CN101035335A - Mobile phone privacy protection method - Google Patents
Mobile phone privacy protection method Download PDFInfo
- Publication number
- CN101035335A CN101035335A CNA2007100638614A CN200710063861A CN101035335A CN 101035335 A CN101035335 A CN 101035335A CN A2007100638614 A CNA2007100638614 A CN A2007100638614A CN 200710063861 A CN200710063861 A CN 200710063861A CN 101035335 A CN101035335 A CN 101035335A
- Authority
- CN
- China
- Prior art keywords
- information
- mobile phone
- finger print
- print information
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The present invention relates to a method of private and secret information protection on the mobile telephone. It includes: 11) checking consumer's fingerprint information; 12) checking if the information judging the given fingerprint are authorized; If it come into existence, then going to step 13); If it does not , then the telephone comes into private and private protection state; 13) unlock the private and secret protection state. The fingerprint information can be saved as following steps: 21) The telephone turns into fingerprint record state according to consumer operation; 22) Receiving a fingerprint from the fingerprint scanning entrance; 23)The fingerprint information is saved into the fingerprint data base. Compared with present available technology, the invention has provided the physiology characteristics distinguishing the human body. It has realized that private and secret information protecting in the mobile telephone.
Description
Technical field
The present invention relates to mobile phone technique, especially relate to a kind of mobile phone privacy protection method.
Background technology
Mobile phone has become everybody indispensability, and the communication tool of carrying.Compare with other communication tools, the mobile phone most important character is the privacy that possesses height, and each mobile phone has all been stored a large amount of personal informations of machine master, and the machine master often has secret requirement for these personal informations.
At the requirement of above-mentioned requirements privacy protection, prior art provides multiple privacy protection mode.At present, main private information guard method has following several.
1, cell phone password+PIN code protection.This guard method belongs to basic and the most general mobile phone privacy protection scheme at present, and common way is: after utilizing special cell phone password (generally being the 4-6 bit digital) limiting telephone to start shooting repertoire; And the PIN code protection password that to be SIM card carry being specifically designed to the start checking and using.The characteristics of this mode are for realizing privacy protection, to have limited all functions of mobile phone; In case secret protection function is removed, the used function of this mobile phone can be used.Because generally, mobile phone always is in releasing to secret normal operating condition, and this guard method is after removing confidential state, concrete user that can not limiting handset.In addition, this method can not prevent that other people from usurping the situation of starting shooting and using behind the password.Therefore, the effect of this time slot scrambling is limited.
2, " user name+password " account being set in certain menu protects.This scheme adopts on " e-commerce " serial mobile phone of Hi-Tech Wealth at present: specific practice is: the user can be provided with a plurality of " user name+password " number of the account, for each number of the account, a plurality of special contact persons can be set, and privacy kind information that will be relevant with special contact person (for example: the information/mail of telephone number, message registration, transmitting-receiving etc.) be stored in special " VIP " menu.The user needs input " user name+password " accounts information earlier when entering " VIP " menu, if checking passes through, then can enter this menu and see the relevant special associated person information of account correspondence.Though this method can obtain than the better privacy protection effect of first method, increased the complexity that the user remembers burden and use; And after the user enters certain VIP number of the account,, the possibility of divulging a secret is arranged still if in time do not withdraw from.Equally, this kind time slot scrambling can not prevent to obtain security information after other people stealing passwords.
3, hide privacy kind information and protect, utilize " input particular code or execution specific operation " to show the privacy kind info menu.This secret mode is present best privacy protection method; the privacy functions mobile phone of up-to-date appearance generally all adopts this scheme on the market at present; the mode of " user name+password " protection is similar; but being to be specifically designed to the menu of the privacy kind information of preserving (needing the user to preestablish), main advantage can accomplish " stealth " processing: before promptly " import particular code or carry out specific operation "; the user can't see this menu; have only " input particular code or execution specific operation " afterwards; this menu just can " show shape "; such design can make non-mobile phone machine main root originally can't discover the existence of private information, makes protection more thorough.But this protected mode depends on the grasp to password equally, for the user who obtains password, no matter its true identity how, can obtain private information.
In a word, the common issue with that the method for above-mentioned mobile phone privacy protection exists is that these methods all are by the private information in the cryptoguard mobile phone, if password leakage, then private information wherein also can be on the hazard.
Summary of the invention
At above-mentioned defective, the technical problem that the present invention solves is that a kind of mobile phone privacy protection method is provided, and this method can make mobile phone privacy information and information owner identity be closely connected, and guarantees that the information owner could obtain this information.
The guard method of a kind of mobile phone privacy information provided by the invention comprises:
11) detection user's finger print information;
12) judge whether described finger print information is the finger print information with release authority that prestores; If then enter step 13); If not, then make mobile phone be in the privacy protection state;
13) the privacy protection state of relevant information in this mobile phone of release.
Preferably, described information right people's finger print information is pre-stored in the mobile phone as follows:
21), enter fingerprint typing state according to user's operational order;
22) receive the fingerprint input from the finger scan inlet;
23) deposit the finger print information that is obtained in fingerprint database.
Preferably, described step 22) and step 23) between also comprise:
31) the temporary step 22) finger print information that is received;
32) receive the fingerprint input once more;
33) fingerprint and the step 31 that will newly receive) temporary finger print information comparison when both are consistent, then enters step 23); When if both are inconsistent.Then return step 22).
Preferably, the described finger print information that prestores comprises a plurality of finger print informations, described step 21) and step 22) between comprise:
41) receive the fingerprint title that the user selects or imports;
Described step 23) in, when depositing described finger print information in described fingerprint database, corresponding to step 41) the fingerprint title that receives, store this finger print information.
Preferably, in described a plurality of finger print informations, comprising main finger print information, this main finger print information has the release authority higher than other finger print information.
Preferably, store the hide information clauses and subclauses in the described mobile phone, in the described step 12), judge simultaneously whether the finger print information that the user imports is main finger print information, if, when then release information right people has the right the privacy protection state of information in the step 13), comprise the stealthy state of the described hide information clauses and subclauses of release, described hide information is shown; If not, the privacy protection state of the non-hide information clauses and subclauses of a release in the step 13) then, described hide information clauses and subclauses do not show.
Preferably, described hide information by main finger print information release privacy protection state after, receive the user the stealthy attribute of the mobile telephone data entries of already present mobile telephone data entries or new input set; After certain bar information setting is the success of stealthy attribute, then withdraw from when this hide information entry attributes is set behind the residing released state this data entries stealth as the user.
Preferably, described hide information by main finger print information release privacy protection state after, receive the user the stealthy attribute of the mobile telephone data entries of already present mobile telephone data entries or new input set; After certain bar information setting is the success of stealthy attribute, then withdraw from when this hide information entry attributes is set behind the residing released state as the user, if the hidden function of mobile phone starts, then this data entries stealth; If the hidden function of mobile phone does not start, then this data entries is not stealthy.
Preferably, point out the user to import finger print information before the described step 11).
Preferably, described prompting user imports finger print information, is to operate according to the user at mobile phone, enters after certain mode of operation relevant with mobile telephone data entries.
Preferably, the described mode of operation relevant with mobile telephone data entries comprises modes of operation such as entering telephone directory, message registration, note record, multimedia message record.
Preferably, described prompting user imports finger print information, is to be in the screen protection state when mobile phone, according to user's operation, when needing to remove the screen protection state; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is to remove the screen protection state, and shows the information of missed call, people of unread information.
Preferably, described prompting user imports finger print information, is after mobile phone is received incoming call; At this moment, mobile phone does not show caller ID; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is to show caller ID, perhaps, when this caller ID is the contact number that exists in the cell-phone telephone book, shows this associated person information.
Preferably, described prompting user imports finger print information, is after mobile phone is received incoming call, at this moment handset displays caller ID or the contact person relevant with caller ID; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is that incoming call is connected; Making mobile phone be in the privacy protection state in the described step 12), is to make mobile phone can't answer this incoming call, and continues prompting input finger print information.
Preferably, described prompting user imports finger print information, is behind user's Outgoing Call; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is that phone is broadcasted; Making mobile phone be in the privacy protection state in the described step 12), is to make mobile phone can't transfer to this phone, and continues prompting input finger print information.
Preferably, described prompting user imports finger print information, is when the user selects the USB flash disk function; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is that USB flash disk is opened; Making mobile phone be in the privacy protection state in the described step 12), is to make USB flash disk keep closed condition, and continues prompting input finger print information.
Preferably, at first need to set accordingly, so that start this privacy protection scheme.
The embodiment of the invention compared with prior art provides the significant physiological characteristic of identification human body, realizes the method for the privacy protection of cellphone information.Specifically, be to use the switch key of somatic fingerprint, for mobile phone provides the finger scan inlet and prestore one or some finger print informations in mobile phone as privacy protection.When mobile phone carries out the operation relevant with private information, at first receive finger print information by described finger scan inlet, this finger print information and the finger print information that prestores are compared, when comparison meets, the privacy protection state of release mobile phone then; When comparison does not meet, then keep the privacy protection state of mobile phone.This mode is closely connected the privacy protection of mobile phone and user's physiological characteristic, because generally speaking, different cellies' fingerprint is also inequality, has only legal user just can be provided for the finger print information of release.Therefore, this kind privacy protection method can be guaranteed the privacy of cellphone information, makes other people can't pass through the privacy protection state of the method release mobile phone of stealing passwords.Simultaneously, when adopting fingerprint to carry out privacy protection, the information right people only need brush fingerprint on mobile phone, without memory cipher, has reduced the memory burden; And, owing to need not input password, operating process is simplified, also saved the operating time.
In a preferred embodiment of the invention, provide the method for storage finger print information in mobile phone, this method is used for providing finger print information to the fingerprint database of mobile phone.Further preferred embodiment provides the scheme of storing a plurality of finger print informations.
In the preferred embodiments of the present invention, also provide in a plurality of finger print informations that receive, determined that a finger print information is the technical scheme of main finger print information.In this technical scheme, determined main finger print information has higher release authority.In the further preferred embodiment, mobile telephone data entries is divided into hide information clauses and subclauses and non-hide information clauses and subclauses, and described hide information clauses and subclauses no matter carry out which kind of mode of operation, all do not show under general situation.When the cellie entered relevant information processing state by described main finger print information is provided, this data entries just showed.This kind scheme can make the user who does not have main fingerprint can't discover the existence of hide information clauses and subclauses, has stronger confidentiality than general cellphone information privacy protection scheme.
In a word, cellphone information privacy protection method provided by the invention has stronger confidentiality compared with prior art, and more simple effective.
Description of drawings
Fig. 1 is the flow chart for first embodiment of the invention.
Fig. 2 is the flow chart for second embodiment of the invention.
Fig. 3 is the flow chart for third embodiment of the invention.
Fig. 4 is the flow chart for fourth embodiment of the invention.
Fig. 5 is the flow chart for fifth embodiment of the invention.
Fig. 6 is the flow chart for sixth embodiment of the invention.
Fig. 7 is the flow chart for seventh embodiment of the invention.
Embodiment
It is some in mobile phone that following embodiment provides, and adopts finger print information to realize the specific implementation method of information private protection.
Should illustrate, in the prior art, have some technical schemes that fingerprint identification technology are used for the privacy protection of PC.Also there have been some prior aries in the fingerprint recognition instrument with combining of mobile phone.For example, application number is 02287719 Chinese patent application, discloses a kind of mobile phone with the fingerprint key, the concrete mode that provides fingerprint sensor to be connected with mobile phone in this patent application.At present, there are equipment such as multiple fingerprint sensor, can make mobile phone can receive and store finger print information, and even finger print information is compared easily with these equipment and mobile phone combination.The method that provides among the following embodiment is based upon mobile phone and has possessed the finger scan inlet, and can obtain easily on the basis of finger print information by this inlet.The cellie can be by being installed in the finger scan inlet on mobile phone surface, and the finger print information with oneself offers mobile phone easily.The prior art that above-mentioned technology can obtain for those skilled in the art is not done detailed description at this.The method for optimizing that following examples provide mainly illustrates the privacy protection that how to utilize finger print information to realize mobile phone.
Please, be the flow chart of first embodiment of the invention referring to Fig. 1.This first embodiment illustrates that the password that how will be used to compare prestore is input to the data in mobile phone storehouse.
Step S101, beginning.
Mobile phone enters normal user mode.
Step S102 according to user's operational order, enters fingerprint typing state.
This fingerprint typing state specifically is that the menus at different levels by mobile phone enter, and lists a plurality of fingerprint titles under this state, as thumb, middle finger, nameless or the like.Under this state, also can provide the option of self-defined title to the user.
Step S103 receives the fingerprint title that the user selects or imports.
The user at first selects certain concrete title in a plurality of fingerprint titles that it provides after entering fingerprint typing state, perhaps, select self-defined title, and import the particular content of self-defined title.
Step S104 receives the fingerprint input from the finger scan inlet.
Described finger scan inlet is arranged on the fingerprint receiving system on mobile phone surface, the finger print that this device can be crossed by sweeper brush, and be characteristic quantity with the eigentransformation of this fingerprint, offer the core processing unit of mobile phone as finger print information.
Step S105, the finger print information that temporary step S104 is received.
Because once may there be deviation in the finger print information that receives, so this information directly can not be stored.Can keep in the finger print information that is received, this information is used for comparison with the finger print information of next time input.
Step S106 receives the fingerprint input once more.
In this step, should provide the identical fingerprint of last input, so that obtain correct fingerprint input to the finger scan interface.
Step S107 with fingerprint and the temporary finger print information comparison of step S105 that step S106 receives, judges whether both are consistent, if then enter step S108; If not, then return step S103.
Step S108 deposits the finger print information that is obtained in fingerprint database.
When depositing described finger print information in described fingerprint database,, store this finger print information corresponding to the fingerprint title that step S103 receives.
By repeating above-mentioned steps, can in the fingerprint database of mobile phone, store several finger print informations.The number of storage finger print information is subjected to the restriction of finger print data storage capacity, and is general, can the fingerprint database that can store ten finger print informations be set, and every finger print information can be selected by corresponding title.
When there is a plurality of finger print information in fingerprint database, can one of them be set to main finger print information.Main finger print information is certain fingerprint of appointment in fingerprint database, and this finger print information has the highest release authority.The concrete function of main finger print information depends on the secret protection function implementation of mobile phone.For example, if mobile phone is chatted the hidden function that will mention after existing, then main finger print information just has the function of release hide information clauses and subclauses, and other finger print informations in this fingerprint database then do not possess this function.
In following embodiment, illustrate that the finger print information that how to utilize mobile phone to store in advance reads the private information in the mobile phone.In these mobile phones, all have the hide information clauses and subclauses, the characteristics of these clauses and subclauses are to have higher secret degree, general finger print information with release authority can only the non-stealth of release data entries, these hide information clauses and subclauses for the user who has other finger print information of this grade just as not existing.For example, after a user uses other finger print information of general level to enter telephone directory, see the telephone number record of non-stealth in can be in telephone directory, but stealthy telephone number record is then without any demonstration.On the contrary, when using main finger print information then can see whole telephone number records.Described hide information clauses and subclauses are after entering other information states of telephone directory or mobile phone by main finger print information, and the data entries of needs stealth is carried out the attribute setting, and then this data entries obtains stealthy effect.After, only have the user of main finger print information, can find the existence of these hide informations.After certain be set in telephone directory get in touch artificial hide information, then all records relevant with this contact person all can be by stealth, for example, from this contact person's incoming call, note etc., all will be as hide information, the user who enters to the finger print information with general release authority does not show that this contact person is called stealthy contact person.In addition, also can be directly in information such as message registration, note record record, certain message registration is set or certain note is recorded as the hide information clauses and subclauses.
Below second embodiment illustrate that a kind of mobile phone carries out the method for finger-print cipher protection to information such as telephone directory, telephony recording, note record, multimedia message records.The flow chart of the method that Fig. 2 provides for this embodiment.
Step S201, beginning.
This moment, mobile phone was in normal holding state, and the hypothesis mobile phone has started privacy protection and hidden function.
Step S202, mobile phone is operated according to the user, enters certain mode of operation relevant with mobile telephone data entries.
The described mode of operation relevant with mobile telephone data entries comprises modes of operation such as entering telephone directory, message registration, note record, multimedia message record.
Step S203, the prompting user imports finger print information.
Step S204 is by finger scan inlet detection user's finger print information.
The course of work of this step is identical with the step S104 of first embodiment, does not repeat them here.
Step S205, system judge whether this finger print information mates with the finger print information that prestores; If then enter S206; If not, then return step S203.
In this step, system if the finger print information that is received is consistent with certain finger print information that prestores, then judges this finger print information and the finger print information coupling that prestores with the finger print information that receives and all finger print information comparisons that prestore that are stored in the fingerprint database.According to this judged result, change associative operation over to.
Step S206 judges whether this finger print information is main finger print information; If then enter step S208; If not, then enter step S207.
In this step, further judge whether the finger print information that prestores that the finger print information with input is complementary is main finger print information, so that postorder makes a choice to whether showing hide information in handling.
Step S207 shows whole associated person informations or whole message registrations and other information records except that stealthy contact person; This EO.
Concrete which kind of information content that shows of this step, the mode of operation decision of the mobile telephone data entries that enters according to step S202.
Step S208 shows whole associated person informations or whole message registrations and other information records, wherein comprises stealthy contact person, stealthy message registration and hide information.
Concrete which kind of information content that shows of this step, the mode of operation decision of the mobile telephone data entries that enters according to step S202.
By above-mentioned steps, the legal cellphone subscriber who has the finger print information clauses and subclauses that prestore just can obtain reliable privacy protection, and other users can't obtain the information in the mobile phone.In addition, also have the user of higher level among the legal cellphone subscriber, other user of this level can consult all mobile telephone data entries.And general other user of level can only consult the data entries of non-stealth.Therefore, the secret character of mobile telephone data entries has obtained effective, multi-level protection.
Below the 3rd embodiment a kind of finger-print cipher guard method of mobile phone mobile phone screensaver functions is provided.Under this kind function, only show the screen protection content during cell phone standby, the content relevant that shows when not showing normal standby such as non-responding call prompting and unread short messages prompting with mobile phone privacy information.Please be simultaneously referring to Fig. 3.
Step S301, beginning.
This moment, mobile phone was in the screen protection state, and the hypothesis mobile phone has started the cipher protection function of screen protection.Under this function, mobile phone is in the screen protection state all the time, does not show promptings such as missed call, people of unread information.
Step S302, mobile phone is operated according to the user, enters to remove the screen protection state of operation.
Step S303, the prompting user imports finger print information.
Step S304 is by finger scan inlet detection user's finger print information.
The course of work of this step is identical with the step S104 of first embodiment, does not repeat them here.
Step S305, system judge whether this finger print information mates with the finger print information that prestores; If then enter S306; If not, then return step S303.
In this step, system if the finger print information that is received is consistent with certain finger print information that prestores, then judges this finger print information and the finger print information coupling that prestores with the finger print information that receives and all finger print information comparisons that prestore that are stored in the fingerprint database.According to this judged result, change associative operation over to.
Step S306 judges whether this finger print information is main finger print information; If then enter step S308; If not, then enter step S307.
In this step, further judge whether the finger print information that prestores that the finger print information with input is complementary is main finger print information, so that postorder makes a choice to whether showing hide information in handling.
Step S307 removes the screen protection state, and shows incoming information, unread short messages information, but does not show the incoming information relevant with stealthy contact person, unread short messages information; Whole operation finishes.
Step S308 removes the screen protection state, and shows incoming information, unread short messages information, comprises showing incoming information, the unread short messages information relevant with stealthy contact person; Whole operation finishes.
Below the 4th embodiment provide a kind of mobile phone incoming call display function to be carried out the method for finger-print cipher protection.This method can guarantee that the incoming call of mobile phone only shows to the user who has the right.Please referring to Fig. 4.
Step S401, beginning.
This moment, mobile phone was in holding state, and mobile phone has started the caller identification function of keeping secret.Under this function, mobile phone does not show number for the phone of dialling in.
Step S402, mobile phone receive the phone of dialling in, but mobile phone does not show caller ID.
After mobile phone receives the phone of dialling in, carry out incoming call prompting.For example jingle bell or vibration, still, mobile phone does not show caller ID, can show contents such as " unknown number ".
Step S403, the prompting user imports finger print information.
Step S404 is by finger scan inlet detection user's finger print information.
The course of work of this step is identical with the step S104 of first embodiment, does not repeat them here.
Step S405, system judge whether this finger print information mates with the finger print information that prestores; If then enter S406; If not, then return step S403.
In this step, system if the finger print information that is received is consistent with certain finger print information that prestores, then judges this finger print information and the finger print information coupling that prestores with the finger print information that receives and all finger print information comparisons that prestore that are stored in the fingerprint database.According to this judged result, change associative operation over to.
Step S406 judges whether this finger print information is main finger print information; If then enter step S408; If not, then enter step S407.
In this step, further judge whether the finger print information that prestores that the finger print information with input is complementary is main finger print information, so that postorder makes a choice to whether showing hide information in handling.
Step S407 shows the relevant information of incoming call, but does not show stealthy contact person's information; Whole operation finishes.
The correlative connection man-hour of having put down in writing in sending a telegram here from telephone directory if this contact person does not belong to stealthy contact person, then shows this associated person information; If this contact person belongs to stealthy contact person, then continue to show " unknown number "; If dial in telephone number not record in telephone directory, then show this telephone number.
Step S408 shows the relevant information of sending a telegram here, and comprises showing the incoming information relevant with stealthy contact person; Whole operation finishes.
The correlative connection man-hour of having put down in writing in sending a telegram here from telephone directory then shows this associated person information, no matter whether this contact person belongs to stealthy contact person; If dial in telephone number not record in telephone directory, then show this telephone number.
By said process, the caller ID that mobile phone is received obtains sufficient privacy protection.
Below the 5th embodiment method that provides a kind of mobile phone that the incoming call pickup feature is carried out finger-print cipher protection.This method can guarantee that the incoming call of mobile phone only allows the user who has the right to answer.Please be simultaneously referring to Fig. 5.
Step S501, beginning.
This moment, mobile phone was in holding state, and mobile phone has started incoming call and answers cipher protection function.Under this function, mobile phone must carry out fingerprint authentication earlier for the phone of dialling in and could allow to answer.
Step S502, mobile phone receive the phone of dialling in, the handset displays incoming information.
After mobile phone receives the phone of dialling in, show incoming information.If incoming call then shows this contact person's relevant informations such as name from the contact person who has put down in writing in the telephone directory; If caller ID is not record in telephone directory, then only show caller ID.
Step S503, the prompting user imports finger print information.
Step S504 is by finger scan inlet detection user's finger print information.
The course of work of this step is identical with the step S105 of first embodiment, does not repeat them here.
Step S505, system judge whether this finger print information mates with the finger print information that prestores; If then enter S506; If not, then return step S503.
Step S506 directly receives calls.
By said process, can make mobile phone only having when the user who has the right is used, could normally receive incoming call, thereby make the cellphone subscriber obtain sufficient privacy protection.
Below the 6th embodiment provide a kind of mobile phone outside dial feature to be carried out the method for finger-print cipher protection.This method can guarantee that the user who has the right that only allows of mobile phone outwards dials.Please be simultaneously referring to Fig. 6.
Step S601, beginning.
This moment, mobile phone was in holding state, and mobile phone has started the dialing cipher protection function.Under this function, mobile phone must carry out fingerprint authentication earlier for the phone of transfering to and could allow outwards to transfer to.
Step S602, mobile phone receive the dialing input.
Mobile phone receives the dialing input, if desired with telephone directory in the Affiliate sessions put down in writing, directly this contact person's of selection name in telephone directory; If caller ID is not record in telephone directory, then directly dial by cell phone keyboard.
Step S603, the prompting user imports finger print information.
Step S604 is by finger scan inlet detection user's finger print information.
The course of work of this step is identical with the step S106 of first embodiment, does not repeat them here.
Step S605, system judge whether this finger print information mates with the finger print information that prestores; If then enter S606; If not, then return step S603.
Step S606, directly Outgoing Call.
Pass through said process; mobile phone is only being had when the user who has the right is used, could normal Outgoing Call, thus make cellphone subscriber's the right to use obtain protection fully; avoid mobile phone to be usurped, also just avoided illegal user to utilize mobile phone to invade mobile phone machine master's secret by illegal user.
Below the 7th embodiment a kind of method of mobile phone USB flash disk function being carried out finger-print cipher protection is provided.This method can guarantee that the USB flash disk function of mobile phone only allows the user who has the right to use, and the user who haves no right can't enter the mobile phone USB flash disk.
At present, many mobile phones have all had the USB flash disk function, have this function and make mobile phone can store a large amount of information, thereby become the data bank of carrying.Because mobile phone is the articles for use that must carry at random, therefore, this function can reduce the trouble that the machine master carries USB flash disk in addition.But, in this case, machine master canned data in USB flash disk is leaked, therefore, need carry out cryptoguard to USB flash disk.
Please be simultaneously referring to Fig. 7.
Step S701, beginning.
This moment, mobile phone was in holding state, and mobile phone has started USB flash disk data cipher protection function.Under this function, must carry out the data that fingerprint authentication just can enter the storage of mobile phone USB flash disk earlier.
Step S702, mobile phone receive the user who enters the USB flash disk data and select.
Step S703, the prompting user imports finger print information.
Step S704 is by finger scan inlet detection user's finger print information.
The course of work of this step is identical with the step S107 of first embodiment, does not repeat them here.
Step S705, system judge whether this finger print information mates with the finger print information that prestores; If then enter S706; If not, then return step S703.
Step S706 enters the mobile phone USB flash disk.
By said process, can make mobile phone only having when the user who has the right is used, could use the mobile phone USB flash disk, thereby make the data that is stored in the mobile phone obtain sufficient privacy protection.
Need to prove that above-mentioned privacy protection to the various functions of mobile phone all needs at first carrying out maintaining secrecy accordingly setting, so that start corresponding secret protection function.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (17)
1, a kind of guard method of mobile phone privacy information is characterized in that, comprising:
11) detection user's finger print information;
12) judge whether described finger print information is the finger print information with release authority that prestores; If then enter step 13); If not, then make mobile phone be in the privacy protection state;
13) the privacy protection state of relevant information in this mobile phone of release.
2, the guard method of mobile phone privacy information according to claim 1 is characterized in that, described information right people's finger print information is pre-stored in the mobile phone as follows:
21), enter fingerprint typing state according to user's operational order;
22) receive the fingerprint input from the finger scan inlet;
23) deposit the finger print information that is obtained in fingerprint database.
3, the guard method of mobile phone privacy information according to claim 2 is characterized in that, described step 22) and step 23) between also comprise:
31) the temporary step 22) finger print information that is received;
32) receive the fingerprint input once more;
33) fingerprint and the step 31 that will newly receive) temporary finger print information comparison when both are consistent, then enters step 23); When if both are inconsistent.Then return step 22).
4, the guard method of mobile phone privacy information according to claim 3 is characterized in that, the described finger print information that prestores comprises a plurality of finger print informations, described step 21) and step 22) between comprise:
41) receive the fingerprint title that the user selects or imports;
Described step 23) in, when depositing described finger print information in described fingerprint database, corresponding to step 41) the fingerprint title that receives, store this finger print information.
5, the guard method of mobile phone privacy information according to claim 4 is characterized in that, in described a plurality of finger print informations, comprising main finger print information, this main finger print information has the release authority higher than other finger print information.
6, the guard method of mobile phone privacy information according to claim 5, it is characterized in that, store the hide information clauses and subclauses in the described mobile phone, in the described step 12), judge simultaneously whether the finger print information that the user imports is main finger print information, if, when then release information right people has the right the privacy protection state of information in the step 13), comprise the stealthy state of the described hide information clauses and subclauses of release, described hide information is shown; If not, the privacy protection state of the non-hide information clauses and subclauses of a release in the step 13) then, described hide information clauses and subclauses do not show.
7, the guard method of mobile phone privacy information according to claim 6, it is characterized in that, described hide information by main finger print information release privacy protection state after, receive the user the stealthy attribute of the mobile telephone data entries of already present mobile telephone data entries or new input set; After certain bar information setting is the success of stealthy attribute, then withdraw from when this hide information entry attributes is set behind the residing released state this data entries stealth as the user.
8, the guard method of mobile phone privacy information according to claim 6, it is characterized in that, described hide information by main finger print information release privacy protection state after, receive the user the stealthy attribute of the mobile telephone data entries of already present mobile telephone data entries or new input set; After certain bar information setting is the success of stealthy attribute, then withdraw from when this hide information entry attributes is set behind the residing released state as the user, if the hidden function of mobile phone starts, then this data entries stealth; If the hidden function of mobile phone does not start, then this data entries is not stealthy.
9, the guard method of mobile phone privacy information according to claim 8 is characterized in that, points out the user to import finger print information before the described step 11).
10, the guard method of mobile phone privacy information according to claim 9 is characterized in that, described prompting user imports finger print information, is to operate according to the user at mobile phone, enters after certain mode of operation relevant with mobile telephone data entries.
11, the guard method of mobile phone privacy information according to claim 10 is characterized in that, the described mode of operation relevant with mobile telephone data entries comprises modes of operation such as entering telephone directory, message registration, note record, multimedia message record.
12, the guard method of mobile phone privacy information according to claim 9 is characterized in that, described prompting user imports finger print information, is to be in the screen protection state when mobile phone, according to user's operation, when needing to remove the screen protection state; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is to remove the screen protection state, and shows the information of missed call, people of unread information.
13, the guard method of mobile phone privacy information according to claim 9 is characterized in that, described prompting user imports finger print information, is after mobile phone is received incoming call; At this moment, mobile phone does not show caller ID; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is to show caller ID, perhaps, when this caller ID is the contact number that exists in the cell-phone telephone book, shows this associated person information.
14, the guard method of the mobile phone privacy information of stating according to claim 4 is characterized in that described prompting user imports finger print information, is after mobile phone is received incoming call, this moment handset displays caller ID or the contact person relevant with caller ID; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is that incoming call is connected; Making mobile phone be in the privacy protection state in the described step 12), is to make mobile phone can't answer this incoming call, and continues prompting input finger print information.
15, the guard method of mobile phone privacy information according to claim 4 is characterized in that, described prompting user imports finger print information, is behind user's Outgoing Call; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is that phone is broadcasted; Making mobile phone be in the privacy protection state in the described step 12), is to make mobile phone can't transfer to this phone, and continues prompting input finger print information.
16, the guard method of mobile phone privacy information according to claim 4 is characterized in that, described prompting user imports finger print information, is when the user selects the USB flash disk function; At this moment, execution in step 13) effect of the privacy protection state of relevant information in this mobile phone of release described in is that USB flash disk is opened; Making mobile phone be in the privacy protection state in the described step 12), is to make USB flash disk keep closed condition, and continues prompting input finger print information.
17, require the guard method of each described mobile phone privacy information of 10-16 according to claim, it is characterized in that, at first need to set accordingly, so that start this privacy protection scheme.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100638614A CN101035335A (en) | 2007-02-13 | 2007-02-13 | Mobile phone privacy protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100638614A CN101035335A (en) | 2007-02-13 | 2007-02-13 | Mobile phone privacy protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101035335A true CN101035335A (en) | 2007-09-12 |
Family
ID=38731581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007100638614A Pending CN101035335A (en) | 2007-02-13 | 2007-02-13 | Mobile phone privacy protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101035335A (en) |
Cited By (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217399B (en) * | 2007-12-29 | 2010-08-04 | 华为终端有限公司 | A data card background system and the corresponding operating method |
CN101827148A (en) * | 2010-05-18 | 2010-09-08 | 深圳桑菲消费通信有限公司 | Fingerprint identification system applied to mobile phone and operating method thereof |
US7979053B2 (en) | 2007-10-12 | 2011-07-12 | Chi Mei Communication Systems, Inc. | Security system and method for a mobile phone |
CN102487384A (en) * | 2010-12-03 | 2012-06-06 | 联想(北京)有限公司 | Data processing method and device |
CN102693064A (en) * | 2011-03-23 | 2012-09-26 | 中兴通讯股份有限公司 | Method and system for quitting protection screen by terminal |
CN102833423A (en) * | 2012-09-24 | 2012-12-19 | 武汉大学 | Touch screen mobile phone based on fingerprint identification and login unlocking method for touch screen mobile phone |
CN102857731A (en) * | 2012-09-01 | 2013-01-02 | 合肥移瑞通信技术有限公司 | Method for identity validation and automatic answering of 3G wireless communication module video telephone call |
CN102932540A (en) * | 2012-10-24 | 2013-02-13 | 广东欧珀移动通信有限公司 | Mobile terminal and stealing prevention method thereof |
CN102930195A (en) * | 2012-09-26 | 2013-02-13 | 北京百度网讯科技有限公司 | Method for sharing electronic equipment through fingerprints and electronic equipment |
CN103167092A (en) * | 2013-03-06 | 2013-06-19 | 广东欧珀移动通信有限公司 | Module and method for selecting mobile phone answerer by fingerprint identification technology |
CN103391349A (en) * | 2012-05-09 | 2013-11-13 | 中兴通讯股份有限公司 | Method of keeping secrets of terminal and terminal |
CN103455742A (en) * | 2012-06-04 | 2013-12-18 | 三星电子株式会社 | Method for providing fingerprint-based shortcut key, machine-readable storage medium, and portable terminal |
CN103488926A (en) * | 2013-09-05 | 2014-01-01 | 广东欧珀移动通信有限公司 | Method and system for preventing unread message record from being eliminated |
CN103729129A (en) * | 2012-10-11 | 2014-04-16 | 郭德礼 | Intelligent device with screen locking and unlocking functions and unlocking method thereof |
CN103974249A (en) * | 2013-01-29 | 2014-08-06 | 北京三星通信技术研究有限公司 | Communication method based on verification information and equipment thereof |
CN104202486A (en) * | 2014-09-26 | 2014-12-10 | 上海华勤通讯技术有限公司 | Mobile terminal and screen unlocking method thereof |
CN104252352A (en) * | 2013-06-28 | 2014-12-31 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104598784A (en) * | 2014-12-29 | 2015-05-06 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104933337A (en) * | 2015-05-22 | 2015-09-23 | 广东欧珀移动通信有限公司 | Method for realizing fingerprint unlocking and intelligent terminal |
EP2947592A1 (en) * | 2007-09-24 | 2015-11-25 | Apple Inc. | Embedded authentication systems in an electronic device |
CN105631275A (en) * | 2015-04-15 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display device and terminal |
CN105653856A (en) * | 2015-12-29 | 2016-06-08 | 欧阳锡伟 | Health data acquisition method |
CN105827832A (en) * | 2016-03-21 | 2016-08-03 | 乐视移动智能信息技术(北京)有限公司 | User management method, user management system and user terminal |
CN106211286A (en) * | 2016-06-29 | 2016-12-07 | 努比亚技术有限公司 | A kind of control method and mobile terminal |
CN106373300A (en) * | 2016-08-25 | 2017-02-01 | 乐视控股(北京)有限公司 | Article antitheft method and article antitheft sleeve |
CN106446761A (en) * | 2015-07-07 | 2017-02-22 | 爱德克斯公司 | Image reconstruction |
CN106454783A (en) * | 2015-08-06 | 2017-02-22 | 中兴通讯股份有限公司 | Method, calling terminal, called terminal and cloud server for realizing call processing |
CN106453800A (en) * | 2010-11-09 | 2017-02-22 | 微软技术许可有限责任公司 | Privacy in mobile device communications |
CN106791106A (en) * | 2016-12-22 | 2017-05-31 | 惠州Tcl移动通信有限公司 | A kind of call processing method and system based on mobile terminal |
CN106909823A (en) * | 2017-02-28 | 2017-06-30 | 北京小米移动软件有限公司 | State switching method and device |
WO2017197766A1 (en) * | 2016-05-17 | 2017-11-23 | 中兴通讯股份有限公司 | Calling method and device |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
WO2018035692A1 (en) * | 2016-08-22 | 2018-03-01 | 敦泰电子有限公司 | Fingerprint identification program starting method, fingerprint identification module and electronic device |
CN108574760A (en) * | 2017-03-08 | 2018-09-25 | 阿里巴巴集团控股有限公司 | The display methods and device of associated person information and the display methods and device of information |
CN108650391A (en) * | 2015-07-16 | 2018-10-12 | 珠海市魅族科技有限公司 | A kind of display methods and terminal of caller id information |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
CN109660987A (en) * | 2014-07-31 | 2019-04-19 | 三星电子株式会社 | For providing the electronic equipment and method, non-transitory readable medium of user interface |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
CN111597528A (en) * | 2019-02-21 | 2020-08-28 | 奇酷互联网络科技(深圳)有限公司 | Information protection method of electronic equipment, electronic equipment and storage device |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
CN112597469A (en) * | 2015-03-31 | 2021-04-02 | 华为技术有限公司 | Mobile terminal privacy protection method and device and mobile terminal |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11209961B2 (en) | 2012-05-18 | 2021-12-28 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
US12099586B2 (en) | 2021-01-25 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
-
2007
- 2007-02-13 CN CNA2007100638614A patent/CN101035335A/en active Pending
Cited By (105)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9304624B2 (en) | 2007-09-24 | 2016-04-05 | Apple Inc. | Embedded authentication systems in an electronic device |
US9519771B2 (en) | 2007-09-24 | 2016-12-13 | Apple Inc. | Embedded authentication systems in an electronic device |
US9953152B2 (en) | 2007-09-24 | 2018-04-24 | Apple Inc. | Embedded authentication systems in an electronic device |
US10275585B2 (en) | 2007-09-24 | 2019-04-30 | Apple Inc. | Embedded authentication systems in an electronic device |
US11468155B2 (en) | 2007-09-24 | 2022-10-11 | Apple Inc. | Embedded authentication systems in an electronic device |
EP2947592A1 (en) * | 2007-09-24 | 2015-11-25 | Apple Inc. | Embedded authentication systems in an electronic device |
US9495531B2 (en) | 2007-09-24 | 2016-11-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US9274647B2 (en) | 2007-09-24 | 2016-03-01 | Apple Inc. | Embedded authentication systems in an electronic device |
US7979053B2 (en) | 2007-10-12 | 2011-07-12 | Chi Mei Communication Systems, Inc. | Security system and method for a mobile phone |
CN101217399B (en) * | 2007-12-29 | 2010-08-04 | 华为终端有限公司 | A data card background system and the corresponding operating method |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
CN101827148A (en) * | 2010-05-18 | 2010-09-08 | 深圳桑菲消费通信有限公司 | Fingerprint identification system applied to mobile phone and operating method thereof |
CN106453800A (en) * | 2010-11-09 | 2017-02-22 | 微软技术许可有限责任公司 | Privacy in mobile device communications |
CN102487384B (en) * | 2010-12-03 | 2015-06-03 | 联想(北京)有限公司 | Data processing method and device |
CN102487384A (en) * | 2010-12-03 | 2012-06-06 | 联想(北京)有限公司 | Data processing method and device |
CN102693064A (en) * | 2011-03-23 | 2012-09-26 | 中兴通讯股份有限公司 | Method and system for quitting protection screen by terminal |
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10516997B2 (en) | 2011-09-29 | 2019-12-24 | Apple Inc. | Authentication with secondary approver |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
CN103391349A (en) * | 2012-05-09 | 2013-11-13 | 中兴通讯股份有限公司 | Method of keeping secrets of terminal and terminal |
CN103391349B (en) * | 2012-05-09 | 2017-02-15 | 中兴通讯股份有限公司 | Method of keeping secrets of terminal and terminal |
US11989394B2 (en) | 2012-05-18 | 2024-05-21 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11209961B2 (en) | 2012-05-18 | 2021-12-28 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
CN103455742B (en) * | 2012-06-04 | 2018-10-23 | 三星电子株式会社 | Method, machine readable storage medium and the portable terminal of shortcut key based on fingerprint are provided |
CN103455742A (en) * | 2012-06-04 | 2013-12-18 | 三星电子株式会社 | Method for providing fingerprint-based shortcut key, machine-readable storage medium, and portable terminal |
CN102857731A (en) * | 2012-09-01 | 2013-01-02 | 合肥移瑞通信技术有限公司 | Method for identity validation and automatic answering of 3G wireless communication module video telephone call |
CN102833423A (en) * | 2012-09-24 | 2012-12-19 | 武汉大学 | Touch screen mobile phone based on fingerprint identification and login unlocking method for touch screen mobile phone |
CN102930195B (en) * | 2012-09-26 | 2016-12-21 | 北京百度网讯科技有限公司 | Method and the electronic equipment of electronic equipment is shared by fingerprint |
CN102930195A (en) * | 2012-09-26 | 2013-02-13 | 北京百度网讯科技有限公司 | Method for sharing electronic equipment through fingerprints and electronic equipment |
CN103729129A (en) * | 2012-10-11 | 2014-04-16 | 郭德礼 | Intelligent device with screen locking and unlocking functions and unlocking method thereof |
CN102932540A (en) * | 2012-10-24 | 2013-02-13 | 广东欧珀移动通信有限公司 | Mobile terminal and stealing prevention method thereof |
CN103974249A (en) * | 2013-01-29 | 2014-08-06 | 北京三星通信技术研究有限公司 | Communication method based on verification information and equipment thereof |
CN103974249B (en) * | 2013-01-29 | 2018-05-01 | 北京三星通信技术研究有限公司 | Method and its equipment based on checking information communication |
CN103167092A (en) * | 2013-03-06 | 2013-06-19 | 广东欧珀移动通信有限公司 | Module and method for selecting mobile phone answerer by fingerprint identification technology |
CN104252352A (en) * | 2013-06-28 | 2014-12-31 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN103488926A (en) * | 2013-09-05 | 2014-01-01 | 广东欧珀移动通信有限公司 | Method and system for preventing unread message record from being eliminated |
US10262182B2 (en) | 2013-09-09 | 2019-04-16 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10372963B2 (en) | 2013-09-09 | 2019-08-06 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10410035B2 (en) | 2013-09-09 | 2019-09-10 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11494046B2 (en) | 2013-09-09 | 2022-11-08 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US11287942B2 (en) | 2013-09-09 | 2022-03-29 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces |
US10055634B2 (en) | 2013-09-09 | 2018-08-21 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US11057378B2 (en) | 2014-07-31 | 2021-07-06 | Samsung Electronics Co., Ltd. | Device and method of setting or removing security on content |
CN109660987B (en) * | 2014-07-31 | 2021-12-07 | 三星电子株式会社 | Electronic device and method for providing user interface, non-transitory readable medium |
