Specific embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finishSame or similar label represents same or similar element or the element with same or like function.Below with reference to attachedIt is exemplary to scheme the embodiment of description, it is intended to for explaining the present invention, and be not considered as limiting the invention.
Any process described otherwise above or method description in flow chart or herein is construed as, and expression includesIt is one or more for realizing specific logical function or process the step of the module of code of executable instruction, fragment or portionPoint, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussion suitableSequence, including function involved by basis by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the inventionEmbodiment person of ordinary skill in the field understood.
Below with reference to the accompanying drawings the theft preventing method and device of mobile terminal according to embodiments of the present invention described.
Fig. 1 is the flow chart of the theft preventing method of mobile terminal according to an embodiment of the invention.
As shown in figure 1, the theft preventing method of mobile terminal includes:
S101, preserves encrypted message and checking information.
Wherein, above-mentioned checking information can include but is not limited in finger print information, acoustic information and facial informationPlant or various.
In this embodiment, before above-mentioned checking information is preserved, can also include:Collection user profile, extracts userThe feature of information, generates checking information, and user profile includes the one kind or many in finger print information, acoustic information and facial informationKind.
Specifically, when the user profile of collection is acoustic information, can be by calling the sound pick-up outfit of mobile terminal, collectionSound of the user in Preset Time such as 10 minutes, and sound to collecting carries out feature extraction to obtain the sound of userFeature, wherein, Preset Time can be acquiescence in mobile terminal system, can also be user according to different demands in movementSet in terminal system.
When the user profile of collection is finger print information, user can be obtained by calling the fingerprint input device of mobile terminalFingerprint, and the fingerprint characteristic that feature extraction obtains user is carried out to the fingerprint of user.
When the user profile of collection is facial information, the camera in mobile terminal is opened, gather face's figure of userAs information, and feature extraction is carried out to facial image information, obtain the face feature of user.
S102, obtains the current password of user input, and current password and the encrypted message for preserving are compared, if twoPerson is inconsistent, then into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information.
Specifically, anti-theft modes can be divided into three-level, and every grade of anti-theft modes are controlled by different checking informations, and are performedThe lock operation of different stage, wherein:
One-level anti-theft modes can perform one-level lock operation by encrypted message control, that is, lock sensitive data, wherein, it is quickSense data can include but be limited to the private data of user and transaction payment data.
Two stage anti-theft pattern can be performed secondary latch and operated surely by finger print information control, that is, lock sensitive data, be movedThe current location information of terminal, and the current location information of mobile terminal is sent the mobile phone of the contact person pre-set to userIn.
Three-level anti-theft modes can be controlled by acoustic information and/face information, perform three-level lock operation, that is, lock all numbersAccording to, and send current sound information and/or current facial information to contact person.
In this embodiment, before the current password of user input is obtained, can also include:Determine the knowledge of encrypted messageOrder is not prior to checking information;And when checking information includes at least two information, determine the recognition sequence of checking information.
For example, encrypted message, finger print information, acoustic information and face information are saved in mobile terminal, then according to firstSecondary recognition code information, second identification finger print information, third time identification recognizes the identification of acoustic information and face information simultaneouslyOrder is identified, and enters the anti-theft modes of different stage according to recognition result.
Again for example, saving encrypted message and face information in mobile terminal, then according to face information after first encrypted messageRecognition sequence be identified, and according to recognition result enter different stage anti-theft modes.
When checking information includes at least two information, then current authentication information is obtained according to recognition sequence.For example, mobileFinger print information and acoustic information are included in the checking information of terminal, then according to first acquisition current finger print information, current sound of reentryingThe recognition sequence of message breath obtains current authentication information.
It should be noted that because acoustic information and/facial information can control three-level anti-theft modes, therefore, soundInformation and facial information have identical recognition sequence.
S103, compares current authentication information is corresponding with checking information, and enter different stage according to comparison resultAnti-theft modes, perform different stage lock operation.
In this embodiment, when checking information include finger print information when, then will obtain current finger print information and preserveFinger print information is compared, if the two is consistent, into one-level anti-theft modes, performs one-level lock operation, if the two is inconsistent,Then enter two stage anti-theft pattern, perform secondary latch and operate surely.
In this embodiment, when checking information include facial information when, then will obtain current facial information and preserveFacial information is compared, if the two is consistent, into two stage anti-theft pattern, is performed secondary latch and is operated surely, if the two is inconsistent,Then enter three-level anti-theft modes, perform three-level lock operation.
When checking information includes acoustic information, then the current sound information of acquisition and the acoustic information for preserving are comparedIt is right, if the two is consistent, into two stage anti-theft pattern, performs secondary latch and operate surely, it is antitheft into three-level if the two is inconsistentPattern, performs three-level lock operation.
In addition, when acoustic information and facial information is included in checking information, then obtaining current sound information and current facePortion's information, and by current sound information and current facial information and the acoustic information for preserving and face is corresponding compares, ifUnanimously, then into two stage anti-theft pattern, perform secondary latch and operate surely, if there are a pair of information inconsistent, into the antitheft mould of three-levelFormula, performs three-level lock operation.
The theft preventing method embodiment of above-mentioned mobile terminal, obtains the current password of user input, by current password and preservationEncrypted message compare, and when comparing inconsistent, into one-level anti-theft modes, perform one-level lock operation, and obtainCurrent authentication information, and current authentication information and the checking information for preserving are compared, and entered not according to comparison resultThe anti-theft modes of same level, perform the lock operation of different stage, are movement while full protection mobile terminal thusTerminal provides the anti-theft modes of different stage, enriches the anti-theft modes of mobile terminal, and cause because maloperation cannotThe experience of user can be improve using the validated user of mobile terminal using the partial function of mobile terminal.
Fig. 2 is the flow chart of the theft preventing method of mobile terminal in accordance with another embodiment of the present invention, and the embodiment is testingComprising being specifically described as a example by finger print information, acoustic information and facial information in card information, as shown in Fig. 2 the mobile terminalTheft preventing method include:
S201, preserves encrypted message, finger print information, acoustic information and facial information.
Specifically, the encrypted message that user is set is obtained, and gathers the finger print information of mobile terminal validated user, sound letterBreath and facial information, and above-mentioned encrypted message, finger print information, acoustic information and facial information are preserved in the terminal.
S202, obtains the current password of user input, and current password and the encrypted message for preserving are compared, if twoPerson is inconsistent, then into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information.
Specifically, S202 can include S2021-S2025.
S2021, receives the current password of user input.
S2022, judges whether current password is correct, that is, the current password and the encrypted message for preserving for judging user input areIt is no consistent, if unanimously, performing S2023, S2024 is performed if inconsistent.
S2023, unlocks mobile terminal, normally uses mobile terminal.
S2024, judges whether the password number of times of user input exceedes preset times, and when preset times are not above,S2021 is performed, such as exceedes preset times, perform S2025.
Preset times can be acquiescence in mobile terminal system, can also be user according to different demands mobile wholeSet in end system.For example, preset times can be 3 times.
S2025, into one-level anti-theft modes, locks sensitive data, and obtain current authentication information i.e. current finger print information.
Specifically, the private data and transaction payment data of locking mobile terminal, it is to avoid mobile terminal user privacy letterBreath is compromised, and protects the safety of user privacy information in mobile terminal.
S203, by current finger print information with preserve finger print information it is corresponding compare, and according to comparison result entrance notThe anti-theft modes of same level, perform the lock operation of different stage.
Specifically, S203 can include S2031-S2034.
S2031, judges whether current finger print information is correct, that is, judge the current finger print information for obtaining with the fingerprint letter for preservingWhether breath is consistent, if unanimously, performing S2032, if inconsistent, performs S2033.
S2032, mobile terminal is operated under one-level anti-theft modes.
Specifically, when the finger print information of user input is correct, on the basis of sensitive data is locked, the conjunction of mobile terminalMethod user can not also influence the other functions of Consumer's Experience mobile terminal using the other functions of mobile terminal.Thus, can keep awayExempt from because of maloperation so that code error number of times exceed pre-determined number and caused by mobile terminal completely be locked, mobile terminal it is legalUser cannot use the generation of mobile terminal.
S2033, into two stage anti-theft pattern, performs secondary latch and operates surely, and obtain current sound information and current faceInformation.
Specifically, sensitive data is locked, and by alignment system such as global position system GPS (GlobalPositioning System) obtain mobile terminal current location information, the current location information of mobile terminal is issued into useIn the mobile phone of the contact person that family pre-sets, mobile terminal is positioned.
S204, is compared current sound information and current facial information are corresponding with facial information with the acoustic information for preservingIt is right, and according to comparison result into the anti-theft modes of different stage, perform the lock operation of different stage.
Specifically, S204 can include S2041-S2044.
S2041, judges whether current sound information and current facial information are correct, that is, judge the current sound information for obtainingIt is whether consistent with the acoustic information and facial information for preserving with current facial information, if consistent, S2042 is performed, if there are a pairInformation is inconsistent, then perform S2043.
S2042, mobile terminal is operated under two stage anti-theft pattern.
Specifically, in the current sound information and correct current facial information of user input, in locking sensitive data, obtainThe current location information of mobile terminal is obtained, and the current location information of mobile terminal is sent the contact person pre-set to userMobile phone in after, user can also using mobile terminal other functions, the other functions of Consumer's Experience mobile terminal are not influenceed.
S2043, into three-level anti-theft modes, performs three-level lock operation, and to contact person send current sound information andCurrent facial information.
Specifically, all data in locking mobile terminal, i.e. mobile terminal is locked completely, and user cannot use movementAny function of terminal, and the current sound information and current facial information of operation mobile terminal user, connection are sent to contact personBe people receive send current sound information and current facial information, and it is determined that be mobile terminal validated user after, can lead toTransmission operational order is crossed to be unlocked the mobile terminal being locked.
If it should be appreciated that when finger print information, acoustic information/facial information of the checking information comprising user, movement is eventuallyIt is similar to Fig. 2 processes that end carries out antitheft process, does not repeat herein.
The theft preventing method of above-mentioned mobile terminal, the encrypted message of mobile terminal, acoustic information and facial information are corresponded to respectivelyThe anti-theft modes for one-level, two grades and three-level anti-theft modes, and different stage perform different lock operations, in comprehensive guarantorWhile shield mobile terminal, the anti-theft modes of different stage are provided for mobile terminal, enrich the anti-theft modes of mobile terminal,And allow to be used because of erroneous input Password Operations the validated user of mobile terminal using the part work(of mobile terminalCan, improve the experience of user.
Fig. 3 is the flow chart of the theft preventing method of the mobile terminal according to another embodiment of the invention, and the embodiment is testingIt is specifically described as a example by the facial information comprising user in card information, as shown in figure 3, the theft preventing method bag of the mobile terminalInclude:
S301, preserves the facial information of encrypted message and user.
S302, obtains the current password of user input, and current password and the encrypted message for preserving are compared, if twoPerson is inconsistent, then into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information.
Specifically, S302 can include S3021-S3025.
S3021, receives the current password of user input.
S3022, judges whether current password is correct, that is, the current password and the encrypted message for preserving for judging user input areIt is no consistent, if unanimously, performing S3023, S3024 is performed if inconsistent.
S3023, unlocks mobile terminal, normally uses mobile terminal.
S3024, judges whether the password number of times of user input exceedes preset times, and when preset times are not above,S3021 is performed, such as exceedes preset times, perform S3025.
Wherein, preset times can be acquiescence in mobile terminal system, can also be that user exists according to different demandsSet in mobile terminal system, for example, preset times can be with 3 times.
S3025, into one-level anti-theft modes, locks sensitive data, and obtain the i.e. current facial information of current authentication information.
Specifically, the private data and transaction payment data of locking mobile terminal, it is to avoid the privacy of mobile terminal userInformation is compromised, and protects the safety of user privacy information in mobile terminal.
S303, by current facial information with preserve facial information it is corresponding compare, and according to comparison result entrance notThe anti-theft modes of same level, perform the lock operation of different stage.
Specifically, S303 can include S3031-S3034.
S3031, judges whether current facial information is correct, that is, judge the current facial information for obtaining with the face's letter for preservingWhether breath is consistent, if unanimously, performing S3032, if inconsistent, performs S3033.
S3032, mobile terminal is operated under one-level anti-theft modes.
Specifically, when the current facial information of user input is correct, on the basis of sensitive data is locked, mobile terminalValidated user can also using mobile terminal other functions, the other functions of Consumer's Experience mobile terminal are not influenceed.Thus,Can avoid because of maloperation so that code error number of times exceed pre-determined number and caused by mobile terminal completely be locked, mobile terminalValidated user cannot use the generation of mobile terminal.
S3033, into three-level anti-theft modes, performs three-level lock operation, and send current facial information to contact person.
Specifically, all data in locking mobile terminal, i.e. mobile terminal is locked completely, and user cannot use movementAny function of terminal, and the operation current facial information of mobile terminal user is sent to contact person, contact person receives working as transmissionPreceding facial information, and it is determined that be mobile terminal validated user after, can by send operational order to be locked mobile endEnd is unlocked.
The theft preventing method of above-mentioned mobile terminal, preserves encrypted message and facial information in the terminal, wherein, message in cipherBreath and facial information correspond to one-level and three-level anti-theft modes respectively, and anti-theft modes are performed in sequence, can omnibearing protectionWhile mobile terminal, the anti-theft modes of different stage are provided for mobile terminal, enrich the anti-theft modes of mobile terminal, andAnd allow to be used because of erroneous input Password Operations the validated user of mobile terminal using the partial function of mobile terminal,Improve the experience of user.
In order to realize above-described embodiment, the present invention also proposes a kind of anti-theft device of mobile terminal.
Fig. 4 is the structural representation of the anti-theft device of mobile terminal according to an embodiment of the invention.
As shown in figure 4, the anti-theft device of mobile terminal includes:Preserving module 41, acquisition module 42 and processing module 43, itsIn:
Preserving module 41 is used to preserve encrypted message and checking information, and above-mentioned checking information includes that finger print information, sound are believedOne or more in breath and facial information;Obtaining module 42 is used to obtain the current password of user input, and will be above-mentioned currentPassword and the above-mentioned encrypted message for preserving are compared, if the two is inconsistent, into one-level anti-theft modes, perform one-level lockingOperation, and obtain current authentication information;And processing module 43 is used for above-mentioned current authentication information and above-mentioned checking information pairShould compare, and enter the anti-theft modes of different stage according to comparison result, perform the lock operation of different stage.
When one-level anti-theft modes are entered, it is locking sensitive data that above-mentioned acquisition module 42 performs one-level lock operation, byThis, the safety of individual privacy information in protection mobile terminal.
Above-mentioned checking information can include but is not limited to the one kind or many in finger print information, acoustic information and facial informationKind.
Specifically, anti-theft modes can be divided into three-level, and every grade of anti-theft modes are controlled by different checking informations, and are performedThe lock operation of different stage, wherein:
One-level anti-theft modes can perform one-level lock operation by encrypted message control, that is, lock sensitive data, wherein, it is quickSense data can include but be limited to the private data of user and transaction payment data.
Two stage anti-theft pattern can be performed secondary latch and operated surely by finger print information control, that is, lock sensitive data, be movedThe current location information of terminal, and the current location information of mobile terminal is sent the mobile phone of the contact person pre-set to userIn.
Three-level anti-theft modes can be controlled by acoustic information and/or face information, perform three-level lock operation, that is, lock allData, and send current sound information and/or current facial information to contact person.
In addition, said apparatus can also include acquisition module 44, acquisition module 44 is used to be preserved in above-mentioned preserving module 41Before checking information, user profile is gathered, extract the feature of above-mentioned user profile, generate above-mentioned checking information, above-mentioned user's letterBreath includes one or more in finger print information, acoustic information and facial information.
Specifically, when above-mentioned user profile be acoustic information when, above-mentioned acquisition module 44 specifically for:The collection scheduled timeAcoustic information in section;When above-mentioned user profile be facial information when, above-mentioned acquisition module 44 specifically for:Open camera,The above-mentioned facial information of typing.
When above-mentioned user profile is finger print information, above-mentioned acquisition module 44 can also be by fingerprint collecting unit (in figure notShow) typing finger print information.
In addition, said apparatus can also include determining module 45, determining module 45 is used to be obtained in above-mentioned acquisition module 42Before the current password of user input, determine the recognition sequence of above-mentioned encrypted message prior to above-mentioned checking information;And when above-mentionedWhen checking information includes at least two information, the recognition sequence of above-mentioned checking information is determined.
Specifically, acquisition module 44 can gather corresponding checking information according to the selection of user, if user's selection fingerprint, used as checking information, acquisition module 44 will gather the finger print information harmony message of mobile terminal validated user for information and acoustic informationBreath, and the checking information collected by encrypted message and acquisition module 44 that preserving module 42 preserves user's setting.PreservingAfter module 42 preserves encrypted message and checking information, determining module 45 is determined according to the first recognition code information, second identificationFinger print information, the recognition sequence of third time identification acoustic information is identified.
In addition, acoustic information and/facial information can control three-level anti-theft modes, therefore, when above-mentioned checking information alsoComprising tut information and/or during facial information, tut information and facial information have identical recognition sequence.
After the order that determining module 45 determines identification, obtaining module 42 will be identified in sequence, and believe in checkingWhen including at least two information in breath, above-mentioned current authentication information is obtained according to above-mentioned recognition sequence.For example, checking information is includedFinger print information and acoustic information, then obtain module 42 according to first acquisition current finger print information, the knowledge of current sound information of reentryingOrder does not obtain current authentication information.
When above-mentioned checking information include above-mentioned finger print information when, above-mentioned processing module 43 specifically for:It is current by what is obtainedFinger print information and the above-mentioned finger print information for preserving are compared, if the two is consistent, into above-mentioned one-level anti-theft modes, perform oneLevel lock operation, if the two is inconsistent, into two stage anti-theft pattern, performs secondary latch and operates surely.
When above-mentioned checking information include above-mentioned facial information when, above-mentioned processing module 43 specifically for:It is current by what is obtainedFacial information and the above-mentioned facial information for preserving are compared, if the two is consistent, into above-mentioned one-level anti-theft modes, perform oneLevel lock operation, if the two is inconsistent, into three-level anti-theft modes, performs three-level lock operation.
When two stage anti-theft pattern is entered, the locking sensitive data of above-mentioned processing module 43 obtains working as above-mentioned mobile terminalFront position information, and send above-mentioned current location information to contact person.
In addition, above-mentioned processing module 43 is additionally operable to:Current sound information and/or current facial information are obtained, and will be currentAcoustic information and/or current facial information and the tut information for preserving and face is corresponding compares, if unanimously, enteringEnter above-mentioned two stage anti-theft pattern, perform secondary latch and operate surely, if there are a pair of information inconsistent, into three-level anti-theft modes, holdRow three-level lock operation.
When three-level anti-theft modes are entered, processing module 43 locks all data, and sends current sound letter to contact personBreath and/or current facial information.
After the validated user that contact person determines that active user is mobile terminal, operational order is sent to mobile terminal, movedDynamic terminal receives operational order, and according to instruction unblock mobile terminal.
Anti-theft device including preserving module, the mobile terminal for obtaining module, processing module, acquisition module and determining moduleAntitheft detailed process is carried out reference can be made to Fig. 1, Fig. 2 and Fig. 3, do not repeat herein.
The anti-theft device embodiment of above-mentioned mobile terminal, encrypted message and checking information are preserved by preserving module, are passed throughThe current password that module obtains user input is obtained, current password is compared with the encrypted message for preserving, and compared notWhen consistent, into one-level anti-theft modes, one-level lock operation is performed, and obtain current authentication information, and by processing moduleCurrent authentication information and the checking information for preserving are compared, and enter the anti-theft modes of different stage according to comparison result,The lock operation of different stage is performed, thus, while full protection mobile terminal, for mobile terminal provides different stageAnti-theft modes, enrich the anti-theft modes of mobile terminal, and cause that because of maloperation the legal of mobile terminal cannot be usedUser can improve the experience of user using the partial function of mobile terminal.
In order to realize above-described embodiment, the present invention also proposes a kind of mobile terminal, and the mobile terminal includes housing, treatmentDevice, memory, circuit board and power circuit, wherein, foregoing circuit plate is placed in the interior volume that above-mentioned housing is surrounded, above-mentioned placeReason device and above-mentioned memory are arranged on foregoing circuit plate;Above-mentioned power circuit, for each circuit for above-mentioned mobile terminalOr device is powered;Above-mentioned memory is used to store executable program code;Above-mentioned processor deposit in above-mentioned memory by being readThe executable program code of storage runs program corresponding with above-mentioned executable program code, for performing following steps:
S101 ', preserves encrypted message and checking information.
Wherein, above-mentioned checking information can include but is not limited in finger print information, acoustic information and facial informationPlant or various.
In this embodiment, before above-mentioned checking information is preserved, can also include:Collection user profile, extracts userThe feature of information, generates checking information, and user profile includes the one kind or many in finger print information, acoustic information and facial informationKind.
Specifically, when the user profile of collection is acoustic information, can be by calling the sound pick-up outfit of mobile terminal, collectionSound of the user in Preset Time such as 10 minutes, and sound to collecting carries out feature extraction to obtain the sound of userFeature, wherein, Preset Time can be acquiescence in mobile terminal system, can also be user according to different demands in movementSet in terminal system.
When the user profile of collection is finger print information, user can be obtained by calling the fingerprint input device of mobile terminalFingerprint, and the fingerprint characteristic that feature extraction obtains user is carried out to the fingerprint of user.
When the user profile of collection is facial information, the camera in mobile terminal is opened, gather face's figure of userAs information, and feature extraction is carried out to facial image information, obtain the face feature of user.
S102 ', obtains the current password of user input, and current password and the encrypted message for preserving are compared, ifThe two is inconsistent, then into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information.
Specifically, anti-theft modes can be divided into three-level, and every grade of anti-theft modes are controlled by different checking informations, and are performedThe lock operation of different stage, wherein:
One-level anti-theft modes can perform one-level lock operation by encrypted message control, that is, lock sensitive data, wherein, it is quickSense data can include but be limited to the private data of user and transaction payment data.
Two stage anti-theft pattern can be performed secondary latch and operated surely by finger print information control, that is, lock sensitive data, be movedThe current location information of terminal, and the current location information of mobile terminal is sent the mobile phone of the contact person pre-set to userIn.
Three-level anti-theft modes can be controlled by acoustic information and/face information, perform three-level lock operation, that is, lock all numbersAccording to, and send current sound information and/or current facial information to contact person.
In this embodiment, before the current password of user input is obtained, can also include:Determine the knowledge of encrypted messageOrder is not prior to checking information;And when checking information includes at least two information, determine the recognition sequence of checking information.
For example, encrypted message, finger print information, acoustic information and face information are saved in mobile terminal, then according to firstSecondary recognition code information, second identification finger print information, third time identification recognizes the identification of acoustic information and face information simultaneouslyOrder is identified, and enters the anti-theft modes of different stage according to recognition result.
Again for example, saving encrypted message and face information in mobile terminal, then according to face information after first encrypted messageRecognition sequence be identified, and according to recognition result enter different stage anti-theft modes.
When checking information includes at least two information, then current authentication information is obtained according to recognition sequence.For example, mobileFinger print information and acoustic information are included in the checking information of terminal, then according to first acquisition current finger print information, current sound of reentryingThe recognition sequence of message breath obtains current authentication information.
It should be noted that because acoustic information and/facial information can control three-level anti-theft modes, therefore, soundInformation and facial information have identical recognition sequence.
S103 ', compares current authentication information is corresponding with checking information, and enter different stage according to comparison resultAnti-theft modes, perform different stage lock operation.
In this embodiment, when checking information include finger print information when, then will obtain current finger print information and preserveFinger print information is compared, if the two is consistent, into one-level anti-theft modes, performs one-level lock operation, if the two is inconsistent,Then enter two stage anti-theft pattern, perform secondary latch and operate surely.
In this embodiment, when checking information include facial information when, then will obtain current facial information and preserveFacial information is compared, if the two is consistent, into two stage anti-theft pattern, is performed secondary latch and is operated surely, if the two is inconsistent,Then enter three-level anti-theft modes, perform three-level lock operation.
When checking information includes acoustic information, then the current sound information of acquisition and the acoustic information for preserving are comparedIt is right, if the two is consistent, into two stage anti-theft pattern, performs secondary latch and operate surely, it is antitheft into three-level if the two is inconsistentPattern, performs three-level lock operation.
In addition, when acoustic information and facial information is included in checking information, then obtaining current sound information and current facePortion's information, and by current sound information and current facial information and the acoustic information for preserving and face is corresponding compares, ifUnanimously, then into two stage anti-theft pattern, perform secondary latch and operate surely, if there are a pair of information inconsistent, into the antitheft mould of three-levelFormula, performs three-level lock operation.
Above-mentioned mobile terminal embodiment, obtains the current password of user input, by current password and the encrypted message for preservingCompare, and when comparing inconsistent, into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication letterBreath, and current authentication information and the checking information for preserving are compared, and the anti-of different stage is entered according to comparison resultRobber's pattern, performs the lock operation of different stage, thus, while full protection mobile terminal, for mobile terminal is providedThe anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and cause because maloperation cannot be using mobile wholeThe validated user at end can improve the experience of user using the partial function of mobile terminal.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically showThe description of example " or " some examples " etc. means to combine specific features, structure, material or spy that the embodiment or example are describedPoint is contained at least one embodiment of the invention or example.In this manual, to the schematic representation of above-mentioned term notIdentical embodiment or example must be directed to.And, the specific features of description, structure, material or feature can be with officeCombined in an appropriate manner in one or more embodiments or example.Additionally, in the case of not conflicting, the skill of this areaArt personnel can be tied the feature of the different embodiments or example described in this specification and different embodiments or exampleClose and combine.
Additionally, term " first ", " second " are only used for describing purpose, and it is not intended that indicating or implying relative importanceOr the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can express orImplicitly include at least one this feature.In the description of the invention, " multiple " is meant that at least two, such as two, threeIt is individual etc., unless otherwise expressly limited specifically.
Any process described otherwise above or method description in flow chart or herein is construed as, and expression includesIt is one or more for realizing specific logical function or process the step of the module of code of executable instruction, fragment or portionPoint, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussion suitableSequence, including function involved by basis by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the inventionEmbodiment person of ordinary skill in the field understood.
Represent in flow charts or logic and/or step described otherwise above herein, for example, being considered useIn the order list of the executable instruction for realizing logic function, in may be embodied in any computer-readable medium, forInstruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instructionThe system of row system, device or equipment instruction fetch and execute instruction) use, or with reference to these instruction execution systems, device or setIt is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or passThe dress that defeated program is used for instruction execution system, device or equipment or with reference to these instruction execution systems, device or equipmentPut.The more specifically example (non-exhaustive list) of computer-readable medium includes following:With the electricity that one or more are connected upConnecting portion (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only depositsReservoir (CDROM).In addition, computer-readable medium can even is that the paper that can thereon print described program or other are suitableMedium, because optical scanner for example can be carried out by paper or other media, then enters edlin, interpretation or if necessary with itHis suitable method is processed electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the invention can be realized with hardware, software, firmware or combinations thereof.Above-mentionedIn implementation method, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storageOr firmware is realized.If for example, realized with hardware, and in another embodiment, can be with well known in the artAny one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signalDiscrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), sceneProgrammable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method is carriedThe rapid hardware that can be by program to instruct correlation is completed, and described program can be stored in a kind of computer-readable storage mediumIn matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, during each functional unit in each embodiment of the invention can be integrated in a processing module, it is also possible toIt is that unit is individually physically present, it is also possible to which two or more units are integrated in a module.Above-mentioned integrated mouldBlock can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The integrated module is such asFruit is to realize in the form of software function module and as independent production marketing or when using, it is also possible to which storage is in a computerIn read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..Although having been shown above and retouchingEmbodiments of the invention are stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as to limit of the inventionSystem, one of ordinary skill in the art can be changed to above-described embodiment, change, replace and become within the scope of the inventionType.