CN104077510A - Unlocking device and method thereof - Google Patents

Unlocking device and method thereof Download PDF

Info

Publication number
CN104077510A
CN104077510A CN201310450058.1A CN201310450058A CN104077510A CN 104077510 A CN104077510 A CN 104077510A CN 201310450058 A CN201310450058 A CN 201310450058A CN 104077510 A CN104077510 A CN 104077510A
Authority
CN
China
Prior art keywords
electronic equipment
unlocking pin
described electronic
released state
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310450058.1A
Other languages
Chinese (zh)
Inventor
林俊佑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Tian Ming Information Technology Co Ltd
Original Assignee
Suzhou Tian Ming Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Tian Ming Information Technology Co Ltd filed Critical Suzhou Tian Ming Information Technology Co Ltd
Priority to CN201310450058.1A priority Critical patent/CN104077510A/en
Publication of CN104077510A publication Critical patent/CN104077510A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an unlocking device and a method thereof, both applied to an electronic device. The unlocking device is characterized by comprising a setting unit for setting a first unlocking password and a second unlocking password, a hiding unit for shielding at least one function in the electronic device and a calculation unit, wherein the first and second unlocking passwords both can be used for unlocking the electronic device; the unlocking device is further characterized in that when a user unlocks the electronic device by use of the unlocking passwords, if the calculation unit determines that the first unlocking password is used by the user, the electronic device enters a first unlocking state, in other words, at least one function in the electronic device is shielded by the hiding unit. Due to the adopted unlocking device, the user can set a plurality of unlocking passwords for the electronic device and can only use different functions of the electronic device by decoding the different passwords, in other words, partial functions can be shielded; the unlocking technique is capable of enhancing the security of the personal information of the user and also capable of enabling the user to freely use the functions of the electronic device.

Description

A kind of tripper and method thereof
Technical field
The present invention relates to a kind of tripper and method thereof, particularly a kind of tripper and method thereof of using a plurality of password maskable one electronic equipment partial functions.
Background technology
In the epoch of 21 century high speed development, electronic product (as computing machine and mobile phone) has become people's indispensable product of living.People can carry out indoor office by computing machine and process vital document, amusement etc., can contact by mobile phone, amusement etc., and electronic product has facilitated people's life, to people's life, has brought amusement.Traditionally, computing machine and mobile phone all adopt password with protection or shielding user's personal information and capsule information, file etc., i.e. the first input of user one password is again inputted this password and be take and determine the protection password that this password is computing machine and mobile phone.Therefore,, while only having this password of correct input, user begins to operate computing machine and mobile phone with shielding individual privacy and capsule information, file etc.
So, too complicated if user arranges above-mentioned guard of computer password, may cause user to forget Password or repeatedly input password mistake, so operation is very loaded down with trivial details, and then waste user's time is with memory cipher; Separately; consider cellphone subscriber's wish protection or shield above-mentioned those functions when inconvenience; need untie mobile phone lock-out state; make mobile phone in released state; now, user begins operating handset to shield those functions, and so operation is very loaded down with trivial details; and then waste user's time, even may reveal user's personal information.
Therefore, the inventor lacks effective function of shielding because commonly use tripper, feel the necessity that really has its improvement deeply, then with it, be engaged in for many years design and the professional manufacturing experience of association area, positive for relating to, a kind ofly use a plurality of passwords to study and improve with the electronic installation of masked segment function, under the discretion of each side's condition is considered, finally develop the present invention.
Summary of the invention
The present invention's fundamental purpose, is to provide a kind of tripper and method thereof, the effective partial function of screening electron device whereby, and then improve the protection to user profile.
In one of the present invention embodiment, a tripper, is applied to an electronic equipment, it is characterized in that, comprise: a setup unit is in order to set the first unlocking pin and the second unlocking pin, and described first, second unlocking pin all can be in order to electronic equipment described in release; One hidden unit is in order to shield at least one function in described electronic equipment; An and computing unit; It is characterized in that: when user uses unlocking pin to carry out release to described electronic equipment, if described computing unit judgement user uses described the first unlocking pin, described electronic equipment will enter the first released state, and at least one function in described electronic equipment will be shielded by described hidden unit.
In one of the present invention embodiment, described shielding comprises the function in described electronic equipment is encrypted and hides the function in described electronic equipment, and the described function of hiding in described electronic equipment is defined as function in described electronic equipment by the arbitrary interface there will not be in described electronic equipment.
In one of the present invention embodiment, when user uses unlocking pin to carry out release to described electronic equipment, if described computing unit judgement user uses described the second unlocking pin, described electronic equipment will enter the second released state, be the not start of described hidden unit, all functions in described electronic equipment all can be used.
In one of the present invention embodiment, described electronic equipment comprises computing machine.
In one of the present invention embodiment, described setup unit more can be set the 3rd unlocking pin, wherein, if described computing unit judgement user uses described the 3rd unlocking pin, described electronic equipment will enter the 3rd released state, and at least one function in described electronic equipment will be shielded by described hidden unit.
In one of the present invention embodiment, described the first released state with the function of the 3rd released state conductively-closed can be identical, part is identical or diverse function.
In one of the present invention embodiment, comprise step: set at least two group unlocking pins in order to remove the released state for the treatment of of described electronic equipment; When described electronic equipment is when until released state, described electronic equipment receives a unlocking pin from user side, and wherein, when until released state, described electronic equipment is except unlocking function, and all the other all functions all cannot be carried out; Judge whether described unlocking pin belongs to the first unlocking pin, if, enter the first released state, wherein, it is conductively-closed that the described electronic equipment in described the first released state has a function at least, if not, judge whether described unlocking pin belongs to the second unlocking pin, if so, enter the second released state, wherein, to have a function at least be conductively-closed to the described electronic equipment in described the second released state.
In one of the present invention embodiment, judging whether described unlocking pin belongs to after the second unlocking pin, if described unlocking pin does not belong to the second unlocking pin, not start, described electronic equipment still maintains and treats released state.
In one of the present invention embodiment, described the first released state with the function of the second released state conductively-closed can be identical, part is identical or diverse function.
In one of the present invention embodiment, more comprise the 3rd unlocking pin, wherein, at the described unlocking pin of judgement, not to belong to after described first, second unlocking pin, sentence the described unlocking pin of end and whether belong to described the 3rd unlocking pin, if, enter the 3rd released state, all functions of described electronic equipment there all are not conductively-closed and can normally use and show, if not, not start of described electronic equipment, described electronic equipment still maintains and treats released state.
In sum, in practice, tripper of the present invention relates to a plurality of passwords of use with protection or masked segment function.See through the present invention, user can arrange a plurality of unlocking pins to described electronic equipment, and in the corresponding masked segment function of the rear electronic equipment of deciphering, not only can increase userspersonal information's the secrecy while but also can arbitrarily use described electronic equipment.
Accompanying drawing explanation
Fig. 1 is the system architecture diagram of the embodiment of the present invention one.
Fig. 2 is the first unlocking pin schematic diagram of the embodiment of the present invention one
Fig. 3 is the second unlocking pin schematic diagram of the embodiment of the present invention one
Fig. 4 is the 3rd unlocking pin schematic diagram of the embodiment of the present invention one
Fig. 5 is the flow chart of steps of the embodiment of the present invention two.
Embodiment
This instructions mainly provides a kind of tripper, and it can be applicable to the electronic equipments such as computing machine, personal digital assistant, intelligent mobile phone, semi-intelligent type mobile phone and conventional mobile phone.See through the present invention, can a plurality of unlocking pins be set to described electronic equipment, after different password to decipher, user can only use the difference in functionality of described electronic equipment, and the confidentiality that this solution lock technology not only can increase userspersonal information simultaneously but also can freely use the function of described electronic equipment.
Below, with reference to graphic one of shown preferred embodiment, describe cooperation in detail feature of the present invention and effect; Please refer to Fig. 1, Fig. 1 is the system architecture diagram of the embodiment of the present invention one.The present invention is a kind of tripper, is applied to an electronic equipment, it is characterized in that, comprising: a setup unit is in order to set the first unlocking pin and the second unlocking pin, and described first, second unlocking pin all can be in order to electronic equipment described in release; One hidden unit is in order to shield at least one function in described electronic equipment; An and computing unit; It is characterized in that: when user uses unlocking pin to carry out release to described electronic equipment, if described computing unit judgement user uses described the first unlocking pin, described electronic equipment will enter the first released state, and at least one function in described electronic equipment will be shielded by described hidden unit.
Please refer to Fig. 2-4, Fig. 2 is the first unlocking pin schematic diagram of the embodiment of the present invention one, Fig. 3 is the second unlocking pin schematic diagram of the embodiment of the present invention one, Fig. 4 is the 3rd unlocking pin schematic diagram of the embodiment of the present invention one, when user uses unlocking pin to carry out release to described electronic equipment, if described computing unit judgement user uses described the second unlocking pin, described electronic equipment will enter the second released state, be the not start of described hidden unit, all functions in described electronic equipment all can be used.Described shielding comprises the function in described electronic equipment is encrypted and hides the function in described electronic equipment, and the described function of hiding in described electronic equipment is defined as function in described electronic equipment by the arbitrary interface there will not be in described electronic equipment.Further, described setup unit more can be set the 3rd unlocking pin, wherein, if described computing unit judgement user uses described the 3rd unlocking pin, described electronic equipment will enter the 3rd released state, and at least one function in described electronic equipment will be shielded by described hidden unit, if the judgement of described computing unit is not the 3rd unlocking pin, described electronic equipment will maintain treats released state, and described computing unit continues to determine whether first, second unlocking pin.In practical application, user can set more password to described electronic equipment according to demand, and the present invention is not limited to two or three unlocking pins.The function of described the first unlocking pin state and described the 3rd released state conductively-closed can be identical, part is identical or diverse function.
In concrete application, described tripper can be applicable to computing machine, and for example, user can set at least two described unlocking pins first according to demand, as described in the first unlocking pin and the second unlocking pin.When described user opens described computing machine, described computer interface is lock machine state, and occurs two groups of Password Input frames, when described user inputs the first unlocking pin, described computing machine will shield function of surfing the Net, but can apply other function, for example, open files different on computing machine; When described user inputs the second unlocking pin, user can arbitrarily use all functions of computer; Certainly, user also can arrange the 3rd unlocking pin to described electronic equipment according to demand, and when user inputs the 3rd unlocking pin, described computing machine can be the function that floppy disk in computing machine (also can be described as C dish) opened in shielding.
Please refer to Fig. 5, Fig. 5 is the flow chart of steps of the embodiment of the present invention two.The present invention more provides a kind of method of release, be applied to an electronic equipment, it is characterized in that, in the present embodiment, comprise step: step S10, user sets three groups of unlocking pins in order to remove the released state for the treatment of of described electronic equipment on electronic equipment, and described three groups of unlocking pins comprise the first unlocking pin, the second unlocking pin and the 3rd unlocking pin; Step S11; user opens described electronic equipment; described electronic equipment is in the described released state for the treatment of; electronic equipment from user side, receive one described in unlocking pin; wherein; described electronic equipment is in described during until released state, and described electronic equipment is except unlocking function, and it all cannot be carried out in all functions; Step S12, described electronic equipment judges whether described unlocking pin is the first unlocking pin; Step S13, if described the first unlocking pin, described electronic equipment enters one first released state, wherein, when described electronic equipment is during in described the first released state, at least one function of described electronic equipment is conductively-closed; Step S14, if not described the first unlocking pin continues to judge whether described unlocking pin is described the second unlocking pin; Step S15, if described the second unlocking pin, described electronic equipment enters one second released state, it is conductively-closed that the described electronic equipment in wherein said the second released state has a function at least; Step S16, if described unlocking pin is not described the second unlocking pin, not start of described electronic equipment, be that described electronic equipment still maintains and treats released state, and continue to sentence and hold described unlocking pin whether to belong to described the 3rd unlocking pin, step S17, if described the 3rd unlocking pin, enter one the 3rd released state, all functions of described electronic equipment there all are not conductively-closed and can normally use and show; Step S18, if not described the 3rd unlocking pin, not start of described electronic equipment, described electronic equipment still maintains and treats released state, described the first released state and the function of described the second released state conductively-closed can be identical, part is identical or diverse function.
The present invention can realize following advantage:
Adopt above-mentioned solution lock technology, because user can arrange the different function of the corresponding shielding of a plurality of described unlocking pins to described electronic equipment, not only can increase the secrecy while of user profile but also can arbitrarily use described electronic equipment, can very effectively avoid inadvertent disclosure.
Only the foregoing is only the present invention's preferred embodiment, the non-scope of patent protection that is intended to limit to the present invention, therefore such as use instructions of the present invention and the equivalence variation for it of graphic content institute, is all in like manner all contained within the scope of the present invention's rights protection, closes and gives Chen Ming.

Claims (10)

1. a tripper, is applied to an electronic equipment, it is characterized in that, comprising:
One setup unit is in order to set the first unlocking pin and the second unlocking pin, and described first, second unlocking pin all can be in order to electronic equipment described in release;
One hidden unit is in order to shield at least one function in described electronic equipment; And
One computing unit;
It is characterized in that:
When user uses unlocking pin to carry out release to described electronic equipment, if described computing unit judgement user uses described the first unlocking pin, described electronic equipment will enter the first released state, and at least one function in described electronic equipment will be shielded by described hidden unit.
2. a kind of tripper according to claim 1, it is characterized in that, described shielding comprises the function in described electronic equipment is encrypted and hides the function in described electronic equipment, and the described function of hiding in described electronic equipment is defined as function in described electronic equipment by the arbitrary interface there will not be in described electronic equipment.
3. a kind of tripper according to claim 1, it is characterized in that, when user uses unlocking pin to carry out release to described electronic equipment, if described computing unit judgement user uses described the second unlocking pin, described electronic equipment will enter the second released state, be the not start of described hidden unit, all functions in described electronic equipment all can be used.
4. a kind of tripper according to claim 3, is characterized in that, described electronic equipment comprises computing machine.
5. a kind of tripper according to claim 1, it is characterized in that, described setup unit more can be set the 3rd unlocking pin, wherein, if described computing unit judgement user uses described the 3rd unlocking pin, described electronic equipment will enter the 3rd released state, and at least one function in described electronic equipment will be shielded by described hidden unit.
6. a kind of tripper as claimed in claim 5, is characterized in that, described the first released state with the function of the 3rd released state conductively-closed can be identical, part is identical or diverse function.
7. a method for release, is applied to an electronic equipment, it is characterized in that, comprises step: set at least two group unlocking pins in order to remove the released state for the treatment of of described electronic equipment:
When described electronic equipment is when until released state, described electronic equipment receives a unlocking pin from user side, and wherein, when until released state, described electronic equipment is except unlocking function, and all the other all functions all cannot be carried out;
Judge whether described unlocking pin belongs to the first unlocking pin, if, enter the first released state, wherein, it is conductively-closed that the described electronic equipment in described the first released state has a function at least, if not, judge whether described unlocking pin belongs to the second unlocking pin, if so, enter the second released state, wherein, to have a function at least be conductively-closed to the described electronic equipment in described the second released state.
8. the method for a kind of release as claimed in claim 7, it is characterized in that, judging whether described unlocking pin belongs to after the second unlocking pin, if described unlocking pin does not belong to the second unlocking pin, not start, described electronic equipment still maintains and treats released state.
9. the method for a kind of release as claimed in claim 7, is characterized in that, described the first released state with the function of the second released state conductively-closed can be identical, part is identical or diverse function.
10. the method for a kind of release as claimed in claim 7, it is characterized in that, more comprise the 3rd unlocking pin, wherein, at the described unlocking pin of judgement, not to belong to after described first, second unlocking pin, sentence the described unlocking pin of end and whether belong to described the 3rd unlocking pin, if, enter the 3rd released state, the all functions that are described electronic equipment there all are not conductively-closed and can normally use and show, if not, not start of described electronic equipment, described electronic equipment still maintains and treats released state.
CN201310450058.1A 2013-09-25 2013-09-25 Unlocking device and method thereof Pending CN104077510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310450058.1A CN104077510A (en) 2013-09-25 2013-09-25 Unlocking device and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310450058.1A CN104077510A (en) 2013-09-25 2013-09-25 Unlocking device and method thereof

Publications (1)

Publication Number Publication Date
CN104077510A true CN104077510A (en) 2014-10-01

Family

ID=51598761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310450058.1A Pending CN104077510A (en) 2013-09-25 2013-09-25 Unlocking device and method thereof

Country Status (1)

Country Link
CN (1) CN104077510A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Control method, device, storage medium and the mobile terminal of application program

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN102609165A (en) * 2011-01-24 2012-07-25 广州三星通信技术研究有限公司 Mobile terminal having touch screen and mobile terminal mode control method
CN102855426A (en) * 2012-08-03 2013-01-02 广东欧珀移动通信有限公司 User management method based on Android
CN103034813A (en) * 2012-11-26 2013-04-10 蓝盾信息安全技术股份有限公司 Method and system for protecting data of mobile terminal
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
US20130167224A1 (en) * 2011-12-22 2013-06-27 International Business Machines Corporation Lock function handling for information processing devices

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609165A (en) * 2011-01-24 2012-07-25 广州三星通信技术研究有限公司 Mobile terminal having touch screen and mobile terminal mode control method
US20130167224A1 (en) * 2011-12-22 2013-06-27 International Business Machines Corporation Lock function handling for information processing devices
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN102855426A (en) * 2012-08-03 2013-01-02 广东欧珀移动通信有限公司 User management method based on Android
CN103034813A (en) * 2012-11-26 2013-04-10 蓝盾信息安全技术股份有限公司 Method and system for protecting data of mobile terminal
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Control method, device, storage medium and the mobile terminal of application program

Similar Documents

Publication Publication Date Title
CN104205114B (en) System and method for providing safe interprocess communication
CN102136048B (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
CN103155528A (en) Securing a mobile computing device
CN103902862A (en) Mobile device management method and device and mobile device
CN102932540A (en) Mobile terminal and stealing prevention method thereof
CN110378097A (en) Ensure sensing data safety
CN102970139A (en) Data security validation method and device
CN104008346A (en) Method and device for starting privacy mode of data processing device
CN106663163A (en) Securing audio communications
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN103577732A (en) Information processing method and device and electronic device
CN104091133A (en) Method for protecting security of terminal, terminal and system
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN103761201B (en) Terminal applies event-handling method and device
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN107784207A (en) Display methods, device, equipment and the storage medium at financial APP interfaces
CN104144411A (en) Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal
CN104834867B (en) The method and system of electronic equipment privacy protection are realized based on bluetooth
CN104134024B (en) Method for protecting mobile terminal privacy and system
CN104751028B (en) The method and device of application program encryption, decryption
CN106775326A (en) A kind of screen control method and device for mobile terminal
EP3866039A1 (en) Method and system for protecting authentication credentials
CN105516500A (en) Method and system for selecting device mode
CN112636914B (en) Identity verification method, identity verification device and smart card
CN108155993A (en) The data ciphering method and device of VSIM cards

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141001

RJ01 Rejection of invention patent application after publication