Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the invention is realized referring now to Description of Drawings.In follow-up description, use
For represent element such as " module ", " part " or " unit " suffix only for being conducive to explanation of the invention, itself
Not specific meaning.Therefore, " module " can be used mixedly with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP
The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated
Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement
Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is that the hardware configuration of the mobile terminal for realizing each embodiment of the invention is illustrated.
Mobile terminal 1 00 can include wireless communication unit 110, A/V (audio/video) input block 120, user input
Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190
Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups for showing
Part.More or less component can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 1 00 and wireless communication system
Or the radio communication between network.For example, wireless communication unit can include broadcasting reception module 111, mobile communication module
112nd, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server
Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent
The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information
And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting
Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 is received.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of DMB (DMB)
The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast
Receiver module 111 can receive signal and broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111
Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video
Broadcast-hand-held (DVB-H), Radio Data System, the received terrestrial digital broadcasting integrated service of forward link media (MediaFLO@)
Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/
Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice
Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant
Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module
Typical case be GPS (global positioning system).According to current technology, GPS module 115 is calculated and comes from three or more satellites
Range information and correct time information and the Information application triangulation for calculating, so as to according to longitude, latitude
Highly accurately calculate three-dimensional current location information.Currently, defended using three for calculating the method for position and temporal information
Star and the position that is calculated by using other satellite correction and the error of temporal information.Additionally, GPS module 115
Can be by Continuous plus current location information in real time come calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121
Microphone 122, the static images that 121 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus
Or the view data of video is processed.Picture frame after treatment may be displayed on display unit 151.Processed through camera 121
Picture frame afterwards can be stored in memory 160 (or other storage mediums) or sent out via wireless communication unit 110
Send, two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone calling model, note
Sound (voice data) is received via microphone in record pattern, speech recognition mode etc. operational mode, and can be by so
Acoustic processing be voice data.Audio (voice) data after treatment can be converted in the case of telephone calling model can
The form for being sent to mobile communication base station via mobile communication module 112 is exported.Microphone 122 can implement various types of making an uproar
Sound eliminates (or suppression) algorithm to eliminate the noise or dry that (or suppression) produces during reception and transmission audio signal
Disturb.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user input
Plant operation.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, touch
Plate (for example, detection due to being touched caused by resistance, pressure, electric capacity etc. change sensitive component), roller, rocking bar etc.
Deng.Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, (for example, mobile terminal 1 00 opens or closes shape
State), the presence or absence of the contact (that is, touch input) of the position of mobile terminal 1 00, user for mobile terminal 1 00, mobile terminal
The acceleration or deceleration movement of 100 orientation, mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00
The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed
The sliding-type phone is opened or closed.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or
Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 can will be combined below including proximity transducer 141
Touch-screen is described to this.
Interface unit 170 is connected the interface that can pass through with mobile terminal 1 00 as at least one external device (ED).For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user
Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included
Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know
Other device can be connected via port or other attachment means with mobile terminal 1 00.Interface unit 170 can be used for reception and come from
The input (for example, data message, electric power etc.) of the external device (ED) and input that will be received is transferred in mobile terminal 1 00
One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity
Power provides to the path of mobile terminal 1 00 from base or can serve as allowing the various command signals being input into from base to pass through it
It is transferred to the path of mobile terminal.Be can serve as recognizing that mobile terminal is from the various command signals or electric power of base input
The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio and/or tactile manner
Go out signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include display
Unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity
During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file
Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern
Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, show video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit
151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
It is a kind of.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
Desired implementation method, mobile terminal 1 00 can include two or more display units (or other display devices), for example, moving
Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect touch
Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal reception pattern, call mode, logging mode,
It is that wireless communication unit 110 is received or in memory 160 when under the isotypes such as speech recognition mode, broadcast reception mode
The voice data transducing audio signal of middle storage and it is output as sound.And, dio Output Modules 152 can be provided and movement
The audio output (for example, call signal receives sound, message sink sound etc.) of the specific function correlation that terminal 100 is performed.
Dio Output Modules 152 can include loudspeaker, buzzer etc..
Alarm unit 153 can provide output and be notified to mobile terminal 1 00 with by event.Typical event can be with
Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit
153 can in a different manner provide output with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating
Output is provided, when calling, message or some other entrance communication (incomingcommunication) are received, alarm list
Unit 153 can provide tactile output (that is, vibrating) to notify to user.Exported by providing such tactile, even if
When in pocket of the mobile phone of user in user, user also can recognize that the generation of various events.Alarm unit 153
The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.
Memory 160 can store software program for the treatment and control operation performed by controller 180 etc., Huo Zheke
Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And
And, memory 160 can store the vibration of various modes on being exported when touching and being applied to touch-screen and audio signal
Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many
Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection
The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data
Communication, video calling etc. related control and treatment.In addition, controller 180 can be included for reproducing (or playback) many matchmakers
The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or can be structured as and control
Device 180 is separated.Controller 180 can be with execution pattern identifying processing, the handwriting input that will be performed on the touchscreen or picture
Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Appropriate electric power needed for part and component.
Various implementation methods described herein can be with use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implemented.Implement for hardware, implementation method described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein
At least one in electronic unit is implemented, and in some cases, such implementation method can be implemented in controller 180.
For software implementation, the implementation method of such as process or function can with allow to perform the single of at least one function or operation
Software module is implemented.Software code can be come by the software application (or program) write with any appropriate programming language
Implement, software code can be stored in memory 160 and performed by controller 180.
So far, oneself according to its function through describing mobile terminal.Below, for the sake of brevity, will description such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is used as showing
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 1 00 as shown in Figure 1 may be constructed such that using via frame or packet transmission data it is all if any
Line and wireless communication system and satellite-based communication system are operated.
First embodiment of the invention, a kind of information protecting method, as shown in figures 2-3, including step in detail below:
Step S101, mobile terminal detects the biometric feature of user.
Wherein, user biological identification feature at least includes one below:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known
Other feature.
The biometric feature of mobile terminal detection user is prior art, be will not be described here.
Step S102, mobile terminal is based on the biometric feature of the user for detecting, and presentation user is corresponding to be allowed to make
Application program;
Specifically, step S102, including:
Mobile terminal is based on the biometric feature of the user for detecting, and hides the corresponding application journey for prohibitting the use of of user
Sequence, the corresponding application program for allowing to use of presentation user.
For example:As shown in Fig. 2 mobile terminal is based on the mobile phone that the fingerprint sensor at mobile terminal back is detected
The fingerprint of main child, hides corresponding various game, bank application and the payment for prohibitting the use of of child owner in Fig. 2 square frames
The application programs such as treasured;The corresponding educational application program of mobile terminal child owner is presented.
The application programs such as the various game of mobile terminal child owner addiction can effectively be avoided;And can effectively keep away
Exempt from mobile terminal child owner due to being propped up caused by the internet payment application program such as maloperation bank application and Alipay
The behavior of paying;Child is encouraged to use educational application program;While having cultivated child's good habits and customs, movement is effectively protected
The financial security of terminal owner.
Step S103, mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with user
The right of using functions of the corresponding application program for allowing to use, provides the user the corresponding work(of the application program for allowing to use
Energy.
Specifically, step S103, including:
Mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user
The right of using functions of the application program for using, provides the user whole corresponding functions or the part of the application program for allowing to use
Corresponding function.
For example:Mobile terminal is based on the client iris of the borrow mobile terminal user for detecting, according to being pre-configured with borrow
The right of using functions of the corresponding application program for allowing to use of mobile terminal user, permission is provided to borrow mobile terminal user
Whole corresponding functions or wechat program circle of friends function of the voice call for using, and it is micro- to forbid borrow mobile terminal user to use
The other functions of letter program.Can effectively avoid immobile terminal owner user from borrowing temporarily when mobile terminal is used and usurp machine
Main wechat payment function is paid, and is effectively protected the safety of payment of mobile terminal owner.Meanwhile, it is capable to effectively keep away
Exempt from immobile terminal owner user and borrow the instant communication message that mobile terminal owner is peeped when mobile terminal is used temporarily, and/
Or message is sent to the contact person in wechat by the wechat of mobile terminal owner malice, it is effectively protected mobile terminal owner
Individual privacy and information security.
