CN105787318B - Access method, access mechanism and the mobile terminal of user domain - Google Patents

Access method, access mechanism and the mobile terminal of user domain Download PDF

Info

Publication number
CN105787318B
CN105787318B CN201610182256.8A CN201610182256A CN105787318B CN 105787318 B CN105787318 B CN 105787318B CN 201610182256 A CN201610182256 A CN 201610182256A CN 105787318 B CN105787318 B CN 105787318B
Authority
CN
China
Prior art keywords
information
user
access
user domain
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610182256.8A
Other languages
Chinese (zh)
Other versions
CN105787318A (en
Inventor
崔宇
王晓菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610182256.8A priority Critical patent/CN105787318B/en
Priority to PCT/CN2016/080617 priority patent/WO2017166359A1/en
Publication of CN105787318A publication Critical patent/CN105787318A/en
Application granted granted Critical
Publication of CN105787318B publication Critical patent/CN105787318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Medical Informatics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of access method of user domain, access mechanism and mobile terminals, wherein the access method of user domain, including:Hide the access entrance in designated user domain;It detects whether to get for triggering the triggering information for accessing to the designated user domain;Determining that the user to accessing the designated user domain carries out authentication when getting the triggering information;If passing through to the authentication of the user, the designated user domain is run.Technical solution through the invention, it hides the access entrance of user domain and accesses password for user domain setting is dynamic, efficiently avoid the problems such as access mode confidentiality is poor, divulging a secret property is high in the related technology, the safety for substantially increasing the entire access process of user domain meets the actual demand of user.

