CN105787318B - Access method, access mechanism and the mobile terminal of user domain - Google Patents
Access method, access mechanism and the mobile terminal of user domain Download PDFInfo
- Publication number
- CN105787318B CN105787318B CN201610182256.8A CN201610182256A CN105787318B CN 105787318 B CN105787318 B CN 105787318B CN 201610182256 A CN201610182256 A CN 201610182256A CN 105787318 B CN105787318 B CN 105787318B
- Authority
- CN
- China
- Prior art keywords
- information
- user
- access
- user domain
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Medical Informatics (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of access method of user domain, access mechanism and mobile terminals, wherein the access method of user domain, including:Hide the access entrance in designated user domain;It detects whether to get for triggering the triggering information for accessing to the designated user domain;Determining that the user to accessing the designated user domain carries out authentication when getting the triggering information;If passing through to the authentication of the user, the designated user domain is run.Technical solution through the invention, it hides the access entrance of user domain and accesses password for user domain setting is dynamic, efficiently avoid the problems such as access mode confidentiality is poor, divulging a secret property is high in the related technology, the safety for substantially increasing the entire access process of user domain meets the actual demand of user.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of access method of user domain, a kind of user domain
Access mechanism and a kind of mobile terminal.
Background technology
With the development of mobile terminal, the function that intelligent terminal has is more and more, and application scenarios emerge one after another, same with this
When, safety issue also increasingly attracts attention.In the related technology, in order to ensure in mobile terminal certain applications and information
Safety can separately build a security level higher than the security domain of canonical domain to store these applications and information except canonical domain, lead to
The icon of the security domain can be often set in canonical domain, using the access entrance as the security domain, user to the security domain into
It, can be by clicking icon, and after inputting correctly verification password, into the security domain when row accesses, but the visit of this security domain
The mode of asking has the following disadvantages:
One, crypticity is poor:Anyone after click, can attempt password authentification it can be seen that security domain icon.
Two, divulging a secret property height:Due to having the presence of the access entrances such as icon, process of the user in input password on interface
In, password may be caused to reveal, there are prodigious security risks.
Therefore, how to realize becomes technical problem urgently to be resolved hurrily to the secure access of user domain.
Invention content
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of access scheme of new user domain has
The problems such as access mode confidentiality is poor, divulging a secret property is high in the related technology is avoided to effect, user domain is substantially increased and entirely accesses
The safety of process meets the actual demand of user.
In view of this, the present invention proposes a kind of access method of user domain, including:The access for hiding designated user domain enters
Mouthful;It detects whether to get for triggering the triggering information for accessing to the designated user domain;Described in determining get
When triggering information, the user to accessing the designated user domain carries out authentication;If passing through to the authentication of the user,
Then run the designated user domain.
In the technical scheme, by hiding the access entrance of user domain, (user can be according to actual demand, in terminal
Any user domain is hidden, and is especially stored with the user domain of user's private information or some payment applications etc.), hide user
After the access entrance in domain, the icon etc. of the user domain is not shown on any interface of terminal so that in addition to user
All other men are difficult the presence for knowing the user domain, confidentiality difference when efficiently solving user's domain browsing in the related technology
Problem, and when user has requirements for access to the designated user domain for having hidden access entrance, terminal is obtained by detecting whether
It gets for triggering the triggering information to access to designated user domain, and when determination gets triggering information, access is referred to
The user for determining user domain carries out authentication, to pass through to the authentication of user, designated user domain of reruning, due to user domain
Access entrance hidden, to user carry out authentication when, for verification information input by user, other people are difficult that will verify
Information and the user domain hidden are associated, and reduce the probability of password leakage, it is ensured that the entire access process of user domain
Safety, meet secret and the demand for security of user to user domain browsing process.
In the above-mentioned technical solutions, it is preferable that detect whether to get and access to designated user domain for triggering
The step of triggering information, specifically includes:The character information input by user is obtained, and judges the character information and predetermined word
Whether symbol information matches, and when judging the character information with the preset characters information match, determines described in getting
Trigger information;Or the information of user's continuous several times input is obtained, and judge whether the information that the user inputs every time is equal
Match with presupposed information, when the information for judging that the user inputs every time matches with the presupposed information, determination obtains
Get the triggering information.
In the technical scheme, after the access entrance of user domain is hidden, when user needs to access the user domain, can pass through
Number of ways is realized:It can input preset characters information (preset characters information can be configured by user preset), such as
Urgent call interface inputing characters information " * * ## ";Can also continuous several times input same presupposed information (presupposed information can
Pre-set by user), it inputs same presupposed information continuous 2 times such as in unlock interface, presupposed information is inputted in first time
Prompt messages such as " input error please retry " when completion, can be shown simultaneously, continue to input same presupposed information for the second time, it is whole
A process has certain fascination to other people, therefore can improve safety.
In any of the above-described technical solution, it is preferable that the user to accessing the designated user domain carries out authentication
The step of, it specifically includes:At least one unlock element in predetermined interface is obtained, and according at least one unlock element,
Calculate the access password in the designated user domain;Obtain the verification information input by user;Judge the verification information and institute
It states and accesses whether password matches;If it is determined that the verification information and the access code matches, it is determined that the user
Authentication pass through.
In the technical scheme, it is contemplated that if the access password of user domain is fixed, each access of user can all input same
A password may have the security risk of password leakage, therefore by obtaining at least one unlock element in predetermined interface,
And according at least one unlock element, calculate the access password in designated user domain so that the access password of user domain, which is in, to be changed
State, is not fixed setting, user when accessing will not fixed input password, efficiently avoid password leakage.Wherein, it unlocks
Element can be time, date, character information etc. in predetermined interface.
In any of the above-described technical solution, it is preferable that according at least one unlock element, calculate the specified use
It the step of access password in family domain, specifically includes:Determine that each of described at least one unlock element unlock element is corresponding
Preset password create-rule;It is generated according at least one unlock element and the corresponding preset password of each unlock element
Rule calculates the access password.
It in the technical scheme, can be especially by least one unlock element and each unlock when calculating access password
Element corresponding preset password create-rule calculates, wherein unlock element can be time in predetermined interface, date, word
Information etc. is accorded with, for example, with the time (10:51) as unlock element, rule are generated using the method for falling row as corresponding preset password
Then, then it is " 1501 " that current verification password, which is calculated, this example is only used for illustrating to how to calculate verification password, and
Any restriction is not done, and user can set the quantity of unlock element according to actual demand, and corresponding with each unlock element
Preset password create-rule, each preset password for unlocking element can be identical at rule, can also be different.
In any of the above-described technical solution, it is preferable that judge the verification information and the access password whether phase
Before the step of matching, further include:Detect described in whether being got within the predetermined time after getting the triggering information
Verification information;If it is determined that getting the verification information within the predetermined time, then the judgement verification information is executed
The step of whether being matched with the access password.
In the technical scheme, by detect get triggering information after predetermined time in get verification
When information, then further matching verification is executed, on the one hand ensures timeliness when verification, on the other hand also avoid backstage one
It is directly in state to be verified, reduces system operation load.
According to the second aspect of the invention, it is proposed that a kind of access mechanism of user domain, including:Hidden unit, for hidden
Hide the access entrance in designated user domain;First detection unit, for detecting whether getting for triggering to the designated user
The triggering information that domain accesses;Identity authenticating unit, for determine get the triggering information when, to the access finger
The user for determining user domain carries out authentication;Processing unit, for being tested the identity of the user in the identity authenticating unit
When card passes through, the designated user domain is run.
In the technical scheme, by hiding the access entrance of user domain, (user can be according to actual demand, in terminal
Any user domain is hidden, and is especially stored with the user domain of user's private information or some payment applications etc.), hide user
After the access entrance in domain, the icon etc. of the user domain is not shown on any interface of terminal so that in addition to user
All other men are difficult the presence for knowing the user domain, confidentiality difference when efficiently solving user's domain browsing in the related technology
Problem, and when user has requirements for access to the designated user domain for having hidden access entrance, terminal is obtained by detecting whether
It gets for triggering the triggering information to access to designated user domain, and when determination gets triggering information, access is referred to
The user for determining user domain carries out authentication, to pass through to the authentication of user, designated user domain of reruning, due to user domain
Access entrance hidden, to user carry out authentication when, for verification information input by user, other people are difficult that will verify
Information and the user domain hidden are associated, and reduce the probability of password leakage, it is ensured that the entire access process of user domain
Safety, meet secret and the demand for security of user to user domain browsing process.
In the above-mentioned technical solutions, it is preferable that the first detection unit is specifically used for:Obtain the word input by user
Accord with information, and judge whether the character information matches with preset characters information, when the judgement character information with it is described pre-
If character information matches, determination gets the triggering information;Or the information of user's continuous several times input is obtained, and
Judge whether the information that the user inputs every time matches with presupposed information, when the information for judging that the user inputs every time
When matching with the presupposed information, determination gets the triggering information.
In the technical scheme, after the access entrance of user domain is hidden, when user needs to access the user domain, can pass through
Number of ways is realized:It can input preset characters information (preset characters information can be configured by user preset), such as
Urgent call interface inputing characters information " * * ## ";Can also continuous several times input same presupposed information (presupposed information can
Pre-set by user), it inputs same presupposed information continuous 2 times such as in unlock interface, presupposed information is inputted in first time
Prompt messages such as " input error please retry " when completion, can be shown simultaneously, continue to input same presupposed information for the second time, it is whole
A process has certain fascination to other people, therefore can improve safety.
In any of the above-described technical solution, it is preferable that the identity authenticating unit includes:First acquisition unit is used for
Obtain at least one unlock element in predetermined interface;Computing unit, for according at least one unlock element, calculating institute
State the access password in designated user domain;Second acquisition unit, for obtaining the verification information input by user;Judging unit,
For judging whether the verification information matches with the access password;Determination unit, for judging in the judging unit
When the verification information is with the access code matches, determination passes through the authentication of the user.
In the technical scheme, it is contemplated that if the access password of user domain is fixed, each access of user can all input same
A password may have the security risk of password leakage, therefore by obtaining at least one unlock element in predetermined interface,
And according at least one unlock element, calculate the access password in designated user domain so that the access password of user domain, which is in, to be changed
State, is not fixed setting, user when accessing will not fixed input password, efficiently avoid password leakage.Wherein, it unlocks
Element can be time, date, character information etc. in predetermined interface.
In any of the above-described technical solution, it is preferable that the computing unit is specifically used for:Determine at least one solution
Lock the corresponding preset password create-rule of each of element unlock element;According at least one unlock element and described every
The corresponding preset password create-rule of a unlock element, calculates the access password.
It in the technical scheme, can be especially by least one unlock element and each unlock when calculating access password
Element corresponding preset password create-rule calculates, wherein unlock element can be time in predetermined interface, date, word
Information etc. is accorded with, for example, with the time (10:51) as unlock element, rule are generated using the method for falling row as corresponding preset password
Then, then it is " 1501 " that current verification password, which is calculated, this example is only used for illustrating to how to calculate verification password, and
Any restriction is not done, and user can set the quantity of unlock element according to actual demand, and corresponding with each unlock element
Preset password create-rule, each preset password for unlocking element can be identical at rule, can also be different.
In any of the above-described technical solution, it is preferable that further include:Second detection unit, for detecting getting
It states in the predetermined time after triggering information and whether gets the verification information;The judging unit is specifically used for described
When second detection unit determination gets the verification information within the predetermined time, the verification information and the visit are judged
Ask whether password matches.
In the technical scheme, by detect get triggering information after predetermined time in get verification
When information, then further matching verification is executed, on the one hand ensures timeliness when verification, on the other hand also avoid backstage one
It is directly in state to be verified, reduces system operation load.
According to the third aspect of the invention we, it is also proposed that a kind of mobile terminal, including:Such as any one of above-mentioned technical proposal
The access mechanism of the user domain.
By above technical scheme, hides the access entrance of user domain and access password for user domain setting is dynamic, have
The problems such as access mode confidentiality is poor, divulging a secret property is high in the related technology is avoided to effect, user domain is substantially increased and entirely accesses
The safety of process meets the actual demand of user.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the access method of user domain according to an embodiment of the invention;
Fig. 2 shows the schematic block diagrams of the access mechanism of user domain according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of mobile terminal according to an embodiment of the invention;
Fig. 4 A and Fig. 4 B show the interface schematic diagram of mobile terminal according to an embodiment of the invention;
Fig. 5 shows the schematic flow diagram of the access method of user domain according to another embodiment of the invention.
Specific implementation mode
To better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real
Mode is applied the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also
To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the access method of user domain according to an embodiment of the invention.
As shown in Figure 1, the access method of user domain according to an embodiment of the invention, including:
Step 102, the access entrance in designated user domain is hidden;
Step 104, it detects whether to get for triggering the triggering information for accessing to the designated user domain;
Step 106, determining that the user to accessing the designated user domain carries out identity when getting the triggering information
Verification;
Step 108, if passing through to the authentication of the user, the designated user domain is run.
In the technical scheme, by hiding the access entrance of user domain, (user can be according to actual demand, in terminal
Any user domain is hidden, and is especially stored with the user domain of user's private information or some payment applications etc.), hide user
After the access entrance in domain, the icon etc. of the user domain is not shown on any interface of terminal so that in addition to user
All other men are difficult the presence for knowing the user domain, confidentiality difference when efficiently solving user's domain browsing in the related technology
Problem, and when user has requirements for access to the designated user domain for having hidden access entrance, terminal is obtained by detecting whether
It gets for triggering the triggering information to access to designated user domain, and when determination gets triggering information, access is referred to
The user for determining user domain carries out authentication, to pass through to the authentication of user, designated user domain of reruning, due to user domain
Access entrance hidden, to user carry out authentication when, for verification information input by user, other people are difficult that will verify
Information and the user domain hidden are associated, and reduce the probability of password leakage, it is ensured that the entire access process of user domain
Safety, meet secret and the demand for security of user to user domain browsing process.
In the above-mentioned technical solutions, it is preferable that detect whether to get and access to designated user domain for triggering
The step of triggering information, specifically includes:The character information input by user is obtained, and judges the character information and predetermined word
Whether symbol information matches, and when judging the character information with the preset characters information match, determination has got institute
State triggering information;Or the information of user's continuous several times input is obtained, and judge information that the user inputs every time is whether
Match with presupposed information, when the information for judging that the user inputs every time matches with the presupposed information, determines
The triggering information is got.
In the technical scheme, after the access entrance of user domain is hidden, when user needs to access the user domain, can pass through
Number of ways is realized:It can input preset characters information (preset characters information can be configured by user preset), such as
Urgent call interface inputing characters information " * * ## ";Can also continuous several times input same presupposed information (presupposed information can
Pre-set by user), it inputs same presupposed information continuous 2 times such as in unlock interface, presupposed information is inputted in first time
Prompt messages such as " input error please retry " when completion, can be shown simultaneously, continue to input same presupposed information for the second time, it is whole
A process has certain fascination to other people, therefore can improve safety.
In any of the above-described technical solution, it is preferable that the user to accessing the designated user domain carries out authentication
The step of, it specifically includes:At least one unlock element in predetermined interface is obtained, and according at least one unlock element,
Calculate the access password in the designated user domain;Obtain the verification information input by user;Judge the verification information and institute
It states and accesses whether password matches;If it is determined that the verification information and the access code matches, it is determined that the user
Authentication pass through.
In the technical scheme, it is contemplated that if the access password of user domain is fixed, each access of user can all input same
A password may have the security risk of password leakage, therefore by obtaining at least one unlock element in predetermined interface,
And according at least one unlock element, calculate the access password in designated user domain so that the access password of user domain, which is in, to be changed
State, is not fixed setting, user when accessing will not fixed input password, efficiently avoid password leakage.Wherein, it unlocks
Element can be time, date, character information etc. in predetermined interface.
In any of the above-described technical solution, it is preferable that according at least one unlock element, calculate the specified use
It the step of access password in family domain, specifically includes:Determine that each of described at least one unlock element unlock element is corresponding
Preset password create-rule;It is generated according at least one unlock element and the corresponding preset password of each unlock element
Rule calculates the access password.
It in the technical scheme, can be especially by least one unlock element and each unlock when calculating access password
Element corresponding preset password create-rule calculates, wherein unlock element can be time in predetermined interface, date, word
Information etc. is accorded with, for example, with the time (10:51) as unlock element, rule are generated using the method for falling row as corresponding preset password
Then, then it is " 1501 " that current verification password, which is calculated, this example is only used for illustrating to how to calculate verification password, and
Any restriction is not done, and user can set the quantity of unlock element according to actual demand, and corresponding with each unlock element
Preset password create-rule, each preset password for unlocking element can be identical at rule, can also be different.
In any of the above-described technical solution, it is preferable that judge the verification information and the access password whether phase
Before the step of matching, further include:Detect described in whether being got within the predetermined time after getting the triggering information
Verification information;If it is determined that getting the verification information within the predetermined time, then the judgement verification information is executed
The step of whether being matched with the access password.
In the technical scheme, by detect get triggering information after predetermined time in get verification
When information, then further matching verification is executed, on the one hand ensures timeliness when verification, on the other hand also avoid backstage one
It is directly in state to be verified, reduces system operation load.
Fig. 2 shows the schematic block diagrams of the access mechanism of user domain according to an embodiment of the invention.
As shown in Fig. 2, the access mechanism 200 of user domain according to an embodiment of the invention, including:Hidden unit 202,
One detection unit 204, identity authenticating unit 206 and processing unit 208.
Wherein, hidden unit 202, the access entrance for hiding designated user domain;First detection unit 204, for examining
Whether survey gets for triggering the triggering information to access to the designated user domain;Identity authenticating unit 206 is used for
Determine that the user to accessing the designated user domain carries out authentication when getting the triggering information;Processing unit 208,
For the identity authenticating unit to the authentication of the user by when, run the designated user domain.
In the technical scheme, by hiding the access entrance of user domain, (user can be according to actual demand, in terminal
Any user domain is hidden, and is especially stored with the user domain of user's private information or some payment applications etc.), hide user
After the access entrance in domain, the icon etc. of the user domain is not shown on any interface of terminal so that in addition to user
All other men are difficult the presence for knowing the user domain, confidentiality difference when efficiently solving user's domain browsing in the related technology
Problem, and when user has requirements for access to the designated user domain for having hidden access entrance, terminal is obtained by detecting whether
It gets for triggering the triggering information to access to designated user domain, and when determination gets triggering information, access is referred to
The user for determining user domain carries out authentication, to pass through to the authentication of user, designated user domain of reruning, due to user domain
Access entrance hidden, to user carry out authentication when, for verification information input by user, other people are difficult that will verify
Information and the user domain hidden are associated, and reduce the probability of password leakage, it is ensured that the entire access process of user domain
Safety, meet secret and the demand for security of user to user domain browsing process.
In the above-mentioned technical solutions, it is preferable that the first detection unit 204 is specifically used for:Obtain user's input
Character information, and judge whether the character information matches with preset characters information, when judging the character information and institute
When stating preset characters information match, determination has got the triggering information;Or obtain user's continuous several times input
Information, and judge whether the information that the user inputs every time matches with presupposed information, when judgement, the user is defeated every time
When the information entered matches with the presupposed information, determination has got the triggering information.
In the technical scheme, after the access entrance of user domain is hidden, when user needs to access the user domain, can pass through
Number of ways is realized:It can input preset characters information (preset characters information can be configured by user preset), such as
Urgent call interface inputing characters information " * * ## ";Can also continuous several times input same presupposed information (presupposed information can
Pre-set by user), it inputs same presupposed information continuous 2 times such as in unlock interface, presupposed information is inputted in first time
Prompt messages such as " input error please retry " when completion, can be shown simultaneously, continue to input same presupposed information for the second time, it is whole
A process has certain fascination to other people, therefore can improve safety.
In any of the above-described technical solution, it is preferable that the identity authenticating unit 206 includes:First acquisition unit
206A, for obtaining at least one unlock element in predetermined interface;Computing unit 206B, for according at least one solution
Element is locked, the access password in the designated user domain is calculated;Second acquisition unit 206C, for obtaining described input by user test
Demonstrate,prove information;Judging unit 206D, for judging whether the verification information matches with the access password;Determination unit
206E, for when the judging unit judges the verification information with the access code matches, determining to the user
Authentication pass through.
In the technical scheme, it is contemplated that if the access password of user domain is fixed, each access of user can all input same
A password may have the security risk of password leakage, therefore by obtaining at least one unlock element in predetermined interface,
And according at least one unlock element, calculate the access password in designated user domain so that the access password of user domain, which is in, to be changed
State, is not fixed setting, user when accessing will not fixed input password, efficiently avoid password leakage.Wherein, it unlocks
Element can be time, date, character information etc. in predetermined interface.
In any of the above-described technical solution, it is preferable that the computing unit 206B is specifically used for:At least one described in determining
Each of a unlock element unlocks the corresponding preset password create-rule of element;According at least one unlock element and institute
The corresponding preset password create-rule of each unlock element is stated, the access password is calculated.
It in the technical scheme, can be especially by least one unlock element and each unlock when calculating access password
Element corresponding preset password create-rule calculates, wherein unlock element can be time in predetermined interface, date, word
Information etc. is accorded with, for example, with the time (10:51) as unlock element, rule are generated using the method for falling row as corresponding preset password
Then, then it is " 1501 " that current verification password, which is calculated, this example is only used for illustrating to how to calculate verification password, and
Any restriction is not done, and user can set the quantity of unlock element according to actual demand, and corresponding with each unlock element
Preset password create-rule, each preset password for unlocking element can be identical at rule, can also be different.
In any of the above-described technical solution, it is preferable that further include:Second detection unit 210 is being got for detecting
The verification information whether is got in predetermined time after the triggering information;The judging unit 206D, is specifically used for
When the determination of the second detection unit 210 gets the verification information within the predetermined time, the verification letter is judged
Whether breath matches with the access password.
In the technical scheme, by detect get triggering information after predetermined time in get verification
When information, then further matching verification is executed, on the one hand ensures timeliness when verification, on the other hand also avoid backstage one
It is directly in state to be verified, reduces system operation load.
Fig. 3 shows the schematic block diagram of mobile terminal according to an embodiment of the invention.
As shown in figure 3, mobile terminal 300 according to an embodiment of the invention, including:The visit of user domain as shown in Figure 2
Ask device 200.
Technical scheme of the present invention is described further below in conjunction with Fig. 4 A, Fig. 4 B and Fig. 5.
In the present embodiment, initial phase:Can be in the terminal " be arranged->In screen locking " setting option, increase by one specially
Door handles " security domain unlatching " option of safe domain policy, can be configured for security domain opening operation, specifically include " guide
The mode of password " selects, the setting of " guide's password ", the algorithm setting of " security password " etc., while being carried out to the security domain hidden
Setting is hidden, i.e., does not show the access entrance (icon of such as security domain of the security domain on any interface in the terminal
Identification information), the incidence relation of " guide's password " between security domain can be arranged in user, so that mobile terminal is in subsequent processing mistake
Cheng Zhong executes access of the triggering to security domain according to " guide's password ".
Wherein, the effect of " guide's password " is to open " first waveguide mode ":Notify system user that will attempt to enter " security domain ",
Preparation related to this progress, obtains currently such as backstage pull-up related content, according to algorithm set by user and relevant information
" security password ", the input password etc. for preparing verification user.
" guide's password " is divided into two kinds:
I:" prefix type guide password "
As shown in Figure 4 A, there is " urgent call " function 402 on locking screen interface, can enter after clicking 402 and " promptly exhale
Cry " interface, as hidden close security domain unlock interface, not only have very high concealment, further increase password setting
Operable space.
As shown in Figure 4 B, at " urgent call " interface, " the prefix password " of setting is inputted, such as " * * ## ", opens " first guided mode
Formula ", system can calculate " security password " at this time automatically, and user can directly at " prefix password ", validation information carries out afterwards
Verification, if " security password " successful match that verification password input by user and system-computed go out, can enter security domain.
II:" confusing type guide password "
The setting of " confusing type guide password " can be based on normal locking screen interface, such as figure unlock interface, number unlock
Interface etc., setting rule is identical as general unlocking pin, difference lies in:When inputting " confusing type guide password " first, meeting
Prompt cipher input error can open " first waveguide mode " after need to inputting same " confusing type guide password " again, carry out
The backstage of security domain prepares, and generally after startup " first waveguide mode ", can jump to " urgent call " interface, pass through " urgent call "
Interface receives verification password input by user, further to be verified.
Startup " first waveguide mode " scheduled duration (i.e. from the scheduled duration after input " guiding password ", the pre- timing
Length can be arranged by User Defined or system default) in judge whether to receive verification password input by user, if pre- more than this
The long input operation for not carrying out verification password of timing, will move out " first waveguide mode ", even if hereafter inputting correctly verification password,
Also it cannot get the verification of system.
" security password " that system-computed goes out is after entering " first waveguide mode ", for the verification password of security domain, not adopt
With fixed password, in combination with the specify information on Keyguard (keypad lock) interface, (specify information can be set by User Defined
Set, such as can be date, time and the screen locking information on screen) carry out algorithmic form password setting.
It is such as illustrated for designating the information as the current date and time on locking screen interface, such as current time of day
For:2016.01.29 12:31:
Algorithm (i.e. preset password create-rule) is illustrated:
Arrange method:By current time of day (2016.01.29 12:31) row of falling, is set as " security password ", then obtains " peace
Full password " is " 13 21 92 10 6102 ", and user is in practical operation, as long as the verification password of input is " 13 21 92 10
6102 ", you can access safety domain, operation are relatively simple.
Counter-point:User can be in the Initialize installation stage, according to itself operating habit and demand, arbitrary setting contraposition rule
Then, the present embodiment is illustrated with following contrapositive rule:From left to right, take respectively 4 be a unit (if " 2016 " be one group,
" 0129 " is one group, and " 1231 " are one group), then it is classified as 2 pair of 2 digit, the operation of ten and position are carried out respectively, with additive
For:20,16 correspond to and are added (2+1,0+6), and part contraposition of month and day is added (0+2,1+9), when be added (1+ with bit-by-bit is divided
3,2+1) it is " 362 10 43 ", to obtain " security password ".
Pinyin method:Based on customized screen locking information, it is password to take the corresponding number of its phonetic.Such as " welcoming you "
(HuanYingNi), then it is " 4,826 9,464 64 " to obtain " security password ", it is of course also possible to which letter is arranged
" HuanYingNi " is " security password ".
The specifically processing procedure when implementing, as shown in figure 5, including:
Step 502, judge whether to be in locking screen interface, if so, executing step 504;Otherwise, step 516 is executed.
Step 504, it judges whether there is " prefix type guide password " or " confusing type guide password " to be verified, if so, holding
Row step 506;Otherwise, step 516 is executed.
Step 506, " first waveguide mode " is opened, and calculates by set algorithm and specify information that current " safety is close
Code ".
Step 508, judge in the scheduled duration of startup " first waveguide mode ", if it is close to receive verification input by user
Code, if so, executing step 510;Otherwise, step 512 is executed.
Step 510, judge whether current " security password " and verification password input by user match, if so, executing step
514;Otherwise, step 516 is executed.
Step 512, it exits " first waveguide mode ".
Step 514, it runs and enters security domain.
Step 516, forbid accessing or entering security domain.
By above-described embodiment, Keyguard (keypad lock) can be made full use of to apply, retain user's use habit
On the basis of, the hiding and encryption of security domain is realized well, and there is very high safety and practicability, can largely carry
Rise the usage experience of user.
It is described in detail technical scheme of the present invention above in association with attached drawing, technical scheme of the present invention proposes a kind of new
The access scheme of user domain, by hiding the access entrance of user domain and accessing password for user domain setting is dynamic, effectively
The problems such as access mode confidentiality is poor, divulging a secret property is high in the related technology is avoided, the entire access process of user domain is substantially increased
Safety, meet the actual demand of user.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (9)
1. a kind of access method of user domain, which is characterized in that including:
Hide the access entrance in designated user domain;
It detects whether to get for triggering the triggering information for accessing to the designated user domain;
Determining that the user to accessing the designated user domain carries out authentication when getting the triggering information;
If passing through to the authentication of the user, the designated user domain is run;
The step of user to accessing the designated user domain carries out authentication, specifically includes:
At least one unlock element in predetermined interface is obtained, and according at least one unlock element, is calculated described specified
The access password of user domain;
Obtain the verification information input by user;
Judge whether the verification information matches with the access password;
If it is determined that the verification information and the access code matches, it is determined that pass through to the authentication of the user;
Wherein, at least one unlock element is time, date or the character information in predetermined interface.
2. the access method of user domain according to claim 1, which is characterized in that detect whether to get for triggering pair
It the step of triggering information that the designated user domain accesses, specifically includes:
The character information input by user is obtained, and judges whether the character information matches with preset characters information, when
When judging the character information with the preset characters information match, determination gets the triggering information;Or
Obtain the information of user's continuous several times input, and judge information that the user inputs every time whether with default letter
Manner of breathing matches, and when the information for judging that the user inputs every time matches with the presupposed information, determines described in getting
Trigger information.
3. the access method of user domain according to claim 1, which is characterized in that according at least one unlock member
Element, specifically includes the step of calculating the access password in the designated user domain:
Determine the corresponding preset password create-rule of each of described at least one unlock element unlock element;
According at least one unlock element and the corresponding preset password create-rule of each unlock element, described in calculating
Access password.
4. the access method of user domain according to any one of claim 1 to 3, which is characterized in that tested described in judgement
Before the step of whether card information matches with the access password, further include:
It detects and whether gets the verification information within the predetermined time after getting the triggering information;
If it is determined that get the verification information within the predetermined time, then execute it is described judge the verification information with it is described
The step of whether password matches accessed.
5. a kind of access mechanism of user domain, which is characterized in that including:
Hidden unit, the access entrance for hiding designated user domain;
First detection unit, for detecting whether getting for triggering the triggering letter to access to the designated user domain
Breath;
Identity authenticating unit, for determine get the triggering information when, to the user in the access designated user domain into
Row authentication;
Processing unit, for the identity authenticating unit to the authentication of the user by when, run the specified use
Family domain;
The identity authenticating unit includes:
First acquisition unit, for obtaining at least one unlock element in predetermined interface;
Computing unit, for according at least one unlock element, calculating the access password in the designated user domain;
Second acquisition unit, for obtaining the verification information input by user;
Judging unit, for judging whether the verification information matches with the access password;
Determination unit is used for when the judging unit judges the verification information with the access code matches, determining pair
The authentication of the user passes through;
Wherein, at least one unlock element is time, date or the character information in predetermined interface.
6. the access mechanism of user domain according to claim 5, which is characterized in that the first detection unit is specifically used
In:
The character information input by user is obtained, and judges whether the character information matches with preset characters information, when
When judging the character information with the preset characters information match, determination gets the triggering information;Or
Obtain the information of user's continuous several times input, and judge information that the user inputs every time whether with default letter
Manner of breathing matches, and when the information for judging that the user inputs every time matches with the presupposed information, determines described in getting
Trigger information.
7. the access mechanism of user domain according to claim 5, which is characterized in that the computing unit is specifically used for:
Determine the corresponding preset password create-rule of each of described at least one unlock element unlock element;
According at least one unlock element and the corresponding preset password create-rule of each unlock element, described in calculating
Access password.
8. the access mechanism of user domain according to any one of claims 5 to 7, which is characterized in that further include:
Whether second detection unit gets described test for detecting within the predetermined time after getting the triggering information
Demonstrate,prove information;
The judging unit, specifically for getting the verification within the predetermined time in second detection unit determination
When information, judge whether the verification information matches with the access password.
9. a kind of mobile terminal, which is characterized in that including:
The access mechanism of user domain as described in any one of claim 5 to 8.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610182256.8A CN105787318B (en) | 2016-03-28 | 2016-03-28 | Access method, access mechanism and the mobile terminal of user domain |
PCT/CN2016/080617 WO2017166359A1 (en) | 2016-03-28 | 2016-04-29 | User domain access method, access device, and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610182256.8A CN105787318B (en) | 2016-03-28 | 2016-03-28 | Access method, access mechanism and the mobile terminal of user domain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105787318A CN105787318A (en) | 2016-07-20 |
CN105787318B true CN105787318B (en) | 2018-09-14 |
Family
ID=56391872
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610182256.8A Active CN105787318B (en) | 2016-03-28 | 2016-03-28 | Access method, access mechanism and the mobile terminal of user domain |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105787318B (en) |
WO (1) | WO2017166359A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503583B (en) * | 2016-10-26 | 2019-06-14 | 北京小米移动软件有限公司 | The operating method and device that terminal is attended to anything else |
CN106548051A (en) * | 2016-10-31 | 2017-03-29 | 宇龙计算机通信科技(深圳)有限公司 | The management method of private visit pattern, managing device and terminal |
CN112784245A (en) * | 2020-06-05 | 2021-05-11 | 环鸿电子(昆山)有限公司 | Screen unlocking method of mobile equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1281025C (en) * | 2003-09-08 | 2006-10-18 | 赵忠华 | Password variable identification verification technique |
CN103377352A (en) * | 2012-04-16 | 2013-10-30 | 上海博路信息技术有限公司 | Sliding password unlocking method |
CN105069333A (en) * | 2015-08-20 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | User domain access method, access system and terminal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103294941B (en) * | 2012-02-22 | 2016-04-20 | 腾讯科技(深圳)有限公司 | The method of access private space and mobile device |
CN103297408B (en) * | 2012-03-02 | 2016-04-06 | 腾讯科技(深圳)有限公司 | Login method and device and terminal, the webserver |
CN103809897B (en) * | 2012-11-15 | 2017-06-30 | 展讯通信(上海)有限公司 | Terminal device and its control method |
CN104732125B (en) * | 2015-01-30 | 2017-12-22 | 努比亚技术有限公司 | The display methods and terminal of encryption information |
CN105160274B (en) * | 2015-09-24 | 2017-10-27 | 宇龙计算机通信科技(深圳)有限公司 | A kind of guard method of user data and terminal |
-
2016
- 2016-03-28 CN CN201610182256.8A patent/CN105787318B/en active Active
- 2016-04-29 WO PCT/CN2016/080617 patent/WO2017166359A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1281025C (en) * | 2003-09-08 | 2006-10-18 | 赵忠华 | Password variable identification verification technique |
CN103377352A (en) * | 2012-04-16 | 2013-10-30 | 上海博路信息技术有限公司 | Sliding password unlocking method |
CN105069333A (en) * | 2015-08-20 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | User domain access method, access system and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105787318A (en) | 2016-07-20 |
WO2017166359A1 (en) | 2017-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2240912B1 (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
US9400879B2 (en) | Method and system for providing authentication through aggregate analysis of behavioral and time patterns | |
US20150033364A1 (en) | Method and Apparatus for the Protection of Application Software | |
US20190080060A1 (en) | User authentication method and authentication system using match with junk data | |
WO2016106989A1 (en) | Multi-system security authentication method, multi-system security authentication apparatus and terminal | |
CN103813334A (en) | Right control method and right control device | |
JP6068328B2 (en) | Information processing apparatus and information processing method | |
CN105787318B (en) | Access method, access mechanism and the mobile terminal of user domain | |
CN103902867A (en) | Information protection method and electronic device | |
CN107633573A (en) | The method for unlocking and intelligent door lock of a kind of intelligent door lock | |
JP6399605B2 (en) | Authentication apparatus, authentication method, and program | |
WO2010132093A1 (en) | Authentication system and method | |
CN105653918B (en) | Method for safely carrying out, safe operating device and terminal | |
KR101330113B1 (en) | Authentication apparatus and method based on position value | |
WO2017105579A2 (en) | Interception-proof authentication and encryption system and method | |
CN105069361A (en) | Safety access method and system for privacy space | |
CN107679411A (en) | A kind of mobile terminal privacy processing method and mobile terminal | |
CN107403088A (en) | The method and device of a kind of password identification | |
CN105007267A (en) | Privacy protection method and device | |
CN108701183B (en) | User authentication method and system using whether junk data are consistent | |
KR101969838B1 (en) | Method and apparatus for authenication using dial virtual keypad | |
JP2010237940A (en) | Personal identification device, personal identification method, program, and recording medium | |
Phoka et al. | Dynamic keypad security system with key order scrambling technique and OTP authentication | |
EP1841168A1 (en) | A personal token with an ability for interpreting user mishandlings | |
CN104978511B (en) | A kind of mobile terminal unlocking method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |