Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the present invention is realized in description with reference to the drawings.In subsequent description, use
For indicate element such as " module ", " component " or " unit " suffix only for being conducive to explanation of the invention, itself
There is no specific meanings.Therefore, " module " can be used mixedly with " component ".
Mobile terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as moving
Phone, smart phone, laptop, digit broadcasting receiver, PDA (personal digital assistant), PAD (tablet computer), PMP
The mobile terminal of (portable media player), navigation device etc. and such as number TV, desktop computer etc. are consolidated
Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that in addition to being used in particular for moving
Except the element of purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Fig. 1 to realize the present invention the mobile terminal of each embodiment hardware configuration signal.
Mobile terminal 100 may include wireless communication unit 110, A/V (audio/video) input unit 120, user's input
Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power supply unit 190
Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups shown
Part.More or fewer components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more components, allows mobile terminal 100 and wireless communication system
Or the radio communication between network.For example, wireless communication unit may include broadcasting reception module 111, mobile communication module
112, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel
Relevant information.Broadcast channel may include satellite channel and/or terrestrial channel.Broadcast management server, which can be, to be generated and sent
The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information
And send it to the server of terminal.Broadcast singal may include TV broadcast singal, radio signals, data broadcasting
Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 receives.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of digital multimedia broadcasting (DMB)
Program guide (EPG), digital video broadcast-handheld (DVB-H) electronic service guidebooks (ESG) etc. form and exist.Broadcast
Receiving module 111 can receive signal broadcast by using various types of broadcast systems.Particularly, broadcasting reception module 111
It can be wide by using such as multimedia broadcasting-ground (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video
It broadcasts-holds (DVB-H), the Radio Data System of forward link media (MediaFLO@), received terrestrial digital broadcasting integrated service
(ISDB-T) etc. digit broadcasting system receives digital broadcasting.Broadcasting reception module 111, which may be constructed such that, to be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via the received broadcast singal of broadcasting reception module 111 and/
Or broadcast related information can store in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal may include that voice is logical
Talk about signal, video calling signal or according to text and/or Multimedia Message transmission and/or received various types of data.
The Wi-Fi (Wireless Internet Access) of the support mobile terminal of wireless Internet module 113.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved in the module may include WLAN (Wireless LAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting short range communication.Some examples of short-range communication technology include indigo plant
Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the location information of mobile terminal.Location information module
Typical case be GPS (global positioning system).According to current technology, GPS module 115, which calculates, comes from three or more satellites
Range information and correct time information and the Information application triangulation for calculating, thus according to longitude, latitude
Highly accurately calculate three-dimensional current location information.Currently, it is defended for the method for calculating position and temporal information using three
Star and the error that calculated position and temporal information are corrected by using an other satellite.In addition, GPS module 115
It can be by Continuous plus current location information in real time come calculating speed information.
A/V input unit 120 is for receiving audio or video signal.A/V input unit 120 may include 121 He of camera
Microphone 122, camera 121 is to the static images obtained in video acquisition mode or image capture mode by image capture apparatus
Or the image data of video is handled.Treated, and picture frame may be displayed on display unit 151.It is handled through camera 121
Picture frame afterwards can store in memory 160 (or other storage mediums) or be sent out via wireless communication unit 110
It send, two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone calling model, note
Sound (audio data) is received via microphone in record mode, speech recognition mode etc. operational mode, and can will in this way
Acoustic processing be audio data.Audio that treated (voice) data can be converted in the case where telephone calling model can
The format output of mobile communication base station is sent to via mobile communication module 112.Various types of make an uproar can be implemented in microphone 122
Sound eliminates (or inhibition) algorithm to eliminate the noise or do that (or inhibition) generates during sending and receiving audio signal
It disturbs.
The order that user input unit 130 can be inputted according to user generates key input data to control each of mobile terminal
Kind operation.User input unit 130 allows user to input various types of information, and may include keyboard, metal dome, touch
Plate (for example, the sensitive component of detection due to the variation of resistance, pressure, capacitor etc. caused by being contacted), idler wheel, rocking bar etc.
Deng.Particularly, when touch tablet is superimposed upon in the form of layer on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 opens or closes shape
State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal
100 orientation, the acceleration or deceleration movement of mobile terminal 100 and direction etc., and generate for controlling mobile terminal 100
The order of operation or signal.For example, sensing unit 140 can sense when mobile terminal 100 is embodied as sliding-type mobile phone
The sliding-type phone is to open or close.In addition, sensing unit 140 be able to detect power supply unit 190 whether provide electric power or
Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 may include that proximity sensor 141 will combine below
Touch screen is described this.
Interface unit 170 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be storage and use each of mobile terminal 100 for verifying user
It plants information and may include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM)
Etc..In addition, the device (hereinafter referred to as " identification device ") with identification module can take the form of smart card, therefore, know
Other device can be connect via port or other attachment devices with mobile terminal 100.Interface unit 170, which can be used for receiving, to be come from
The input (for example, data information, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100
One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connect with external base, interface unit 170 may be used as allowing will be electric by it
Power, which is provided from pedestal to the path or may be used as of mobile terminal 100, allows the various command signals inputted from pedestal to pass through it
It is transferred to the path of mobile terminal.The various command signals or electric power inputted from pedestal, which may be used as mobile terminal for identification, is
The no signal being accurately fitted on pedestal.Output unit 150 is configured to provide with vision, audio and/or tactile manner defeated
Signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.) out.Output unit 150 may include display
Unit 151, audio output module 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information handled in mobile terminal 100.For example, when mobile terminal 100 is in electricity
When talking about call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file
Downloading etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling mode
Or when image capture mode, display unit 151 can show captured image and/or received image, show video or figure
Picture and the UI or GUI of correlation function etc..
Meanwhile when display unit 151 and touch tablet in the form of layer it is superposed on one another to form touch screen when, display unit
151 may be used as input unit and output device.Display unit 151 may include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
It is a kind of.Some in these displays may be constructed such that transparence to allow user to watch from outside, this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
Desired embodiment, mobile terminal 100 may include two or more display units (or other display devices), for example, moving
Dynamic terminal may include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detecting touch
Input pressure and touch input position and touch input area.
Audio output module 152 can mobile terminal be in call signal reception pattern, call mode, logging mode,
It is when under the isotypes such as speech recognition mode, broadcast reception mode, wireless communication unit 110 is received or in memory 160
The audio data transducing audio signal of middle storage and to export be sound.Moreover, audio output module 152 can provide and movement
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that terminal 100 executes.
Audio output module 152 may include loudspeaker, buzzer etc..
Alarm unit 153 can provide output notifying event to mobile terminal 100.Typical event can be with
Including calling reception, message sink, key signals input, touch input etc..Other than audio or video output, alarm unit
153 can provide output in different ways with the generation of notification event.For example, alarm unit 153 can be in the form of vibration
Output is provided, when receiving calling, message or some other entrance communications (incomingcommunication), alarm list
Member 153 can provide tactile output (that is, vibration) to notify to user.By providing such tactile output, even if
When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153
The output of the generation of notification event can be provided via display unit 151 or audio output module 152.
Memory 160 can store the software program etc. of the processing and control operation that are executed by controller 180, Huo Zheke
Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And
And memory 160 can store about the vibrations of various modes and audio signal exported when touching and being applied to touch screen
Data.
Memory 160 may include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, more
Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can execute memory with by network connection
The network storage device of 160 store function cooperates.
The overall operation of the usually control mobile terminal of controller 180.For example, controller 180 executes and voice communication, data
Communication, video calling etc. relevant control and processing.In addition, controller 180 may include for reproducing (or playback) more matchmakers
The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or can be structured as and control
Device 180 separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executed on the touchscreen or picture
It draws input and is identified as character or image.
Power supply unit 190 receives external power or internal power under the control of controller 180 and provides operation each member
Electric power appropriate needed for part and component.
Various embodiments described herein can be to use the calculating of such as computer software, hardware or any combination thereof
Machine readable medium is implemented.Hardware is implemented, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), controller, microcontroller, microprocessor, is designed to execute function described herein processor
At least one of electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180.
For software implementation, the embodiment of such as process or function can with allow to execute the individual of at least one functions or operations
Software module is implemented.Software code can by the software application (or program) write with any programming language appropriate Lai
Implement, software code can store in memory 160 and be executed by controller 180.
So far, oneself is through describing mobile terminal according to its function.In the following, for the sake of brevity, will description such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or grouping send data it is all if any
Line and wireless communication system and satellite-based communication system operate.
First embodiment of the invention, a kind of information protecting method, as shown in figures 2-3, comprising the following specific steps
Step S101, mobile terminal detect the biometric feature of user.
Wherein, user biological identification feature includes at least following one:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known
Other feature.
The biometric feature that mobile terminal detects user is the prior art, and this will not be repeated here.
Step S102, biometric feature of the mobile terminal based on the user detected, presentation user is corresponding to be allowed to make
Application program;
Specifically, step S102, comprising:
Biometric feature of the mobile terminal based on the user detected hides the corresponding application journey being forbidden to use of user
Sequence, presentation user is corresponding allow using application program.
Such as: as shown in Fig. 2, the mobile phone that mobile terminal is detected based on the fingerprint sensor at mobile terminal back
The fingerprint of main child hides corresponding various game, bank application and the payment being forbidden to use of child owner in Fig. 2 box
The application programs such as treasured;The corresponding educational application program of mobile terminal child owner is presented.
The application programs such as the various game that can effectively avoid mobile terminal child owner from indulging;And it can effectively keep away
Exempt from mobile terminal child owner branch as caused by the internet payments application program such as maloperation bank application and Alipay
The behavior of paying;Child is encouraged to use educational application program;While cultivated child's good living habit, effective protection movement
The financial security of terminal owner.
Step S103, mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with user
It is corresponding allow using application program right of using functions, provided for user allow using application program corresponding function
Energy.
Specifically, step S103, comprising:
Mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user
The right of using functions of the application program used, provided for user allow using application program whole corresponding functions or part
Corresponding function.
Such as: client iris of the mobile terminal based on the borrow mobile terminal user detected is borrowed according to being pre-configured with
Mobile terminal user is corresponding allow using application program right of using functions, provide permission to borrow mobile terminal user
The whole corresponding functions or wechat program circle of friends function of the voice communication used, and it is micro- to forbid borrow mobile terminal user to use
Believe the other function of program.Can effectively avoid immobile terminal owner user temporarily borrow mobile terminal using when usurp machine
Main wechat payment function is paid, and the safety of payment of mobile terminal owner is effectively protected.Meanwhile, it is capable to effectively keep away
Exempt from immobile terminal owner user temporarily borrow mobile terminal using when peep the instant communication message of mobile terminal owner, and/
Or message is sent by contact person of the wechat of the mobile terminal owner malice into wechat, effectively protect mobile terminal owner
Individual privacy and information security.
For another example: user fingerprints of the mobile terminal based on the borrow mobile terminal user detected are borrowed according to being pre-configured with
Mobile terminal user is corresponding allow using application program access right, for borrow mobile terminal user provide allow using
Voice communication whole corresponding functions or stock application program look facility, and forbid borrowing mobile terminal user using stock
The Stock Trading function of ticket application program.Immobile terminal owner user can be effectively avoided temporarily to borrow mobile terminal use
When usurp owner stock application program carry out Stock Trading, effectively protect the property safety of mobile terminal owner.
Second embodiment of the invention, a kind of information protecting method, as shown in figure 4, comprising the following specific steps
Step S201, mobile terminal detect the biometric feature of user.
Wherein, user biological identification feature includes at least following one:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known
Other feature.
The biometric feature that mobile terminal detects user is the prior art, and this will not be repeated here.
Step S202, biometric feature of the mobile terminal based on the user detected, presentation user is corresponding to be allowed to make
Application program;
Specifically, step S202, comprising:
Biometric feature of the mobile terminal based on the user detected hides the corresponding application journey being forbidden to use of user
Sequence, presentation user is corresponding allow using application program.
Such as: the finger for mobile terminal child owner that mobile terminal is detected based on the fingerprint sensor at mobile terminal back
Line hides the application programs such as corresponding various game, bank application and the Alipay being forbidden to use of child owner;It presents and moves
The dynamic corresponding educational application program of terminal child owner.
The application programs such as the various game that can effectively avoid mobile terminal child owner from indulging;And it can effectively keep away
Exempt from mobile terminal child owner branch as caused by the internet payments application program such as maloperation bank application and Alipay
The behavior of paying;Child is encouraged to use educational application program;While cultivated child's good living habit, effective protection movement
The financial security of terminal owner.
Step S203, mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with user
It is corresponding allow using application program right of using functions, provided for user allow using application program corresponding function
Energy.
Specifically, step S203, comprising:
Mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user
The right of using functions of the application program used, provided for user allow using application program whole corresponding functions or part
Corresponding function.
Such as: client iris of the mobile terminal based on the borrow mobile terminal user detected is borrowed according to being pre-configured with
Mobile terminal user is corresponding allow using application program right of using functions, provide permission to borrow mobile terminal user
The whole corresponding functions or wechat program circle of friends function of the voice communication used, and it is micro- to forbid borrow mobile terminal user to use
Believe the other function of program.Can effectively avoid immobile terminal owner user temporarily borrow mobile terminal using when usurp machine
Main wechat payment function is paid, and the safety of payment of mobile terminal owner is effectively protected.Meanwhile, it is capable to effectively keep away
Exempt from immobile terminal owner user temporarily borrow mobile terminal using when peep the instant communication message of mobile terminal owner, and/
Or message is sent by contact person of the wechat of the mobile terminal owner malice into wechat, effectively protect mobile terminal owner
Individual privacy and information security.
For another example: user fingerprints of the mobile terminal based on the borrow mobile terminal user detected are borrowed according to being pre-configured with
Mobile terminal user is corresponding allow using application program access right, for borrow mobile terminal user provide allow using
Voice communication whole corresponding functions or stock application program look facility, and forbid borrowing mobile terminal user using stock
The Stock Trading function of ticket application program.Immobile terminal owner user can be effectively avoided temporarily to borrow mobile terminal use
When usurp owner stock application program carry out Stock Trading, effectively protect the property safety of mobile terminal owner.
Step S204, mobile terminal stores the application program usage record of user on backstage, and provides use to setting user
The application program usage record at family.
Specifically, step S204, comprising:
User using allow using application program corresponding function after, mobile terminal is answered in backstage storage user
The application program usage record of user is provided with program usage record, and to setting user.
Setting user can be the owner of mobile terminal, be also possible to the other users of mobile terminal owner setting.
Such as: borrow mobile terminal user using allow using voice communication application program repertoire and wechat
After program circle of friends function, mobile terminal backstage store borrow mobile terminal user application program usage record, and to
Mobile terminal owner provides the application program usage record for borrowing mobile terminal user.
The case where user for capableing of prompting mobile terminal owner borrow mobile terminal uses application program, such as pass through voice
Talk application program malicious call 110 or 119 is expected someone's call;Or malice replys wechat program circle of friends.
For another example: child owner using allow using game application repertoire after, mobile terminal is rear
Platform stores the application program usage record of child owner, and uses note to the application program that mobile terminal owner provides child owner
Record.
It can help the time of parent's effective monitoring child play game, and play game playing habits, child can be helped to establish
Good living habit.
Step S205, if user allow using application program in revise information, in the setting user detected
When biometric feature, mobile terminal restores the information that user revises.
Specifically, step S205, comprising:
If user modifies in the application program for obtaining access right or delete information, mobile terminal is used in backstage storage
Family obtain access right application program in modify or delete before information, and detect setting user biology know
When other feature, restore the information that user modifies or deleted in the application program for obtaining access right.
Such as: it malicious modification or is deleted in the instant messaging application program for obtaining access right if borrowing mobile terminal user
Except information, then mobile terminal stores on backstage and borrows mobile terminal user in the instant messaging application program for obtaining access right
Information before modification or deletion, and in the biometric feature of the owner detected, restore borrow mobile terminal user and exists
Obtain the information modified or deleted in the instant messaging application program of access right.Effectively protect information security.
For another example: if child owner modifies or delete unintentionally letter in the instant messaging application program for obtaining access right
Breath, then mobile terminal is modified in the instant messaging application program for obtaining access right in backstage storage child owner or deletes it
Preceding information, and in the biometric feature of the owner detected, restore child owner in the Instant Messenger for obtaining access right
Interrogate the information modified or deleted in application program.Effectively protect the information security of owner.
Step S206, mobile terminal forbid after the duration of setting user using allow using application program it is corresponding
Function.
Such as: child owner using allow using game application repertoire after, mobile terminal is being set
Forbid after fixed duration 30 minutes child owner using allow using game application repertoire.
Parent can be helped effectively to control the time of child play game, and play game playing habits, child can be helped to establish
Good living habit.
Third embodiment of the invention, it is corresponding with first embodiment, as shown in figure 5, the present embodiment introduces a kind of information protection
Device, including consisting of part:
Detection module 161, for detecting the biometric feature of user.
Wherein, user biological identification feature includes at least following one:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known
Other feature.
The biometric feature that mobile terminal detects user is the prior art, and this will not be repeated here.
First protective module 162, for the biometric feature based on the user detected, the corresponding permission of presentation user
The application program used;
Specifically, the first protective module 162, is used for:
Biometric feature of the mobile terminal based on the user detected hides the corresponding application journey being forbidden to use of user
Sequence, presentation user is corresponding allow using application program.
Such as: the finger for mobile terminal child owner that mobile terminal is detected based on the fingerprint sensor at mobile terminal back
Line hides the application programs such as corresponding various game, bank application and the Alipay being forbidden to use of child owner;It presents and moves
The dynamic corresponding educational application program of terminal child owner.
The application programs such as the various game that can effectively avoid mobile terminal child owner from indulging;And it can effectively keep away
Exempt from mobile terminal child owner branch as caused by the internet payments application program such as maloperation bank application and Alipay
The behavior of paying;Child is encouraged to use educational application program;While cultivated child's good living habit, effective protection movement
The financial security of terminal owner.
Second protective module 163, for detecting user in the application program that triggering is presented, according to being pre-configured with use
Family is corresponding allow using application program right of using functions, provided for user allow using application program corresponding function
Energy.
Specifically, the second protective module 163, is used for:
Mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user
The right of using functions of the application program used, provided for user allow using application program whole corresponding functions or part
Corresponding function.
Such as: the second protective module 163, for based on detect borrow mobile terminal user client iris, according to
Be pre-configured with borrow mobile terminal user it is corresponding allow using application program right of using functions, for borrow mobile terminal
User provide allow using voice communication whole corresponding functions or wechat program circle of friends function, and forbid borrowing it is mobile eventually
End subscriber uses the other function of wechat program.Immobile terminal owner user can be effectively avoided temporarily to borrow mobile terminal
The wechat payment function that owner is usurped when use is paid, and effectively protects the safety of payment of mobile terminal owner.Meanwhile
Can effectively avoid immobile terminal owner user temporarily borrow mobile terminal using when peep the instant of mobile terminal owner
Communication information, and/or message is sent by contact person of the wechat of the mobile terminal owner malice into wechat, it effectively protects
The individual privacy and information security of mobile terminal owner.
For another example: the second protective module 163, for based on detect borrow mobile terminal user user fingerprints, according to
Be pre-configured with borrow mobile terminal user it is corresponding allow using application program access right, for borrow mobile terminal user
There is provided allow using voice communication whole corresponding functions or stock application program look facility, and forbid borrowing it is mobile eventually
End subscriber uses the Stock Trading function of stock application program.Immobile terminal owner user can be effectively avoided temporarily to borrow
Mobile terminal using when usurp owner stock application program carry out Stock Trading, effectively protect the wealth of mobile terminal owner
Produce safety.
Fourth embodiment of the invention, corresponding with second embodiment, the present embodiment introduces a kind of information protection device, such as Fig. 4
It is shown, including consisting of part:
Detection module 161, for detecting the biometric feature of user.
Wherein, user biological identification feature includes at least following one:
The user biologicals such as user fingerprints, user's vocal print, client iris, user's retina, user's face and user's palmmprint are known
Other feature.
The biometric feature that mobile terminal detects user is the prior art, and this will not be repeated here.
First protective module 162, for the biometric feature based on the user detected, the corresponding permission of presentation user
The application program used;
Specifically, the first protective module 162, is used for:
Biometric feature of the mobile terminal based on the user detected hides the corresponding application journey being forbidden to use of user
Sequence, presentation user is corresponding allow using application program.
Such as: the finger for mobile terminal child owner that mobile terminal is detected based on the fingerprint sensor at mobile terminal back
Line hides the application programs such as corresponding various game, bank application and the Alipay being forbidden to use of child owner;It presents and moves
The dynamic corresponding educational application program of terminal child owner.
The application programs such as the various game that can effectively avoid mobile terminal child owner from indulging;And it can effectively keep away
Exempt from mobile terminal child owner branch as caused by the internet payments application program such as maloperation bank application and Alipay
The behavior of paying;Child is encouraged to use educational application program;While cultivated child's good living habit, effective protection movement
The financial security of terminal owner.
Second protective module 163, for detecting user in the application program that triggering is presented, according to being pre-configured with use
Family is corresponding allow using application program right of using functions, provided for user allow using application program corresponding function
Energy.
Specifically, the second protective module 163, is used for:
Mobile terminal is detecting user in the application program that triggering is presented, according to being pre-configured with the corresponding permission of user
The right of using functions of the application program used, provided for user allow using application program whole corresponding functions or part
Corresponding function.
Such as: the second protective module 163, for based on detect borrow mobile terminal user client iris, according to
Be pre-configured with borrow mobile terminal user it is corresponding allow using application program right of using functions, for borrow mobile terminal
User provide allow using voice communication whole corresponding functions or wechat program circle of friends function, and forbid borrowing it is mobile eventually
End subscriber uses the other function of wechat program.Immobile terminal owner user can be effectively avoided temporarily to borrow mobile terminal
The wechat payment function that owner is usurped when use is paid, and effectively protects the safety of payment of mobile terminal owner.Meanwhile
Can effectively avoid immobile terminal owner user temporarily borrow mobile terminal using when peep the instant of mobile terminal owner
Communication information, and/or message is sent by contact person of the wechat of the mobile terminal owner malice into wechat, it effectively protects
The individual privacy and information security of mobile terminal owner.
For another example: the second protective module 163, for based on detect borrow mobile terminal user user fingerprints, according to
Be pre-configured with borrow mobile terminal user it is corresponding allow using application program access right, for borrow mobile terminal user
There is provided allow using voice communication whole corresponding functions or stock application program look facility, and forbid borrowing it is mobile eventually
End subscriber uses the Stock Trading function of stock application program.Immobile terminal owner user can be effectively avoided temporarily to borrow
Mobile terminal using when usurp owner stock application program carry out Stock Trading, effectively protect the wealth of mobile terminal owner
Produce safety.
Logging modle 164 provides user for storing the application program usage record of user on backstage, and to setting user
Application program usage record.
Specifically, logging modle 164, is used for:
User using allow using application program corresponding function after, mobile terminal is answered in backstage storage user
The application program usage record of user is provided with program usage record, and to setting user.
Setting user can be the owner of mobile terminal, be also possible to the other users of mobile terminal owner setting.
Such as: logging modle 164, for borrow mobile terminal user using allow using voice communication application program
Repertoire and wechat program circle of friends function after, mobile terminal backstage store borrow mobile terminal user application journey
Sequence usage record, and the application program usage record for borrowing mobile terminal user is provided to mobile terminal owner.
The case where user for capableing of prompting mobile terminal owner borrow mobile terminal uses application program, such as pass through voice
Talk application program malicious call 110 or 119 is expected someone's call;Or malice replys wechat program circle of friends.
For another example: logging modle 164, for child owner using allow using game application repertoire it
Afterwards, mobile terminal stores the application program usage record of child owner on backstage, and provides child owner to mobile terminal owner
Application program usage record.
It can help the time of parent's effective monitoring child play game, and play game playing habits, child can be helped to establish
Good living habit.
Recovery module 165, if for user allow using application program in revise information, in the setting detected
When the biometric feature of user, restore the information that user revises.
Specifically, recovery module 165, is used for:
If user modifies in the application program for obtaining access right or delete information, mobile terminal is used in backstage storage
Family obtain access right application program in modify or delete before information, and detect setting user biology know
When other feature, restore the information that user modifies or deleted in the application program for obtaining access right.
Such as: recovery module 165, if for borrowing mobile terminal user in the instant messaging application journey for obtaining access right
In sequence malicious modification or delete information, then mobile terminal backstage store borrow mobile terminal user obtain access right i.e.
When messaging application in modify or delete before information restore to borrow and in the biometric feature of the owner detected
The information modified or deleted in the instant messaging application program for obtaining access right with mobile terminal user.It effectively protects
Information security.
For another example: recovery module 165, if being not intended in the instant messaging application program for obtaining access right for child owner
Middle modification or deletion information, then mobile terminal is in backstage storage child owner in the instant messaging application program for obtaining access right
Information before middle modification or deletion, and in the biometric feature of the owner detected, restoring child owner is made
With the information modified or deleted in the instant messaging application program of permission.Effectively protect the information security of owner.
Closedown module 166, for forbid after the duration of setting user using allow using application program it is corresponding
Function.
Such as: closedown module 166, for child owner using allow using game application repertoire it
Afterwards, forbid after 30 minutes in the duration of setting child owner using allow using game application repertoire.
Parent can be helped effectively to control the time of child play game, and play game playing habits, child can be helped to establish
Good living habit.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.