Description

Access method, access mechanism and the mobile terminal of user domain
Technical field
The present invention relates to field of terminal technology, in particular to a kind of access method of user domain, a kind of user domain Access mechanism and a kind of mobile terminal.
Background technology
With the development of mobile terminal, the function that intelligent terminal has is more and more, and application scenarios emerge one after another, same with this When, safety issue also increasingly attracts attention.In the related technology, in order to ensure in mobile terminal certain applications and information Safety can separately build a security level higher than the security domain of canonical domain to store these applications and information except canonical domain, lead to The icon of the security domain can be often set in canonical domain, using the access entrance as the security domain, user to the security domain into It, can be by clicking icon, and after inputting correctly verification password, into the security domain when row accesses, but the visit of this security domain The mode of asking has the following disadvantages:
One, crypticity is poor:Anyone after click, can attempt password authentification it can be seen that security domain icon.
Two, divulging a secret property height:Due to having the presence of the access entrances such as icon, process of the user in input password on interface In, password may be caused to reveal, there are prodigious security risks.
Therefore, how to realize becomes technical problem urgently to be resolved hurrily to the secure access of user domain.
Invention content
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of access scheme of new user domain has The problems such as access mode confidentiality is poor, divulging a secret property is high in the related technology is avoided to effect, user domain is substantially increased and entirely accesses The safety of process meets the actual demand of user.
In view of this, the present invention proposes a kind of access method of user domain, including:The access for hiding designated user domain enters Mouthful;It detects whether to get for triggering the triggering information for accessing to the designated user domain;Described in determining get When triggering information, the user to accessing the designated user domain carries out authentication;If passing through to the authentication of the user, Then run the designated user domain.
In the technical scheme, by hiding the access entrance of user domain, (user can be according to actual demand, in terminal Any user domain is hidden, and is especially stored with the user domain of user's private information or some payment applications etc.), hide user After the access entrance in domain, the icon etc. of the user domain is not shown on any interface of terminal so that in addition to user All other men are difficult the presence for knowing the user domain, confidentiality difference when efficiently solving user's domain browsing in the related technology Problem, and when user has requirements for access to the designated user domain for having hidden access entrance, terminal is obtained by detecting whether It gets for triggering the triggering information to access to designated user domain, and when determination gets triggering information, access is referred to The user for determining user domain carries out authentication, to pass through to the authentication of user, designated user domain of reruning, due to user domain Access entrance hidden, to user carry out authentication when, for verification information input by user, other people are difficult that will verify Information and the user domain hidden are associated, and reduce the probability of password leakage, it is ensured that the entire access process of user domain Safety, meet secret and the demand for security of user to user domain browsing process.
In the above-mentioned technical solutions, it is preferable that detect whether to get and access to designated user domain for triggering The step of triggering information, specifically includes:The character information input by user is obtained, and judges the character information and predetermined word Whether symbol information matches, and when judging the character information with the preset characters information match, determines described in getting Trigger information;Or the information of user's continuous several times input is obtained, and judge whether the information that the user inputs every time is equal Match with presupposed information, when the information for judging that the user inputs every time matches with the presupposed information, determination obtains Get the triggering information.
In the technical scheme, after the access entrance of user domain is hidden, when user needs to access the user domain, can pass through Number of ways is realized:It can input preset characters information (preset characters information can be configured by user preset), such as Urgent call interface inputing characters information " * * ## ";Can also continuous several times input same presupposed information (presupposed information can Pre-set by user), it inputs same presupposed information continuous 2 times such as in unlock interface, presupposed information is inputted in first time Prompt messages such as " input error please retry " when completion, can be shown simultaneously, continue to input same presupposed information for the second time, it is whole A process has certain fascination to other people, therefore can improve safety.
In any of the above-described technical solution, it is preferable that the user to accessing the designated user domain carries out authentication The step of, it specifically includes:At least one unlock element in predetermined interface is obtained, and according at least one unlock element, Calculate the access password in the designated user domain;Obtain the verification information input by user;Judge the verification information and institute It states and accesses whether password matches;If it is determined that the verification information and the access code matches, it is determined that the user Authentication pass through.
In the technical scheme, it is contemplated that if the access password of user domain is fixed, each access of user can all input same A password may have the security risk of password leakage, therefore by obtaining at least one unlock element in predetermined interface, And according at least one unlock element, calculate the access password in designated user domain so that the access password of user domain, which is in, to be changed State, is not fixed setting, user when accessing will not fixed input password, efficiently avoid password leakage.Wherein, it unlocks Element can be time, date, character information etc. in predetermined interface.
In any of the above-described technical solution, it is preferable that according at least one unlock element, calculate the specified use It the step of access password in family domain, specifically includes:Determine that each of described at least one unlock element unlock element is corresponding Preset password create-rule;It is generated according at least one unlock element and the corresponding preset password of each unlock element Rule calculates the access password.
It in the technical scheme, can be especially by least one unlock element and each unlock when calculating access password Element corresponding preset password create-rule calculates, wherein unlock element can be time in predetermined interface, date, word Information etc. is accorded with, for example, with the time (10:51) as unlock element, rule are generated using the method for falling row as corresponding preset password Then, then it is " 1501 " that current verification password, which is calculated, this example is only used for illustrating to how to calculate verification password, and Any restriction is not done, and user can set the quantity of unlock element according to actual demand, and corresponding with each unlock element Preset password create-rule, each preset password for unlocking element can be identical at rule, can also be different.
