Unlock instant, AI-driven research and patent intelligence for your innovation.

A locking method and device for a mobile terminal

A mobile terminal and custom technology, applied in the field of locking methods and devices for mobile terminals, can solve the problems of low security, easy duplication and leakage, user security risks, etc., and achieve the effect of improving security

Active Publication Date: 2021-04-16
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, mobile terminals are becoming more and more popular, and their functions are becoming more and more powerful. More and more important information is stored on mobile terminals. Once the mobile terminal is lost and picked up by others or stolen, the user will face very serious Security Risk
[0003] In order to improve the security of mobile terminals, password-based security authentication methods are usually used in the prior art, but there is a big hidden danger in this static authentication information, that is, it is very easy to copy and leak, so the security is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A locking method and device for a mobile terminal
  • A locking method and device for a mobile terminal
  • A locking method and device for a mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] figure 1 It is a flow chart of an embodiment of the method for determining the user's speech habit characteristics in different subject scenarios according to the present invention, as shown in figure 1 As shown, the following specific implementation methods are included.

[0050] In step 11, collect voice call data as a sample, and determine different theme scenes that appear during the call process and voice habit characteristics under each theme scene by performing statistical analysis on the collected voice call data.

[0051] When each voice call of the user ends, the mobile terminal can save the data of this voice call as a sample, and by performing semantic analysis on the collected voice call data as a sample, etc., the information of each voice call of the user can be obtained. The thematic scenes involved, such as: "Appoint a meal", "Ask for help", "Watch a movie", "Greet greetings", "Work matters", "Farewell" and so on.

[0052] In addition, voice habit cha...

Embodiment 2

[0066] In this embodiment, the reliability of the user identity can be judged by the "suspicious degree", and when the suspicious degree is high enough, the mobile terminal is locked.

[0067] figure 2 It is a flow chart of an embodiment of the locking method of the mobile terminal according to the present invention, such as figure 2 As shown, the following specific implementation methods are included.

[0068] In 21, when the voice call based on the mobile terminal ends, the subject scene and voice habit features of the call are determined.

[0069] After each voice call of the user ends, the subject scene of the call and the voice habit characteristics of the call can be determined by performing semantic analysis and speech recognition on the voice call data of the call.

[0070] In step 22, if the speech habit features corresponding to the subject scene of the current call are saved, the degree of matching between the saved speech habit features and the speech habit fea...

Embodiment 3

[0103] image 3 It is a schematic diagram of the composition and structure of the embodiment of the locking device of the mobile terminal according to the present invention, such as image 3 As shown, it includes: a security authentication module 31 and a locking module 32 .

[0104] The security authentication module 31 is used to determine the theme scene and the voice habit feature of this call when the voice call based on the mobile terminal ends; if the voice habit feature corresponding to the theme scene of this call is saved, then calculate the preserved The matching degree of the speech habit feature and the determined speech habit feature; if the matching degree is less than the first threshold, then determine the suspiciousness accumulation value corresponding to the matching degree, and calculate the sum of the original suspiciousness and the suspiciousness accumulation value, The updated suspiciousness is obtained; if the updated suspiciousness is greater than the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for locking a mobile terminal. The method includes: when a voice call based on a mobile terminal ends, determining the theme scene and voice habit features of the call; phonetic habit feature, then calculate the matching degree between the saved phonetic habit feature and the determined phonetic habit feature; if the matching degree is less than the first threshold, then determine the suspiciousness cumulative value corresponding to the matching degree, and calculate the original The sum of the suspicious degree and the accumulated value of the suspicious degree is used to obtain the updated suspicious degree; if the updated suspicious degree is greater than the second threshold, the mobile terminal is locked. By applying the scheme of the invention, the security of the mobile terminal can be improved.

Description

【Technical field】 [0001] The invention relates to mobile terminal technology, in particular to a mobile terminal locking method and device. 【Background technique】 [0002] At present, mobile terminals are becoming more and more popular, and their functions are becoming more and more powerful. More and more important information is stored on mobile terminals. Once the mobile terminal is lost and picked up by others or stolen, the user will face very serious Security Risk. [0003] In order to improve the security of mobile terminals, password-based security authentication methods are usually used in the prior art, but there is a big hidden danger in this static authentication information, that is, it is very easy to copy and leak, so the security is very low. 【Content of invention】 [0004] The invention provides a mobile terminal locking method and device, which can improve the security of the mobile terminal. [0005] The specific technical scheme is as follows: [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/316
Inventor 聂晓萌
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD