Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application access method and mobile terminal

An application program access and application program technology, applied in the field of mobile communication, can solve the problem of incapable mobile terminal protection, etc., and achieve the effect of improving security and privacy protection

Inactive Publication Date: 2014-07-23
SHANGHAI WELDING ELECTRONICS TECH GRP
View PDF5 Cites 70 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that a single encryption scheme through the lock screen interface cannot provide good protection for mobile terminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application access method and mobile terminal
  • Application access method and mobile terminal
  • Application access method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that the technical features or combinations of technical features described in the following embodiments should not be regarded as isolated, and they can be combined and combined with each other to achieve better technical effects. In the drawings of the following embodiments, the same reference numerals appearing in each drawing represent the same features or components, which can be applied in different embodiments.

[0041] Fingerprints refer to the uneven lines on the skin on the front of the end of a human finger. The lines are regularly arranged to form different patterns.

[0042] The overall features of fingerprints refer to those features that can be directly observed by human eyes, including pattern shape, pattern area, core point, triangle point, and number of lines. According to the direction and distribution of the ridges, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application access method. The application access method comprises the steps of storing standard fingerprint information of a user, collecting sample fingerprint information of the user when the user clicks an icon of an application, judging whether the standard fingerprint information is the same as the sample fingerprint information or not, and starting the application when the standard fingerprint information is the same as the sample fingerprint information. The invention further provides a mobile terminal. The mobile terminal comprises a fingerprint storage module, a fingerprint sensor layer, a fingerprint recognition module and an access control module. According to the application access method and the mobile terminal, when an operator clicks the application, the fingerprints of the operator are recognized, whether the operator has the access permission for the clicked application or not is determined according to the set application access permission, it is ensured that privacy in the mobile terminal is protected, and safety of the mobile terminal is improved.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to an application program access method and a mobile terminal. Background technique [0002] At present, the security protection settings adopted by mobile terminals mainly use the lock screen interface to encrypt the mobile terminal. Most of the existing security protection schemes are aimed at increasing the encryption difficulty of the lock screen interface, such as using complex passwords or Use fingerprint unlocking technology, graphic unlocking technology, etc. [0003] After the operator enters the operation interface of the mobile terminal through the verification of the lock screen interface, the mobile terminal does not take any safety protection measures. Usually, when the operator enters the operation interface of the mobile terminal through the verification of the lock screen interface, the operator can open all the applications in the mobile terminal and access all...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32
CPCG06F21/32G06F21/51
Inventor 赵玲涛
Owner SHANGHAI WELDING ELECTRONICS TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products