In any of the above-described technical solution, it is preferable that judge the verification information and the access password whether phase Before the step of matching, further include:Detect described in whether being got within the predetermined time after getting the triggering information Verification information;If it is determined that getting the verification information within the predetermined time, then the judgement verification information is executed The step of whether being matched with the access password.
In the technical scheme, by detect get triggering information after predetermined time in get verification When information, then further matching verification is executed, on the one hand ensures timeliness when verification, on the other hand also avoid backstage one It is directly in state to be verified, reduces system operation load.
According to the second aspect of the invention, it is proposed that a kind of access mechanism of user domain, including:Hidden unit, for hidden Hide the access entrance in designated user domain;First detection unit, for detecting whether getting for triggering to the designated user The triggering information that domain accesses;Identity authenticating unit, for determine get the triggering information when, to the access finger The user for determining user domain carries out authentication;Processing unit, for being tested the identity of the user in the identity authenticating unit When card passes through, the designated user domain is run.
In the technical scheme, by hiding the access entrance of user domain, (user can be according to actual demand, in terminal Any user domain is hidden, and is especially stored with the user domain of user's private information or some payment applications etc.), hide user After the access entrance in domain, the icon etc. of the user domain is not shown on any interface of terminal so that in addition to user All other men are difficult the presence for knowing the user domain, confidentiality difference when efficiently solving user's domain browsing in the related technology Problem, and when user has requirements for access to the designated user domain for having hidden access entrance, terminal is obtained by detecting whether It gets for triggering the triggering information to access to designated user domain, and when determination gets triggering information, access is referred to The user for determining user domain carries out authentication, to pass through to the authentication of user, designated user domain of reruning, due to user domain Access entrance hidden, to user carry out authentication when, for verification information input by user, other people are difficult that will verify Information and the user domain hidden are associated, and reduce the probability of password leakage, it is ensured that the entire access process of user domain Safety, meet secret and the demand for security of user to user domain browsing process.
In the above-mentioned technical solutions, it is preferable that the first detection unit is specifically used for:Obtain the word input by user Accord with information, and judge whether the character information matches with preset characters information, when the judgement character information with it is described pre- If character information matches, determination gets the triggering information;Or the information of user's continuous several times input is obtained, and Judge whether the information that the user inputs every time matches with presupposed information, when the information for judging that the user inputs every time When matching with the presupposed information, determination gets the triggering information.
In the technical scheme, after the access entrance of user domain is hidden, when user needs to access the user domain, can pass through Number of ways is realized:It can input preset characters information (preset characters information can be configured by user preset), such as Urgent call interface inputing characters information " * * ## ";Can also continuous several times input same presupposed information (presupposed information can Pre-set by user), it inputs same presupposed information continuous 2 times such as in unlock interface, presupposed information is inputted in first time Prompt messages such as " input error please retry " when completion, can be shown simultaneously, continue to input same presupposed information for the second time, it is whole A process has certain fascination to other people, therefore can improve safety.
In any of the above-described technical solution, it is preferable that the identity authenticating unit includes:First acquisition unit is used for Obtain at least one unlock element in predetermined interface;Computing unit, for according at least one unlock element, calculating institute State the access password in designated user domain;Second acquisition unit, for obtaining the verification information input by user;Judging unit, For judging whether the verification information matches with the access password;Determination unit, for judging in the judging unit When the verification information is with the access code matches, determination passes through the authentication of the user.
In the technical scheme, it is contemplated that if the access password of user domain is fixed, each access of user can all input same A password may have the security risk of password leakage, therefore by obtaining at least one unlock element in predetermined interface, And according at least one unlock element, calculate the access password in designated user domain so that the access password of user domain, which is in, to be changed State, is not fixed setting, user when accessing will not fixed input password, efficiently avoid password leakage.Wherein, it unlocks Element can be time, date, character information etc. in predetermined interface.
In any of the above-described technical solution, it is preferable that the computing unit is specifically used for:Determine at least one solution Lock the corresponding preset password create-rule of each of element unlock element;According at least one unlock element and described every The corresponding preset password create-rule of a unlock element, calculates the access password.
It in the technical scheme, can be especially by least one unlock element and each unlock when calculating access password Element corresponding preset password create-rule calculates, wherein unlock element can be time in predetermined interface, date, word Information etc. is accorded with, for example, with the time (10:51) as unlock element, rule are generated using the method for falling row as corresponding preset password Then, then it is " 1501 " that current verification password, which is calculated, this example is only used for illustrating to how to calculate verification password, and Any restriction is not done, and user can set the quantity of unlock element according to actual demand, and corresponding with each unlock element Preset password create-rule, each preset password for unlocking element can be identical at rule, can also be different.
In any of the above-described technical solution, it is preferable that further include:Second detection unit, for detecting getting It states in the predetermined time after triggering information and whether gets the verification information;The judging unit is specifically used for described When second detection unit determination gets the verification information within the predetermined time, the verification information and the visit are judged Ask whether password matches.
In the technical scheme, by detect get triggering information after predetermined time in get verification When information, then further matching verification is executed, on the one hand ensures timeliness when verification, on the other hand also avoid backstage one It is directly in state to be verified, reduces system operation load.
According to the third aspect of the invention we, it is also proposed that a kind of mobile terminal, including:Such as any one of above-mentioned technical proposal The access mechanism of the user domain.
By above technical scheme, hides the access entrance of user domain and access password for user domain setting is dynamic, have The problems such as access mode confidentiality is poor, divulging a secret property is high in the related technology is avoided to effect, user domain is substantially increased and entirely accesses The safety of process meets the actual demand of user.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the access method of user domain according to an embodiment of the invention;
Fig. 2 shows the schematic block diagrams of the access mechanism of user domain according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of mobile terminal according to an embodiment of the invention;
Fig. 4 A and Fig. 4 B show the interface schematic diagram of mobile terminal according to an embodiment of the invention;
Fig. 5 shows the schematic flow diagram of the access method of user domain according to another embodiment of the invention.
Specific implementation mode
To better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real Mode is applied the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the access method of user domain according to an embodiment of the invention.
As shown in Figure 1, the access method of user domain according to an embodiment of the invention, including:
Step 102, the access entrance in designated user domain is hidden;
Step 104, it detects whether to get for triggering the triggering information for accessing to the designated user domain;
Step 106, determining that the user to accessing the designated user domain carries out identity when getting the triggering information Verification;
Step 108, if passing through to the authentication of the user, the designated user domain is run.
In the technical scheme, by hiding the access entrance of user domain, (user can be according to actual demand, in terminal Any user domain is hidden, and is especially stored with the user domain of user's private information or some payment applications etc.), hide user After the access entrance in domain, the icon etc. of the user domain is not shown on any interface of terminal so that in addition to user All other men are difficult the presence for knowing the user domain, confidentiality difference when efficiently solving user's domain browsing in the related technology Problem, and when user has requirements for access to the designated user domain for having hidden access entrance, terminal is obtained by detecting whether It gets for triggering the triggering information to access to designated user domain, and when determination gets triggering information, access is referred to The user for determining user domain carries out authentication, to pass through to the authentication of user, designated user domain of reruning, due to user domain Access entrance hidden, to user carry out authentication when, for verification information input by user, other people are difficult that will verify Information and the user domain hidden are associated, and reduce the probability of password leakage, it is ensured that the entire access process of user domain Safety, meet secret and the demand for security of user to user domain browsing process.
In the above-mentioned technical solutions, it is preferable that detect whether to get and access to designated user domain for triggering The step of triggering information, specifically includes:The character information input by user is obtained, and judges the character information and predetermined word Whether symbol information matches, and when judging the character information with the preset characters information match, determination has got institute State triggering information;Or the information of user's continuous several times input is obtained, and judge information that the user inputs every time is whether Match with presupposed information, when the information for judging that the user inputs every time matches with the presupposed information, determines The triggering information is got.
In the technical scheme, after the access entrance of user domain is hidden, when user needs to access the user domain, can pass through Number of ways is realized:It can input preset characters information (preset characters information can be configured by user preset), such as Urgent call interface inputing characters information " * * ## ";Can also continuous several times input same presupposed information (presupposed information can Pre-set by user), it inputs same presupposed information continuous 2 times such as in unlock interface, presupposed information is inputted in first time Prompt messages such as " input error please retry " when completion, can be shown simultaneously, continue to input same presupposed information for the second time, it is whole A process has certain fascination to other people, therefore can improve safety.
In any of the above-described technical solution, it is preferable that the user to accessing the designated user domain carries out authentication The step of, it specifically includes:At least one unlock element in predetermined interface is obtained, and according at least one unlock element, Calculate the access password in the designated user domain;Obtain the verification information input by user;Judge the verification information and institute It states and accesses whether password matches;If it is determined that the verification information and the access code matches, it is determined that the user Authentication pass through.
In the technical scheme, it is contemplated that if the access password of user domain is fixed, each access of user can all input same A password may have the security risk of password leakage, therefore by obtaining at least one unlock element in predetermined interface, And according at least one unlock element, calculate the access password in designated user domain so that the access password of user domain, which is in, to be changed State, is not fixed setting, user when accessing will not fixed input password, efficiently avoid password leakage.Wherein, it unlocks Element can be time, date, character information etc. in predetermined interface.
In any of the above-described technical solution, it is preferable that according at least one unlock element, calculate the specified use It the step of access password in family domain, specifically includes:Determine that each of described at least one unlock element unlock element is corresponding Preset password create-rule;It is generated according at least one unlock element and the corresponding preset password of each unlock element Rule calculates the access password.
It in the technical scheme, can be especially by least one unlock element and each unlock when calculating access password Element corresponding preset password create-rule calculates, wherein unlock element can be time in predetermined interface, date, word Information etc. is accorded with, for example, with the time (10:51) as unlock element, rule are generated using the method for falling row as corresponding preset password Then, then it is " 1501 " that current verification password, which is calculated, this example is only used for illustrating to how to calculate verification password, and Any restriction is not done, and user can set the quantity of unlock element according to actual demand, and corresponding with each unlock element Preset password create-rule, each preset password for unlocking element can be identical at rule, can also be different.
In any of the above-described technical solution, it is preferable that judge the verification information and the access password whether phase Before the step of matching, further include:Detect described in whether being got within the predetermined time after getting the triggering information Verification information;If it is determined that getting the verification information within the predetermined time, then the judgement verification information is executed The step of whether being matched with the access password.
In the technical scheme, by detect get triggering information after predetermined time in get verification When information, then further matching verification is executed, on the one hand ensures timeliness when verification, on the other hand also avoid backstage one It is directly in state to be verified, reduces system operation load.
Fig. 2 shows the schematic block diagrams of the access mechanism of user domain according to an embodiment of the invention.
As shown in Fig. 2, the access mechanism 200 of user domain according to an embodiment of the invention, including:Hidden unit 202, One detection unit 204, identity authenticating unit 206 and processing unit 208.
Wherein, hidden unit 202, the access entrance for hiding designated user domain;First detection unit 204, for examining Whether survey gets for triggering the triggering information to access to the designated user domain;Identity authenticating unit 206 is used for Determine that the user to accessing the designated user domain carries out authentication when getting the triggering information;Processing unit 208, For the identity authenticating unit to the authentication of the user by when, run the designated user domain.
In the technical scheme, by hiding the access entrance of user domain, (user can be according to actual demand, in terminal Any user domain is hidden, and is especially stored with the user domain of user's private information or some payment applications etc.), hide user After the access entrance in domain, the icon etc. of the user domain is not shown on any interface of terminal so that in addition to user All other men are difficult the presence for knowing the user domain, confidentiality difference when efficiently solving user's domain browsing in the related technology Problem, and when user has requirements for access to the designated user domain for having hidden access entrance, terminal is obtained by detecting whether It gets for triggering the triggering information to access to designated user domain, and when determination gets triggering information, access is referred to The user for determining user domain carries out authentication, to pass through to the authentication of user, designated user domain of reruning, due to user domain Access entrance hidden, to user carry out authentication when, for verification information input by user, other people are difficult that will verify Information and the user domain hidden are associated, and reduce the probability of password leakage, it is ensured that the entire access process of user domain Safety, meet secret and the demand for security of user to user domain browsing process.
In the above-mentioned technical solutions, it is preferable that the first detection unit 204 is specifically used for:Obtain user's input Character information, and judge whether the character information matches with preset characters information, when judging the character information and institute When stating preset characters information match, determination has got the triggering information;Or obtain user's continuous several times input Information, and judge whether the information that the user inputs every time matches with presupposed information, when judgement, the user is defeated every time When the information entered matches with the presupposed information, determination has got the triggering information.
In the technical scheme, after the access entrance of user domain is hidden, when user needs to access the user domain, can pass through Number of ways is realized:It can input preset characters information (preset characters information can be configured by user preset), such as Urgent call interface inputing characters information " * * ## ";Can also continuous several times input same presupposed information (presupposed information can Pre-set by user), it inputs same presupposed information continuous 2 times such as in unlock interface, presupposed information is inputted in first time Prompt messages such as " input error please retry " when completion, can be shown simultaneously, continue to input same presupposed information for the second time, it is whole A process has certain fascination to other people, therefore can improve safety.
In any of the above-described technical solution, it is preferable that the identity authenticating unit 206 includes:First acquisition unit 206A, for obtaining at least one unlock element in predetermined interface;Computing unit 206B, for according at least one solution Element is locked, the access password in the designated user domain is calculated;Second acquisition unit 206C, for obtaining described input by user test Demonstrate,prove information;Judging unit 206D, for judging whether the verification information matches with the access password;Determination unit 206E, for when the judging unit judges the verification information with the access code matches, determining to the user Authentication pass through.
In the technical scheme, it is contemplated that if the access password of user domain is fixed, each access of user can all input same A password may have the security risk of password leakage, therefore by obtaining at least one unlock element in predetermined interface, And according at least one unlock element, calculate the access password in designated user domain so that the access password of user domain, which is in, to be changed State, is not fixed setting, user when accessing will not fixed input password, efficiently avoid password leakage.Wherein, it unlocks Element can be time, date, character information etc. in predetermined interface.
In any of the above-described technical solution, it is preferable that the computing unit 206B is specifically used for:At least one described in determining Each of a unlock element unlocks the corresponding preset password create-rule of element;According at least one unlock element and institute The corresponding preset password create-rule of each unlock element is stated, the access password is calculated.
It in the technical scheme, can be especially by least one unlock element and each unlock when calculating access password Element corresponding preset password create-rule calculates, wherein unlock element can be time in predetermined interface, date, word Information etc. is accorded with, for example, with the time (10:51) as unlock element, rule are generated using the method for falling row as corresponding preset password Then, then it is " 1501 " that current verification password, which is calculated, this example is only used for illustrating to how to calculate verification password, and Any restriction is not done, and user can set the quantity of unlock element according to actual demand, and corresponding with each unlock element Preset password create-rule, each preset password for unlocking element can be identical at rule, can also be different.
In any of the above-described technical solution, it is preferable that further include:Second detection unit 210 is being got for detecting The verification information whether is got in predetermined time after the triggering information;The judging unit 206D, is specifically used for When the determination of the second detection unit 210 gets the verification information within the predetermined time, the verification letter is judged Whether breath matches with the access password.
In the technical scheme, by detect get triggering information after predetermined time in get verification When information, then further matching verification is executed, on the one hand ensures timeliness when verification, on the other hand also avoid backstage one It is directly in state to be verified, reduces system operation load.
Fig. 3 shows the schematic block diagram of mobile terminal according to an embodiment of the invention.
As shown in figure 3, mobile terminal 300 according to an embodiment of the invention, including:The visit of user domain as shown in Figure 2 Ask device 200.
Technical scheme of the present invention is described further below in conjunction with Fig. 4 A, Fig. 4 B and Fig. 5.
In the present embodiment, initial phase:Can be in the terminal " be arranged->In screen locking " setting option, increase by one specially Door handles " security domain unlatching " option of safe domain policy, can be configured for security domain opening operation, specifically include " guide The mode of password " selects, the setting of " guide's password ", the algorithm setting of " security password " etc., while being carried out to the security domain hidden Setting is hidden, i.e., does not show the access entrance (icon of such as security domain of the security domain on any interface in the terminal Identification information), the incidence relation of " guide's password " between security domain can be arranged in user, so that mobile terminal is in subsequent processing mistake Cheng Zhong executes access of the triggering to security domain according to " guide's password ".
Wherein, the effect of " guide's password " is to open " first waveguide mode ":Notify system user that will attempt to enter " security domain ", Preparation related to this progress, obtains currently such as backstage pull-up related content, according to algorithm set by user and relevant information " security password ", the input password etc. for preparing verification user.
" guide's password " is divided into two kinds:
I:" prefix type guide password "
As shown in Figure 4 A, there is " urgent call " function 402 on locking screen interface, can enter after clicking 402 and " promptly exhale Cry " interface, as hidden close security domain unlock interface, not only have very high concealment, further increase password setting Operable space.
As shown in Figure 4 B, at " urgent call " interface, " the prefix password " of setting is inputted, such as " * * ## ", opens " first guided mode Formula ", system can calculate " security password " at this time automatically, and user can directly at " prefix password ", validation information carries out afterwards Verification, if " security password " successful match that verification password input by user and system-computed go out, can enter security domain.
II:" confusing type guide password "
The setting of " confusing type guide password " can be based on normal locking screen interface, such as figure unlock interface, number unlock Interface etc., setting rule is identical as general unlocking pin, difference lies in:When inputting " confusing type guide password " first, meeting Prompt cipher input error can open " first waveguide mode " after need to inputting same " confusing type guide password " again, carry out The backstage of security domain prepares, and generally after startup " first waveguide mode ", can jump to " urgent call " interface, pass through " urgent call " Interface receives verification password input by user, further to be verified.
Startup " first waveguide mode " scheduled duration (i.e. from the scheduled duration after input " guiding password ", the pre- timing Length can be arranged by User Defined or system default) in judge whether to receive verification password input by user, if pre- more than this The long input operation for not carrying out verification password of timing, will move out " first waveguide mode ", even if hereafter inputting correctly verification password, Also it cannot get the verification of system.
" security password " that system-computed goes out is after entering " first waveguide mode ", for the verification password of security domain, not adopt With fixed password, in combination with the specify information on Keyguard (keypad lock) interface, (specify information can be set by User Defined Set, such as can be date, time and the screen locking information on screen) carry out algorithmic form password setting.
It is such as illustrated for designating the information as the current date and time on locking screen interface, such as current time of day For:2016.01.29 12:31:
Algorithm (i.e. preset password create-rule) is illustrated:
Arrange method:By current time of day (2016.01.29 12:31) row of falling, is set as " security password ", then obtains " peace Full password " is " 13 21 92 10 6102 ", and user is in practical operation, as long as the verification password of input is " 13 21 92 10 6102 ", you can access safety domain, operation are relatively simple.
Counter-point:User can be in the Initialize installation stage, according to itself operating habit and demand, arbitrary setting contraposition rule Then, the present embodiment is illustrated with following contrapositive rule:From left to right, take respectively 4 be a unit (if " 2016 " be one group, " 0129 " is one group, and " 1231 " are one group), then it is classified as 2 pair of 2 digit, the operation of ten and position are carried out respectively, with additive For:20,16 correspond to and are added (2+1,0+6), and part contraposition of month and day is added (0+2,1+9), when be added (1+ with bit-by-bit is divided 3,2+1) it is " 362 10 43 ", to obtain " security password ".
Pinyin method:Based on customized screen locking information, it is password to take the corresponding number of its phonetic.Such as " welcoming you " (HuanYingNi), then it is " 4,826 9,464 64 " to obtain " security password ", it is of course also possible to which letter is arranged " HuanYingNi " is " security password ".
The specifically processing procedure when implementing, as shown in figure 5, including:
Step 502, judge whether to be in locking screen interface, if so, executing step 504;Otherwise, step 516 is executed.
Step 504, it judges whether there is " prefix type guide password " or " confusing type guide password " to be verified, if so, holding Row step 506;Otherwise, step 516 is executed.
Step 506, " first waveguide mode " is opened, and calculates by set algorithm and specify information that current " safety is close Code ".
Step 508, judge in the scheduled duration of startup " first waveguide mode ", if it is close to receive verification input by user Code, if so, executing step 510;Otherwise, step 512 is executed.
Step 510, judge whether current " security password " and verification password input by user match, if so, executing step 514;Otherwise, step 516 is executed.
Step 512, it exits " first waveguide mode ".
Step 514, it runs and enters security domain.
Step 516, forbid accessing or entering security domain.
By above-described embodiment, Keyguard (keypad lock) can be made full use of to apply, retain user's use habit On the basis of, the hiding and encryption of security domain is realized well, and there is very high safety and practicability, can largely carry Rise the usage experience of user.
It is described in detail technical scheme of the present invention above in association with attached drawing, technical scheme of the present invention proposes a kind of new The access scheme of user domain, by hiding the access entrance of user domain and accessing password for user domain setting is dynamic, effectively The problems such as access mode confidentiality is poor, divulging a secret property is high in the related technology is avoided, the entire access process of user domain is substantially increased Safety, meet the actual demand of user.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (9)

1. a kind of access method of user domain, which is characterized in that including:
Hide the access entrance in designated user domain;
It detects whether to get for triggering the triggering information for accessing to the designated user domain;
Determining that the user to accessing the designated user domain carries out authentication when getting the triggering information;
If passing through to the authentication of the user, the designated user domain is run;
The step of user to accessing the designated user domain carries out authentication, specifically includes:
At least one unlock element in predetermined interface is obtained, and according at least one unlock element, is calculated described specified The access password of user domain;
Obtain the verification information input by user;
Judge whether the verification information matches with the access password;
If it is determined that the verification information and the access code matches, it is determined that pass through to the authentication of the user;
Wherein, at least one unlock element is time, date or the character information in predetermined interface.
2. the access method of user domain according to claim 1, which is characterized in that detect whether to get for triggering pair It the step of triggering information that the designated user domain accesses, specifically includes:
The character information input by user is obtained, and judges whether the character information matches with preset characters information, when When judging the character information with the preset characters information match, determination gets the triggering information;Or
Obtain the information of user's continuous several times input, and judge information that the user inputs every time whether with default letter Manner of breathing matches, and when the information for judging that the user inputs every time matches with the presupposed information, determines described in getting Trigger information.
3. the access method of user domain according to claim 1, which is characterized in that according at least one unlock member Element, specifically includes the step of calculating the access password in the designated user domain:
Determine the corresponding preset password create-rule of each of described at least one unlock element unlock element;
According at least one unlock element and the corresponding preset password create-rule of each unlock element, described in calculating Access password.
4. the access method of user domain according to any one of claim 1 to 3, which is characterized in that tested described in judgement Before the step of whether card information matches with the access password, further include:
It detects and whether gets the verification information within the predetermined time after getting the triggering information;
If it is determined that get the verification information within the predetermined time, then execute it is described judge the verification information with it is described The step of whether password matches accessed.
5. a kind of access mechanism of user domain, which is characterized in that including:
Hidden unit, the access entrance for hiding designated user domain;
First detection unit, for detecting whether getting for triggering the triggering letter to access to the designated user domain Breath;
Identity authenticating unit, for determine get the triggering information when, to the user in the access designated user domain into Row authentication;
Processing unit, for the identity authenticating unit to the authentication of the user by when, run the specified use Family domain;
The identity authenticating unit includes:
First acquisition unit, for obtaining at least one unlock element in predetermined interface;
Computing unit, for according at least one unlock element, calculating the access password in the designated user domain;
Second acquisition unit, for obtaining the verification information input by user;
Judging unit, for judging whether the verification information matches with the access password;
Determination unit is used for when the judging unit judges the verification information with the access code matches, determining pair The authentication of the user passes through;
Wherein, at least one unlock element is time, date or the character information in predetermined interface.
6. the access mechanism of user domain according to claim 5, which is characterized in that the first detection unit is specifically used In:
The character information input by user is obtained, and judges whether the character information matches with preset characters information, when When judging the character information with the preset characters information match, determination gets the triggering information;Or
Obtain the information of user's continuous several times input, and judge information that the user inputs every time whether with default letter Manner of breathing matches, and when the information for judging that the user inputs every time matches with the presupposed information, determines described in getting Trigger information.
7. the access mechanism of user domain according to claim 5, which is characterized in that the computing unit is specifically used for:
Determine the corresponding preset password create-rule of each of described at least one unlock element unlock element;
According at least one unlock element and the corresponding preset password create-rule of each unlock element, described in calculating Access password.
8. the access mechanism of user domain according to any one of claims 5 to 7, which is characterized in that further include:
Whether second detection unit gets described test for detecting within the predetermined time after getting the triggering information Demonstrate,prove information;
The judging unit, specifically for getting the verification within the predetermined time in second detection unit determination When information, judge whether the verification information matches with the access password.
9. a kind of mobile terminal, which is characterized in that including:
The access mechanism of user domain as described in any one of claim 5 to 8.
CN201610182256.8A 2016-03-28 2016-03-28 Access method, access mechanism and the mobile terminal of user domain Active CN105787318B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610182256.8A CN105787318B (en) 2016-03-28 2016-03-28 Access method, access mechanism and the mobile terminal of user domain
PCT/CN2016/080617 WO2017166359A1 (en) 2016-03-28 2016-04-29 User domain access method, access device, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610182256.8A CN105787318B (en) 2016-03-28 2016-03-28 Access method, access mechanism and the mobile terminal of user domain

Publications (2)

Publication Number Publication Date
CN105787318A CN105787318A (en) 2016-07-20
CN105787318B true CN105787318B (en) 2018-09-14

Family

ID=56391872

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610182256.8A Active CN105787318B (en) 2016-03-28 2016-03-28 Access method, access mechanism and the mobile terminal of user domain

Country Status (2)

Country Link
CN (1) CN105787318B (en)
WO (1) WO2017166359A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503583B (en) * 2016-10-26 2019-06-14 北京小米移动软件有限公司 The operating method and device that terminal is attended to anything else
CN106548051A (en) * 2016-10-31 2017-03-29 宇龙计算机通信科技(深圳)有限公司 The management method of private visit pattern, managing device and terminal
CN112784245A (en) * 2020-06-05 2021-05-11 环鸿电子(昆山)有限公司 Screen unlocking method of mobile equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1281025C (en) * 2003-09-08 2006-10-18 赵忠华 Password variable identification verification technique
CN103377352A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Sliding password unlocking method
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294941B (en) * 2012-02-22 2016-04-20 腾讯科技(深圳)有限公司 The method of access private space and mobile device
CN103297408B (en) * 2012-03-02 2016-04-06 腾讯科技(深圳)有限公司 Login method and device and terminal, the webserver
CN103809897B (en) * 2012-11-15 2017-06-30 展讯通信(上海)有限公司 Terminal device and its control method
CN104732125B (en) * 2015-01-30 2017-12-22 努比亚技术有限公司 The display methods and terminal of encryption information
CN105160274B (en) * 2015-09-24 2017-10-27 宇龙计算机通信科技(深圳)有限公司 A kind of guard method of user data and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1281025C (en) * 2003-09-08 2006-10-18 赵忠华 Password variable identification verification technique
CN103377352A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Sliding password unlocking method
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal

Also Published As

Publication number Publication date
CN105787318A (en) 2016-07-20
WO2017166359A1 (en) 2017-10-05

Similar Documents

Publication Publication Date Title
EP2240912B1 (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
US9400879B2 (en) Method and system for providing authentication through aggregate analysis of behavioral and time patterns
US20150033364A1 (en) Method and Apparatus for the Protection of Application Software
US20190080060A1 (en) User authentication method and authentication system using match with junk data
WO2016106989A1 (en) Multi-system security authentication method, multi-system security authentication apparatus and terminal
CN103813334A (en) Right control method and right control device
JP6068328B2 (en) Information processing apparatus and information processing method
CN105787318B (en) Access method, access mechanism and the mobile terminal of user domain
CN103902867A (en) Information protection method and electronic device
CN107633573A (en) The method for unlocking and intelligent door lock of a kind of intelligent door lock
JP6399605B2 (en) Authentication apparatus, authentication method, and program
WO2010132093A1 (en) Authentication system and method
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
KR101330113B1 (en) Authentication apparatus and method based on position value
WO2017105579A2 (en) Interception-proof authentication and encryption system and method
CN105069361A (en) Safety access method and system for privacy space
CN107679411A (en) A kind of mobile terminal privacy processing method and mobile terminal
CN107403088A (en) The method and device of a kind of password identification
CN105007267A (en) Privacy protection method and device
CN108701183B (en) User authentication method and system using whether junk data are consistent
KR101969838B1 (en) Method and apparatus for authenication using dial virtual keypad
JP2010237940A (en) Personal identification device, personal identification method, program, and recording medium
Phoka et al. Dynamic keypad security system with key order scrambling technique and OTP authentication
EP1841168A1 (en) A personal token with an ability for interpreting user mishandlings
CN104978511B (en) A kind of mobile terminal unlocking method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant