Mobile terminal safety control method and apparatus

A security control and mobile terminal technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of low security, mobile terminal information is easy to be stolen by others, etc., and achieve the effect of improving security

Active Publication Date: 2016-02-24
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
4 Cites 3 Cited by

AI-Extracted Technical Summary

Problems solved by technology

But at present, it is possible to skip the lock screen interface and directly enter the desktop in a professional way, and this protection method is not effective for people who know the...
View more

Method used

A kind of mobile terminal safety control method provided by the present embodiment, by increasing the operation of managing the preset application program controlled by the security control mode, it is convenient for the user to add or delete the preset application program, and improve the Security of mobile terminals.
A kind of mobile terminal security control method that the present embodiment provides, by setting security control mode on mobile terminal, when security control mode is opened, judge the distance between mobile terminal and smart wearable device, when described distance is greater than When the distance is preset, the preset application program in the mobile terminal is hidden. Otherwise, the preset application program is displayed on the mobile terminal, which improves the confidentiality of the mobile terminal to the user's relevant information and avoids the leakage of relevant information. leakage, improving the security of mobile terminals.
A kind of mobile terminal security control method that the present embodiment provides, by setting the login password of desc...
View more

Abstract

The present invention discloses a mobile terminal safety control method and apparatus. The method comprises: when a safety control mode is opened, obtaining the distance between a mobile terminal and an intelligent wearable device; and determining whether the distance between the mobile terminal and the intelligent wearable device is greater than a preset distance, if yes, hiding a preset application in the mobile terminal, otherwise, displaying the preset application on the mobile terminal. According to the method and apparatus disclosed by the present invention, by setting the safety control mode on the mobile terminal and when the safety control mode is opened, the distance between the mobile terminal and the intelligent wearable device is obtained, and when when the distance is greater than the preset distance, a preset application in the mobile terminal is hidden, otherwise, the preset application is displayed on the mobile terminal. According to the method and apparatus disclosed by the present invention, the safety of the mobile terminal is improved, even if the mobile terminal is used by a person not familiar with the terminal, sensitive information such as personal data of a related user in the mobile terminal cannot be obtained.

Application Domain

Digital data protection

Technology Topic

Individual dataComputer science +2

Image

  • Mobile terminal safety control method and apparatus
  • Mobile terminal safety control method and apparatus
  • Mobile terminal safety control method and apparatus

Examples

  • Experimental program(4)

Example Embodiment

[0019] Embodiment one
[0020] figure 1 It is a flow chart of a mobile terminal security control method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where sensitive information is avoided when the mobile terminal is not with the owner user. This method can be implemented by the mobile terminal security control device To execute, the device can be implemented by means of software and/or hardware, specifically including the following steps:
[0021] Step 110, when the security control mode is turned on, obtain the distance between the mobile terminal and the smart wearable device;
[0022] Wherein, the user wears a smart wearable device, such as a smart bracelet or a smart watch. The mobile terminal includes a smart phone or a tablet computer and the like. Specifically, the distance between the mobile terminal and the smart wearable device can be obtained through GPS positioning, etc., and the distance between the mobile terminal and the smart wearable device can also be obtained through ultrasonic sensor technology. The embodiment of the present invention does not limit the manner of obtaining the distance between the mobile terminal and the smart wearable device, as long as the distance between the mobile terminal and the smart wearable device can be accurately obtained.
[0023] Exemplarily, before obtaining the distance between the mobile terminal and the smart wearable device, it also includes: binding the mobile terminal to the smart wearable device, the specific binding method may be through wireless transmission methods such as bluetooth or wifi, by The mobile terminal sends a binding message to the smart wearable device, and the smart wearable device only needs to confirm.
[0024] Step 120, determine whether the distance between the mobile terminal and the smart wearable device is greater than a preset distance, if so, hide the preset application program in the mobile terminal, otherwise display the preset application program on the mobile terminal program.
[0025] Wherein, the preset distance may be a value set by the user according to his specific situation when turning on the full control mode of the mobile terminal. For example, if the mobile terminal is a smart phone and the smart wearable device is a smart bracelet, the preset distance may be 0.5 meters; if the mobile terminal is a smart phone, when the smart wearable device is smart glasses , the preset distance may be 0.7 meters, and if the smart wearable device is a shoe, the preset distance may be 1.5 meters or the like.
[0026] When the distance between the mobile terminal and the smart wearable device is greater than the preset distance, it means that the user is no longer near the mobile terminal. At this time, if the mobile terminal is used by others, the privacy of the user may be leaked. Therefore, in this embodiment, by judging whether the distance between the mobile terminal and the smart wearable device is greater than a preset distance, it is known whether the user's mobile terminal is located beside the user. When the distance between the mobile terminal and the smart wearable device is greater than the preset distance, the preset application program in the mobile terminal is hidden. The preset application program refers to an application program that the user does not want others to see. After the preset application program is hidden, the icon of the preset application program will not be displayed on the display screen of the mobile terminal. At this time, other people except the user can not see the preset application program even if they use the mobile terminal. preset application. Therefore, some information that the user wants to keep secret will not be leaked through the mobile terminal. When it is detected at a certain moment that the distance between the mobile terminal and the smart wearable device is less than or equal to the preset distance, the hidden preset application will be displayed on the display screen of the mobile terminal again, which is convenient for the user to Management and operation of preset applications.
[0027] For example, the last thing many users who work in the marketing business want to experience is that a customer they have maintained for a long time is poached by their colleagues, but communication with colleagues is indispensable in their daily work, so it is very necessary For example, instant messaging software such as call records, text messages, WeChat, and QQ, etc., when the user wears a smart wearable device, the distance between the mobile terminal and the smart wearable device can be monitored. Set the hidden function of the application. When the distance between the mobile terminal and the smart wearable device is detected to be greater than the preset distance, the call records, SMS, WeChat, QQ and other instant messaging software will be hidden, so that even if others use their own mobile terminal , the default application you set will not be seen by others. For example, for users who like shopping, various online shopping clients will be installed on their mobile terminals, and personal information such as various shopping account numbers, payment account numbers, and consignee addresses are stored. In order to prevent these personal information and personal property information from being leaked out, it can also be realized by the above method. When the distance between the mobile terminal and the smart wearable device is detected to be greater than the preset distance, various shopping accounts will be saved. The application of personal information such as payment account number and consignee address is hidden.
[0028] In the mobile terminal security control method provided in this embodiment, by setting the security control mode on the mobile terminal, when the security control mode is turned on, judging the distance between the mobile terminal and the smart wearable device, when the distance is greater than the preset distance , the preset application program in the mobile terminal is hidden, otherwise the preset application program is displayed on the mobile terminal, which improves the confidentiality of the mobile terminal to the user's relevant information, avoids the leakage of relevant information, and improves security of mobile terminals.

Example Embodiment

[0029] Embodiment two
[0030] figure 2 It is a flow chart of a mobile terminal security control method provided by Embodiment 2 of the present invention. This embodiment is a further optimization of the above embodiment. The difference from the above embodiment is that before the security control mode is turned on, the setting described The login password of the security control mode, the benefit of setting this way is to prevent other people except the user from closing the security control mode of the mobile terminal, so that the relevant information of the user is leaked through the mobile terminal. see figure 2 , the method specifically includes the following:
[0031] Step 210, setting the login password of the security control mode.
[0032] Before the security control mode is opened, the login password of the security control mode is set. This operation can be to increase the switch of the security control mode in the application setting interface of the mobile terminal, which is used to open or close the security control function of the mobile terminal. In order to realize For security purposes, it is necessary to set a login password for the security control mode, and the password may be a number, or a combination of numbers and letters. You can enter the login password every time you turn on the security control mode, or you can not enter it. However, when closing the security control mode each time, in order to ensure that it is the true will of the mobile terminal user, preferably, when obtaining the command to close the security control mode, output a login password input command for prompting the user to enter the password of the security control mode. login password, and after the user enters the login password of the full control mode, close the security control mode.
[0033] The purpose of such setting is to prevent others from intentionally stealing the relevant information of the user through the mobile terminal. If you want to close the security control mode of the mobile terminal, you must input the login password to realize the closing function, which further enhances the security of the mobile terminal.
[0034] Step 220, when the security control mode is turned on, obtain the distance between the mobile terminal and the smart wearable device;
[0035] Step 230, determine whether the distance between the mobile terminal and the smart wearable device is greater than a preset distance, if so, hide the preset application program in the mobile terminal, otherwise display the preset application program on the mobile terminal program.
[0036] In the mobile terminal security control method provided in this embodiment, by setting the login password of the security control mode, when you want to close the security control mode, you need to enter the login password to close it, so as to ensure that it is the user's true will , rather than other people's deliberate actions, which further ensures that even if the mobile terminal is used by other people who are not familiar with it, others cannot obtain sensitive information such as personal data about the user in the mobile terminal, thereby improving the security of the mobile terminal.

Example Embodiment

[0037] Embodiment Three
[0038] image 3 It is a flow chart of a mobile terminal security control method provided in Embodiment 3 of the present invention. Compared with the mobile terminal security control method provided in Embodiment 1, this method adds the preset application controlled by the management of the security control mode The advantage of this setting is that it is convenient for users to set preset applications. see image 3 , the method specifically includes the following:
[0039] Step 310, manage the preset application programs controlled by the security control mode.
[0040] This step can be set when the user turns on the security control mode of the mobile terminal. When the user turns on the security control mode, the system will pop up a window for setting the security control application for the user to select the corresponding application program, or put the existing one under security control The application of the mode is deleted. An independent operation button can also be set on the application setting interface of the mobile terminal to manage the preset application programs controlled by the security control mode. The preset application program controlled by the control mode can not be managed only when the security control mode of the mobile terminal is turned on. For example, the user can manage the preset application program controlled by the security control mode in leisure time after work manage. For example, the current security control mode of the mobile terminal is in the open state. At this time, a new electronic wallet application is installed in the user's mobile terminal, which needs to be added to the preset application programs controlled by the security control mode. Add the preset applications controlled by the safety control mode through the independent operation button mentioned above.
[0041] The application program may be some application clients including the user's bank account, payment account number and shopping account information.
[0042] Step 320, when the security control mode is turned on, obtain the distance between the mobile terminal and the smart wearable device;
[0043] Step 330, determine whether the distance between the mobile terminal and the smart wearable device is greater than a preset distance, if so, hide the preset application program in the mobile terminal, otherwise display the preset application program on the mobile terminal program.
[0044] A security control method for a mobile terminal provided in this embodiment facilitates the user to add or delete a preset application program by increasing the operation of managing the preset application program controlled by the security control mode, and improves the security of the mobile terminal. safety.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Malicious website prompt method and router

ActiveCN104125209Aimprove security
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Credible virtual machine platform

InactiveCN101957900AImprove stability and attack resistanceimprove security
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Intelligent door lock identity authentication method and system, readable storage medium and mobile terminal

ActiveCN109712278APrevent Identity Leakageimprove security
Owner:深圳市小石安防科技有限公司

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products