Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security control method and terminal

A technology of information security and control method, applied in the field of information security control method and terminal, can solve problems such as security risks

Inactive Publication Date: 2013-02-27
SHENZHEN GIONEE COMM EQUIP
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it also has certain security risks. For example, when the owner hopes that some message content or incoming calls can only be seen by himself, but other people cannot see it, the current mobile phone is not enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security control method and terminal
  • Information security control method and terminal
  • Information security control method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] figure 1 It is a schematic flowchart of an embodiment of the information security control method of the present invention. Such as figure 1 As shown, the information security control method of the present invention may include:

[0030] Step S110, when the user needs to view specific content of a certain application, the terminal performs face recognition on the user.

[0031] Step S111 , when it is determined through face recognition that th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an information security control method and a terminal. The method comprises the steps that when a user needs to check the specific content of a certain application, the terminal conducts human face recognition on the user; when the user is confirmed to have a right to access the specific content of the application after human face recognition, the specific content of the application is showed to the user; and when the user is confirmed not to have a right to access the specific content of the application after human face recognition, the specific content of the application is not shown to the user. Through implementing the information security control method, the security of the specific content of the terminal application can be enhanced on the basis of a human face recognition technology.

Description

technical field [0001] The present invention relates to the communication field, in particular to an information security control method and a terminal. Background technique [0002] At present, when a mobile terminal such as a mobile phone has an incoming call, the mobile phone will directly display the incoming call number and the name of the contact person, or, when the mobile phone has a short message, it will display the content of the short message through the mobile window, which is convenient for the user. View incoming calls and short messages. However, it also has certain security risks. For example, when the owner hopes that some message content or incoming calls can only be seen by himself, but other people cannot see it, the current mobile phone is not enough. Contents of the invention [0003] Embodiments of the present invention provide an information security control method and a terminal, which can enhance the security of specific content of terminal appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725G06K9/00H04M1/72463
Inventor 李韧
Owner SHENZHEN GIONEE COMM EQUIP