CN109660987A (en) * | 2014-07-31 | 2019-04-19 | 三星电子株式会社 | For providing the electronic equipment and method, non-transitory readable medium of user interface |
CN104202486A (en) * | 2014-09-26 | 2014-12-10 | 上海华勤通讯技术有限公司 | Mobile terminal and screen unlocking method thereof |
CN104598784A (en) * | 2014-12-29 | 2015-05-06 | 联想(北京)有限公司 | Information processing method and electronic device |
CN112597469A (en) * | 2015-03-31 | 2021-04-02 | 华为技术有限公司 | Mobile terminal privacy protection method and device and mobile terminal |
CN105631275B (en) * | 2015-04-15 | 2018-12-25 | 宇龙计算机通信科技(深圳)有限公司 | information display method, information display device and terminal |
CN105631275A (en) * | 2015-04-15 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display device and terminal |
CN104933337A (en) * | 2015-05-22 | 2015-09-23 | 广东欧珀移动通信有限公司 | Method for realizing fingerprint unlocking and intelligent terminal |
CN104933337B (en) * | 2015-05-22 | 2018-04-17 | 广东欧珀移动通信有限公司 | A kind of method and intelligent terminal for realizing unlocked by fingerprint |
CN106446761A (en) * | 2015-07-07 | 2017-02-22 | 爱德克斯公司 | Image reconstruction |
CN108650391A (en) * | 2015-07-16 | 2018-10-12 | 珠海市魅族科技有限公司 | A kind of display methods and terminal of caller id information |
CN106454783A (en) * | 2015-08-06 | 2017-02-22 | 中兴通讯股份有限公司 | Method, calling terminal, called terminal and cloud server for realizing call processing |
CN105653856A (en) * | 2015-12-29 | 2016-06-08 | 欧阳锡伟 | Health data acquisition method |
CN105827832A (en) * | 2016-03-21 | 2016-08-03 | 乐视移动智能信息技术(北京)有限公司 | User management method, user management system and user terminal |
WO2017161735A1 (en) * | 2016-03-21 | 2017-09-28 | 乐视控股(北京)有限公司 | User management method, user management system and user terminal |
WO2017197766A1 (en) * | 2016-05-17 | 2017-11-23 | 中兴通讯股份有限公司 | Calling method and device |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
CN106211286B (en) * | 2016-06-29 | 2019-10-08 | 努比亚技术有限公司 | A kind of control method and mobile terminal |
CN106211286A (en) * | 2016-06-29 | 2016-12-07 | 努比亚技术有限公司 | A kind of control method and mobile terminal |
WO2018035692A1 (en) * | 2016-08-22 | 2018-03-01 | 敦泰电子有限公司 | Fingerprint identification program starting method, fingerprint identification module and electronic device |
CN106373300B (en) * | 2016-08-25 | 2019-07-12 | 法法汽车(中国)有限公司 | A kind of object theft preventing method and object stealingproof sleeve |
CN106373300A (en) * | 2016-08-25 | 2017-02-01 | 乐视控股(北京)有限公司 | Article antitheft method and article antitheft sleeve |
US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
CN106791106A (en) * | 2016-12-22 | 2017-05-31 | 惠州Tcl移动通信有限公司 | A kind of call processing method and system based on mobile terminal |
CN106909823A (en) * | 2017-02-28 | 2017-06-30 | 北京小米移动软件有限公司 | State switching method and device |
CN108574760A (en) * | 2017-03-08 | 2018-09-25 | 阿里巴巴集团控股有限公司 | The display methods and device of associated person information and the display methods and device of information |
US10977350B2 (en) | 2017-03-08 | 2021-04-13 | Alibaba Group Holding Limited | Contact information display method and device, and information display method and device |
TWI820007B (en) * | 2017-03-08 | 2023-11-01 | 香港商阿里巴巴集團服務有限公司 | Method and device for displaying contact information and method and device for displaying information |
US10872256B2 (en) | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US10410076B2 (en) | 2017-09-09 | 2019-09-10 | Apple Inc. | Implementation of biometric authentication |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US12105874B2 (en) | 2018-09-28 | 2024-10-01 | Apple Inc. | Device control using gaze information |
US12124770B2 (en) | 2018-09-28 | 2024-10-22 | Apple Inc. | Audio assisted enrollment |
CN111597528A (en) * | 2019-02-21 | 2020-08-28 | 奇酷互联网络科技(深圳)有限公司 | Information protection method of electronic equipment, electronic equipment and storage device |
US12099586B2 (en) | 2021-01-25 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101035335A (en) | Mobile phone privacy protection method | |
CN101052190A (en) | Anti-theft method for mobile terminal and anti-theft mobile terminal | |
CN1855956A (en) | Electronic device, operational restriction control method thereof and operational restriction control program thereof | |
CN1416257A (en) | Communication equipment | |
CN1115040C (en) | Telephone system | |
CN1176560C (en) | System for digital radio communication between wireless LAN and PBX | |
CN1081880C (en) | Radio communication apparatus having a plurality of identification codes | |
CN1913679A (en) | Protection method and system for preventing fraudulent use of mobile terminal | |
CN1794759A (en) | Communication device, server possessing telephone antiinterference function and its method | |
CN1697470A (en) | Telephone number change notification method and telephone number change notification system | |
CN1011108B (en) | Method for providing telecommunication connections with computer | |
CN1425244A (en) | Method and apparatus for exchange of information in communication network | |
CN1377550A (en) | Voice activated signaling to perform in-cell functions | |
CN1968467A (en) | Mobile terminal and terminal user information protection method | |
CN101052152A (en) | Information secret device for mobile communication terminal and relative method | |
CN101409881A (en) | Secrecy apparatus and method for mobile phone data | |
CN1258949C (en) | Wireless telephone and wireless telephone system | |
CN101483861A (en) | Method for mobile phone information safety protection | |
CN1691578A (en) | A method of self validity verification for an equipment | |
CN107018240A (en) | A kind of call method and system of hiding called number | |
CN100340089C (en) | System and method for network connection | |
CN1855966A (en) | Device and method for preventing from disturbing calls | |
CN1529975A (en) | Method and apparatus for anonymous call set up | |
CN101047925A (en) | Personal information protecting method and mobile terminal | |
CN1890950A (en) | Voice authentication device, voice authentication system, and voice authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20070912 |