And for example:Mobile terminal is based on the user fingerprints of the borrow mobile terminal user for detecting, according to being pre-configured with borrow
The access right of the corresponding application program for allowing to use of mobile terminal user, allows to use for borrow mobile terminal user provides
Voice call whole corresponding functions or the look facility of stock application program, and forbid borrow mobile terminal user use stock
The Stock Trading function of ticket application program.Can effectively avoid immobile terminal owner user from borrowing mobile terminal temporarily to use
When usurp the stock application program of owner and carry out Stock Trading, be effectively protected the property safety of mobile terminal owner.
Second embodiment of the invention, a kind of information protecting method, as shown in figure 4, including step in detail below:
Step S201, mobile terminal detects the biometric feature of user.
Wherein, user biological identification feature at least includes one below:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known
Other feature.
The biometric feature of mobile terminal detection user is prior art, be will not be described here.
Step S202, mobile terminal is based on the biometric feature of the user for detecting, and presentation user is corresponding to be allowed to make
Application program;
Specifically, step S202, including:
Mobile terminal is based on the biometric feature of the user for detecting, and hides the corresponding application journey for prohibitting the use of of user
Sequence, the corresponding application program for allowing to use of presentation user.
For example:The finger of mobile terminal child owner that the fingerprint sensor that mobile terminal is based on mobile terminal back is detected
Line, hides the application programs such as corresponding various game, bank application and the Alipay for prohibitting the use of of child owner;Present and move
Move the corresponding educational application program of terminal child owner.
The application programs such as the various game of mobile terminal child owner addiction can effectively be avoided;And can effectively keep away
Exempt from mobile terminal child owner due to being propped up caused by the internet payment application program such as maloperation bank application and Alipay
The behavior of paying;Child is encouraged to use educational application program;While having cultivated child's good habits and customs, movement is effectively protected
The financial security of terminal owner.
Step S203, mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with user
The right of using functions of the corresponding application program for allowing to use, provides the user the corresponding work(of the application program for allowing to use
Energy.
Specifically, step S203, including:
Mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user
The right of using functions of the application program for using, provides the user whole corresponding functions or the part of the application program for allowing to use
Corresponding function.
For example:Mobile terminal is based on the client iris of the borrow mobile terminal user for detecting, according to being pre-configured with borrow
The right of using functions of the corresponding application program for allowing to use of mobile terminal user, permission is provided to borrow mobile terminal user
Whole corresponding functions or wechat program circle of friends function of the voice call for using, and it is micro- to forbid borrow mobile terminal user to use
The other functions of letter program.Can effectively avoid immobile terminal owner user from borrowing temporarily when mobile terminal is used and usurp machine
Main wechat payment function is paid, and is effectively protected the safety of payment of mobile terminal owner.Meanwhile, it is capable to effectively keep away
Exempt from immobile terminal owner user and borrow the instant communication message that mobile terminal owner is peeped when mobile terminal is used temporarily, and/
Or message is sent to the contact person in wechat by the wechat of mobile terminal owner malice, it is effectively protected mobile terminal owner
Individual privacy and information security.
And for example:Mobile terminal is based on the user fingerprints of the borrow mobile terminal user for detecting, according to being pre-configured with borrow
The access right of the corresponding application program for allowing to use of mobile terminal user, allows to use for borrow mobile terminal user provides
Voice call whole corresponding functions or the look facility of stock application program, and forbid borrow mobile terminal user use stock
The Stock Trading function of ticket application program.Can effectively avoid immobile terminal owner user from borrowing mobile terminal temporarily to use
When usurp the stock application program of owner and carry out Stock Trading, be effectively protected the property safety of mobile terminal owner.
Step S204, mobile terminal stores the application program usage record of user on backstage, and provides use to setting user
The application program usage record at family.
Specifically, step S204, including:
After corresponding function of the user using the application program for allowing to use, mobile terminal should backstage storage user's
Program usage record is used, and the application program usage record of user is provided to setting user.
Setting user can be the other users of owner, or mobile terminal the owner setting of mobile terminal.
For example:Borrowing repertoire and wechat of the mobile terminal user using the voice call application program for allowing to use
After program circle of friends function, mobile terminal backstage storage borrow mobile terminal user application program usage record, and to
Mobile terminal owner provides the application program usage record for borrowing mobile terminal user.
It is capable of the user of prompting mobile terminal owner borrow mobile terminal using the situation of application program, such as by voice
Talk application program malicious call 110 or 119 is expected someone's call;Or malice replys wechat program circle of friends.
And for example:After repertoire of child owner using the game application for allowing to use, mobile terminal is rear
Platform stores the application program usage record of child owner, and uses note to the application program that mobile terminal owner provides child owner
Record.
Parent can be helped effectively to monitor the time of child play game, and play game playing habits, child can be helped to set up
Good habits and customs.
Step S205, if user revises information in the application program for allowing to use, the setting user's for detecting
During biometric feature, mobile terminal recovers the information that user revises.
Specifically, step S205, including:
If user modification or deletion information in the application program for obtaining access right, mobile terminal are stored on backstage and used
Family modification or the information before deleting in the application program for obtaining access right, and know in the biological of the setting user for detecting
During other feature, recover user modification or the information deleted in the application program for obtaining access right.
For example:If borrowing mobile terminal user malicious modification or to be deleted in the instant messaging application program for obtaining access right
Except information, then mobile terminal borrows mobile terminal user in the instant messaging application program for obtaining access right in backstage storage
Information before modification or deletion, and in the biometric feature of the owner for detecting, recover borrow mobile terminal user and exist
Obtain the information of modification or deletion in the instant messaging application program of access right.It is effectively protected information security.
And for example:If child owner changes unintentionally or deletes letter in the instant messaging application program for obtaining access right
Cease, then mobile terminal is changed in the instant messaging application program for obtaining access right in backstage storage child owner or deletes it
Preceding information, and in the biometric feature of the owner for detecting, recover child owner and obtaining the IMU of access right
Modification or the information deleted in news application program.It is effectively protected the information security of owner.
Step S206, mobile terminal forbids user to use the corresponding of the application program for allowing to use after the duration of setting
Function.
For example:After repertoire of child owner using the game application for allowing to use, mobile terminal is setting
Fixed duration forbids child owner to use the repertoire of the game application for allowing to use for 30 minutes afterwards.
The time that parent can be helped effectively to control child play to play, and game playing habits are played, child can be helped to set up
Good habits and customs.
Third embodiment of the invention, it is corresponding with first embodiment, as shown in figure 5, the present embodiment introduces a kind of information protection
Device, including consisting of part:
Detection module 161, the biometric feature for detecting user.
Wherein, user biological identification feature at least includes one below:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known
Other feature.
The biometric feature of mobile terminal detection user is prior art, be will not be described here.
First protection module 162, for the biometric feature based on the user for detecting, the corresponding permission of presentation user
The application program for using;
Specifically, the first protection module 162, is used for:
Mobile terminal is based on the biometric feature of the user for detecting, and hides the corresponding application journey for prohibitting the use of of user
Sequence, the corresponding application program for allowing to use of presentation user.
For example:The finger of mobile terminal child owner that the fingerprint sensor that mobile terminal is based on mobile terminal back is detected
Line, hides the application programs such as corresponding various game, bank application and the Alipay for prohibitting the use of of child owner;Present and move
Move the corresponding educational application program of terminal child owner.
The application programs such as the various game of mobile terminal child owner addiction can effectively be avoided;And can effectively keep away
Exempt from mobile terminal child owner due to being propped up caused by the internet payment application program such as maloperation bank application and Alipay
The behavior of paying;Child is encouraged to use educational application program;While having cultivated child's good habits and customs, movement is effectively protected
The financial security of terminal owner.
Second protection module 163, for when user is detected in the application program that triggering is presented, according to being pre-configured with use
The right of using functions of the corresponding application program for allowing to use in family, provides the user the corresponding work(of the application program for allowing to use
Energy.
Specifically, the second protection module 163, is used for:
Mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user
The right of using functions of the application program for using, provides the user whole corresponding functions or the part of the application program for allowing to use
Corresponding function.
For example:Second protection module 163, for based on detect borrow mobile terminal user client iris, according to
The right of using functions for borrowing the corresponding application program for allowing to use of mobile terminal user is pre-configured with, to borrow mobile terminal
User provides whole corresponding functions or wechat program circle of friends function of the voice call for allowing to use, and forbids borrowing mobile whole
End subscriber uses the other functions of wechat program.Immobile terminal owner user can be effectively avoided to borrow mobile terminal temporarily
The wechat payment function that owner is usurped when using is paid, and is effectively protected the safety of payment of mobile terminal owner.Meanwhile,
Can effectively avoid immobile terminal owner user from borrowing temporarily when mobile terminal is used and peep the instant of mobile terminal owner
Communication information, and/or message is sent to the contact person in wechat by the wechat of mobile terminal owner malice, it is effectively protected
The individual privacy and information security of mobile terminal owner.
And for example:Second protection module 163, for based on detect borrow mobile terminal user user fingerprints, according to
The access right for borrowing the corresponding application program for allowing to use of mobile terminal user is pre-configured with, to borrow mobile terminal user
Offer allows whole corresponding functions or the look facility of stock application program of the voice call for using, and forbids borrowing mobile whole
End subscriber uses the Stock Trading function of stock application program.Immobile terminal owner user can be effectively avoided to borrow temporarily
The stock application program that owner is usurped when mobile terminal is used carries out Stock Trading, is effectively protected the wealth of mobile terminal owner
Produce safety.
Fourth embodiment of the invention, corresponding with second embodiment, the present embodiment introduces a kind of information protection device, such as Fig. 4
It is shown, including consisting of part:
Detection module 161, the biometric feature for detecting user.
Wherein, user biological identification feature at least includes one below:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known
Other feature.
The biometric feature of mobile terminal detection user is prior art, be will not be described here.
First protection module 162, for the biometric feature based on the user for detecting, the corresponding permission of presentation user
The application program for using;
Specifically, the first protection module 162, is used for:
Mobile terminal is based on the biometric feature of the user for detecting, and hides the corresponding application journey for prohibitting the use of of user
Sequence, the corresponding application program for allowing to use of presentation user.
For example:The finger of mobile terminal child owner that the fingerprint sensor that mobile terminal is based on mobile terminal back is detected
Line, hides the application programs such as corresponding various game, bank application and the Alipay for prohibitting the use of of child owner;Present and move
Move the corresponding educational application program of terminal child owner.
The application programs such as the various game of mobile terminal child owner addiction can effectively be avoided;And can effectively keep away
Exempt from mobile terminal child owner due to being propped up caused by the internet payment application program such as maloperation bank application and Alipay
The behavior of paying;Child is encouraged to use educational application program;While having cultivated child's good habits and customs, movement is effectively protected
The financial security of terminal owner.
Second protection module 163, for when user is detected in the application program that triggering is presented, according to being pre-configured with use
The right of using functions of the corresponding application program for allowing to use in family, provides the user the corresponding work(of the application program for allowing to use
Energy.
Specifically, the second protection module 163, is used for:
Mobile terminal when user is detected in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user
The right of using functions of the application program for using, provides the user whole corresponding functions or the part of the application program for allowing to use
Corresponding function.
For example:Second protection module 163, for based on detect borrow mobile terminal user client iris, according to
The right of using functions for borrowing the corresponding application program for allowing to use of mobile terminal user is pre-configured with, to borrow mobile terminal
User provides whole corresponding functions or wechat program circle of friends function of the voice call for allowing to use, and forbids borrowing mobile whole
End subscriber uses the other functions of wechat program.Immobile terminal owner user can be effectively avoided to borrow mobile terminal temporarily
The wechat payment function that owner is usurped when using is paid, and is effectively protected the safety of payment of mobile terminal owner.Meanwhile,
Can effectively avoid immobile terminal owner user from borrowing temporarily when mobile terminal is used and peep the instant of mobile terminal owner
Communication information, and/or message is sent to the contact person in wechat by the wechat of mobile terminal owner malice, it is effectively protected
The individual privacy and information security of mobile terminal owner.
And for example:Second protection module 163, for based on detect borrow mobile terminal user user fingerprints, according to
The access right for borrowing the corresponding application program for allowing to use of mobile terminal user is pre-configured with, to borrow mobile terminal user
Offer allows whole corresponding functions or the look facility of stock application program of the voice call for using, and forbids borrowing mobile whole
End subscriber uses the Stock Trading function of stock application program.Immobile terminal owner user can be effectively avoided to borrow temporarily
The stock application program that owner is usurped when mobile terminal is used carries out Stock Trading, is effectively protected the wealth of mobile terminal owner
Produce safety.
Logging modle 164, the application program usage record for storing user on backstage, and provide user to setting user
Application program usage record.
Specifically, logging modle 164, is used for:
After corresponding function of the user using the application program for allowing to use, mobile terminal should backstage storage user's
Program usage record is used, and the application program usage record of user is provided to setting user.
Setting user can be the other users of owner, or mobile terminal the owner setting of mobile terminal.
For example:Logging modle 164, for using the voice call application program for allowing to use in borrow mobile terminal user
Repertoire and wechat program circle of friends function after, mobile terminal backstage storage borrow mobile terminal user application journey
Sequence usage record, and the application program usage record for borrowing mobile terminal user is provided to mobile terminal owner.
It is capable of the user of prompting mobile terminal owner borrow mobile terminal using the situation of application program, such as by voice
Talk application program malicious call 110 or 119 is expected someone's call;Or malice replys wechat program circle of friends.
And for example:Logging modle 164, for child owner using the game application for allowing to use repertoire it
Afterwards, mobile terminal stores the application program usage record of child owner on backstage, and provides child owner to mobile terminal owner
Application program usage record.
Parent can be helped effectively to monitor the time of child play game, and play game playing habits, child can be helped to set up
Good habits and customs.
Recovery module 165, if revising information in the application program for allowing to use for user, in the setting for detecting
During the biometric feature of user, recover the information that user revises.
Specifically, recovery module 165, is used for:
If user modification or deletion information in the application program for obtaining access right, mobile terminal are stored on backstage and used
Family modification or the information before deleting in the application program for obtaining access right, and know in the biological of the setting user for detecting
During other feature, recover user modification or the information deleted in the application program for obtaining access right.
For example:Recovery module 165, if obtaining the instant messaging application journey of access right for borrowing mobile terminal user
In sequence malicious modification or delete information, then mobile terminal backstage storage borrow mobile terminal user obtain access right i.e.
When messaging application in modification or the information before deleting, and in the biometric feature of the owner for detecting, recover to borrow
With the information of mobile terminal user's modification or deletion in the instant messaging application program for obtaining access right.It is effectively protected
Information security.
And for example:Recovery module 165, if being not intended in the instant messaging application program for obtaining access right for child owner
Information is deleted in middle modification, then mobile terminal is obtaining the instant messaging application program of access right in backstage storage child owner
Information before middle modification or deletion, and in the biometric feature of the owner for detecting, recovering child owner is made
With the information changed in the instant messaging application program of authority or delete.It is effectively protected the information security of owner.
Closedown module 166, for forbidding user to use the corresponding of the application program for allowing to use after the duration of setting
Function.
For example:Closedown module 166, for child owner using the game application for allowing to use repertoire it
Afterwards, the duration in setting forbids child owner to use the repertoire of the game application for allowing to use for 30 minutes afterwards.
The time that parent can be helped effectively to control child play to play, and game playing habits are played, child can be helped to set up
Good habits and customs.
It should be noted that herein, term " including ", "comprising" or its any other variant be intended to non-row
His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and
And also include other key elements being not expressly set out, or also include for this process, method, article or device institute are intrinsic
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably implementation method.Based on such understanding, technical scheme is substantially done to prior art in other words
The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used to so that a station terminal equipment (can be mobile phone, computer, clothes
Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair
Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.