹信息与预先存储的指纹信息进行匹配;a matching unit (2), configured to match the fingerprint information with pre-stored fingerprint information;
    模式切换单元(3),用于在所述指纹信息与预先存储的指纹信息匹配成功后切换入刷机模式。 The mode switching unit (3) is configured to switch to the brush mode after the fingerprint information is successfully matched with the pre-stored fingerprint information.
  5. 根据权利要求4所述的装置,其特征在于,还包括:The device according to claim 4, further comprising:
    位置信息获取单元(4),用于在所述指纹信息与预先存储的指纹信息匹配不成功时,获取所述移动终端当前的地理位置信息;a location information obtaining unit (4), configured to acquire current geographic location information of the mobile terminal when the fingerprint information and the pre-stored fingerprint information are unsuccessful;
    发送单元(5),用于发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。The sending unit (5) is configured to send the geographical location information to a preset secure mobile phone number and/or a secure mailbox.
  6. 根据权利要求5所述的装置,其特征在于,还包括:The device according to claim 5, further comprising:
    面部图像获取单元(6),用于在所述指纹信息与预先存储的指纹信息匹配不成功时获取所述当前移动终端用户的面部图像信息;a facial image obtaining unit (6), configured to acquire facial image information of the current mobile terminal user when the matching of the fingerprint information and the pre-stored fingerprint information is unsuccessful;
    所述发送单元(5),还用于发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。The sending unit (5) is further configured to send the facial image information to a preset secure mobile phone number and/or a secure mailbox.
  7. 一种移动终端,其特征在于,包括权利要求4-6任一项所述的安全保护装置(11)和指纹采集装置(12);A mobile terminal, comprising the security protection device (11) and the fingerprint collection device (12) according to any one of claims 4-6;
    所述指纹采集装置(12),用于采集当前移动终端用户的指纹信息并发送至所述安全保护装置(11);The fingerprint collection device (12) is configured to collect fingerprint information of a current mobile terminal user and send the fingerprint information to the security protection device (11);
    所述安全保护装置(11),用于在收到切换入刷机模式的指令后启动所述指纹采集装置(12)进行指纹采集,并将接收的所述当前移动终端用户的指纹信息与预先存储的指纹信息进行匹配,若所述指纹信息与预先存储的指纹信息匹配成功,控制移动终端进入刷机模式。The security protection device (11) is configured to start the fingerprint collection device (12) to perform fingerprint collection after receiving an instruction to switch into the brush mode, and store the received fingerprint information of the current mobile terminal user and pre-stored The fingerprint information is matched. If the fingerprint information matches the pre-stored fingerprint information, the mobile terminal is controlled to enter the flash mode.
  8. 根据权利要求7所述的移动终端,其特征在于,还包括:GPS模块(13)和通讯模块(14); The mobile terminal according to claim 7, further comprising: a GPS module (13) and a communication module (14);
    所述安全保护装置(11),还用于在所述指纹信息匹配不成功时启动所述GPS模块(13)对所述移动终端当前的地理位置进行定位,并控制所述通讯模块(14)将从所述GPS模块(13)获取的地理位置信息发送至预先设定的安全手机号码和/或安全邮箱中。The security protection device (11) is further configured to start the GPS module (13) to locate a current geographic location of the mobile terminal when the fingerprint information is unsuccessful, and control the communication module (14) The geographic location information obtained from the GPS module (13) is sent to a pre-set secure mobile number and/or secure mailbox.
  9. 根据权利要求8所述的移动终端,其特征在于,还包括:拍摄装置(15);The mobile terminal according to claim 8, further comprising: a photographing device (15);
    所述安全保护装置(11),还用于在指纹信息匹配不成功时启动所述拍摄装置(15)拍摄当前移动终端用户的面部图像信息,并控制所述通讯模块(14)将从所述拍摄装置(15)获取的所述面部图像信息发送至预先设定的安全手机号码和/或安全邮箱中。The security protection device (11) is further configured to start the photographing device (15) to capture facial image information of a current mobile terminal user when the fingerprint information matching is unsuccessful, and control the communication module (14) to be The facial image information acquired by the photographing device (15) is transmitted to a preset secure mobile phone number and/or a secure mailbox.
  10. 一种电子设备,其特征在于包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions Executed by the at least one processor to enable the at least one processor to
    收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;After receiving the instruction to switch to the flash mode, acquiring the fingerprint information of the current mobile terminal user;
    将所述指纹信息与预先存储的指纹信息进行匹配;Matching the fingerprint information with pre-stored fingerprint information;
    若所述指纹信息与预先存储的指纹信息匹配成功,切换入刷机模式。If the fingerprint information is successfully matched with the pre-stored fingerprint information, the mode is switched to the brush mode.
  11. 根据权利要求10所述的电子设备,其特征在于,使所述至少一个处理器还能够:The electronic device of claim 10, wherein the at least one processor is further capable of:
    若所述指纹信息与预先存储的指纹信息匹配不成功,获取所述移动终 端当前的地理位置信息;If the fingerprint information is not successfully matched with the pre-stored fingerprint information, obtaining the mobile terminal Current geographic location information;
    发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。Send the geographic location information to a pre-set secure mobile number and/or secure email address.
  12. 根据权利要求11所述的电子设备,其特征在于,使所述至少一个处理器还能够:The electronic device of claim 11, wherein the at least one processor is further capable of:
    若所述指纹信息与预先存储的指纹信息匹配不成功,获取所述当前移动终端用户的面部图像信息;If the fingerprint information is not successfully matched with the pre-stored fingerprint information, acquiring facial image information of the current mobile terminal user;
    发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。Sending the facial image information to a preset secure mobile phone number and/or secure mailbox.
  13. 一种非易失性计算机存储介质,其特征在于:所述存储介质存储有计算机可执行指令的所述计算机可执行指令,当由电子设备执行时使得电子设备能够:A non-volatile computer storage medium characterized by: said storage medium storing said computer executable instructions of computer executable instructions, when executed by an electronic device, enabling the electronic device to:
    收到切换入刷机模式的指令后,获取当前移动终端用户的指纹信息;After receiving the instruction to switch to the flash mode, acquiring the fingerprint information of the current mobile terminal user;
    将所述指纹信息与预先存储的指纹信息进行匹配;Matching the fingerprint information with pre-stored fingerprint information;
    若所述指纹信息与预先存储的指纹信息匹配成功,切换入刷机模式。If the fingerprint information is successfully matched with the pre-stored fingerprint information, the mode is switched to the brush mode.
  14. 根据权利要求13所述的存储介质,其特征在于,使所述电子设备还能够:The storage medium of claim 13 wherein said electronic device is further capable of:
    若所述指纹信息与预先存储的指纹信息匹配不成功,获取所述移动终端当前的地理位置信息;If the fingerprint information is not successfully matched with the pre-stored fingerprint information, obtain the current geographic location information of the mobile terminal;
    发送所述地理位置信息至预先设定的安全手机号码和/或安全邮箱中。Send the geographic location information to a pre-set secure mobile number and/or secure email address.
  15. 根据权利要求14所述的存储介质,其特征在于,使所述电子设备 还能够:A storage medium according to claim 14, wherein said electronic device is Also able to:
    若所述指纹信息与预先存储的指纹信息匹配不成功,获取所述当前移动终端用户的面部图像信息;If the fingerprint information is not successfully matched with the pre-stored fingerprint information, acquiring facial image information of the current mobile terminal user;
    发送所述面部图像信息至预先设定的安全手机号码和/或安全邮箱中。Sending the facial image information to a preset secure mobile phone number and/or secure mailbox.
  16. 一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,其特征在于,当所述程序指令被计算机执行时,使所述计算机执行上述任一权利要求所述的方法。 A computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, wherein when the program instructions are executed by a computer, The computer performs the method of any of the preceding claims.
PCT/CN2016/101857 2016-04-25 2016-10-12 Security protection method and apparatus, mobile terminal, and electronic device WO2017185658A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610261344.7 2016-04-25
CN201610261344.7A CN105975825A (en) 2016-04-25 2016-04-25 Safety protection method and device, and mobile terminal

Publications (1)

Publication Number Publication Date
WO2017185658A1 true WO2017185658A1 (en) 2017-11-02

Family

ID=56993226

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/101857 WO2017185658A1 (en) 2016-04-25 2016-10-12 Security protection method and apparatus, mobile terminal, and electronic device

Country Status (2)

Country Link
CN (1) CN105975825A (en)
WO (1) WO2017185658A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110853199A (en) * 2019-12-09 2020-02-28 深圳市亚略特生物识别科技有限公司 Intelligent lock based on biological identification

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975825A (en) * 2016-04-25 2016-09-28 乐视控股(北京)有限公司 Safety protection method and device, and mobile terminal
CN106886701B (en) * 2017-02-27 2019-05-17 维沃移动通信有限公司 A kind of processing method of finger print information, server and mobile terminal
CN107358108A (en) * 2017-07-06 2017-11-17 北京小米移动软件有限公司 software control method, device and mobile terminal
CN109819090A (en) * 2018-10-15 2019-05-28 珠海格力电器股份有限公司 The method and mobile phone of mobile phone are used based on fingerprint recognition limitation unknown subscriber

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577733A (en) * 2013-09-02 2014-02-12 小米科技有限责任公司 Safety protection method and device for terminal equipment and terminal equipment
CN104216742A (en) * 2014-08-25 2014-12-17 小米科技有限责任公司 Upgrade control method and device based on password
US20150310259A1 (en) * 2011-07-12 2015-10-29 Microsoft Technology Licensing, Llc Using facial data for device authentication or subject identification
CN105095717A (en) * 2015-07-23 2015-11-25 小米科技有限责任公司 Processing method and processing device of exception event, and electronic equipment
CN105224847A (en) * 2015-09-23 2016-01-06 广东小天才科技有限公司 A kind of method of intelligent watch safe early warning and device
CN105468953A (en) * 2015-12-01 2016-04-06 上海斐讯数据通信技术有限公司 Android system electronic terminal and ROOT permission acquisition method and system for same
CN105893811A (en) * 2015-12-31 2016-08-24 乐视移动智能信息技术(北京)有限公司 Method and device for verifying reset of electronic equipment
CN105978899A (en) * 2016-06-27 2016-09-28 成都轻车快马网络科技有限公司 SIM card binding method for preventing malicious mobile phone flash
CN105975825A (en) * 2016-04-25 2016-09-28 乐视控股(北京)有限公司 Safety protection method and device, and mobile terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150310259A1 (en) * 2011-07-12 2015-10-29 Microsoft Technology Licensing, Llc Using facial data for device authentication or subject identification
CN103577733A (en) * 2013-09-02 2014-02-12 小米科技有限责任公司 Safety protection method and device for terminal equipment and terminal equipment
CN104216742A (en) * 2014-08-25 2014-12-17 小米科技有限责任公司 Upgrade control method and device based on password
CN105095717A (en) * 2015-07-23 2015-11-25 小米科技有限责任公司 Processing method and processing device of exception event, and electronic equipment
CN105224847A (en) * 2015-09-23 2016-01-06 广东小天才科技有限公司 A kind of method of intelligent watch safe early warning and device
CN105468953A (en) * 2015-12-01 2016-04-06 上海斐讯数据通信技术有限公司 Android system electronic terminal and ROOT permission acquisition method and system for same
CN105893811A (en) * 2015-12-31 2016-08-24 乐视移动智能信息技术(北京)有限公司 Method and device for verifying reset of electronic equipment
CN105975825A (en) * 2016-04-25 2016-09-28 乐视控股(北京)有限公司 Safety protection method and device, and mobile terminal
CN105978899A (en) * 2016-06-27 2016-09-28 成都轻车快马网络科技有限公司 SIM card binding method for preventing malicious mobile phone flash

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110853199A (en) * 2019-12-09 2020-02-28 深圳市亚略特生物识别科技有限公司 Intelligent lock based on biological identification

Also Published As

Publication number Publication date
CN105975825A (en) 2016-09-28

Similar Documents

Publication Publication Date Title
WO2017185658A1 (en) Security protection method and apparatus, mobile terminal, and electronic device
CN106302762B (en) Smart machine binding method and device
JP4471898B2 (en) Portable information terminal device
WO2017166775A1 (en) Method of ensuring security, device and smart terminal
JP5893169B2 (en) Anti-theft protection method and device for mobile phone
US10515203B2 (en) Method and system for improving security of a mobile terminal
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
WO2015085871A1 (en) Mobile terminal antitheft method and client
CN104780279A (en) Mobile phone and method used for supporting stolen tracking and locating
WO2015149235A1 (en) Privacy protection method and terminal device
WO2012109840A1 (en) Method and device for implementing guard against theft for mobile termianal by face recognition
US10282532B2 (en) Secure storage of fingerprint related elements
US9918223B2 (en) Fingerprint based communication terminal and method, server and method thereof
CN103167149A (en) System and method of safety of mobile phone based on face recognition
US20150143538A1 (en) Portable Eye-Controlled Device, Verification Device and Method, Computer Readable Recording Medium and Computer Program Product
CN104639533A (en) Safety control method and device based on terminal
CN105611036A (en) Method, system and terminal for unlocking verification
CN107480998B (en) Information processing method and related product
US9774720B2 (en) Authentication method and authentication device for communication apparatus and communication apparatus
CN105306691A (en) Personal information protection method and terminal
CN108664216A (en) Date storage method and device
CN105744520B (en) Method, device and system for issuing and verifying application service
WO2018098686A1 (en) Safety verification method and device, terminal apparatus, and server
CN105787400A (en) Safety protection method and system based on mobile terminal
CN108009450A (en) The method, apparatus and terminal of terminal anti-theft

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16900166

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16900166

Country of ref document: EP

Kind code of ref document: A1