Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal equipment security control method, device and terminal equipment

A technology of terminal equipment and control method, applied in the field of terminal equipment security control and terminal equipment, can solve problems such as privacy leakage, and achieve the effect of enhancing security and avoiding interference

Active Publication Date: 2020-01-10
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this security control method has certain limitations.
When illegal users steal digital passwords or pattern passwords, they can unlock terminal devices, resulting in privacy leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal equipment security control method, device and terminal equipment
  • Terminal equipment security control method, device and terminal equipment
  • Terminal equipment security control method, device and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0039] The terminal equipment security control method, device and terminal equipment according to the embodiments of the present invention are described below with reference to the accompanying drawings.

[0040] figure 1 It is a flow chart of a terminal device security control method provided according to an embodiment of the present invention, as shown in figure 1 As shown, the method includes:

[0041] Step 101, when the terminal device is successfully unlocked, control the terminal device from a locked state to an unlocked ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for controlling safety of terminal equipment, and the terminal equipment. The method comprises the steps of controlling the terminal equipment to enter an unlocking state from a locking state when unlocking is successful through the terminal equipment; then collecting biological characteristics of a user in the unlocking state; carrying out identity verification according to the biological characteristics; if passing through the verification, controlling the terminal equipment to be in the unlocking state continuously; and if not passing through the verification, controlling the terminal equipment to enter the locking state. According to the method and the device for controlling safety of the terminal equipment and the terminal equipment, the identity verification is carried out again in the use process of the terminal equipment, thus the safety is enhanced, meanwhile as the identity verification is carried out in the manner of biological characteristics, the identity verification process is prevented from interfering with the use process of the user.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a terminal equipment security control method, device and terminal equipment. Background technique [0002] In consideration of the security of terminal equipment such as mobile terminals, at present, most terminal equipment have been equipped with digital passwords, pattern passwords, fingerprints, etc. Authentication. When the password or fingerprint provided by the user matches the pre-stored information, the user is allowed to use the terminal device. And when there is an error in fingerprint matching, digital password or pattern password can also be used for identity verification. [0003] However, this security control method has certain limitations. When an illegal user steals a digital password or a pattern password, the terminal device can be unlocked, resulting in a privacy leak. Contents of the invention [0004] The object of the present inventio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 周意保张海平
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD