CN109327597A - The method, apparatus of the entrance of mobile terminal and secret system - Google Patents

The method, apparatus of the entrance of mobile terminal and secret system Download PDF

Info

Publication number
CN109327597A
CN109327597A CN201810877795.2A CN201810877795A CN109327597A CN 109327597 A CN109327597 A CN 109327597A CN 201810877795 A CN201810877795 A CN 201810877795A CN 109327597 A CN109327597 A CN 109327597A
Authority
CN
China
Prior art keywords
secret system
password
key unit
secret
encryption data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810877795.2A
Other languages
Chinese (zh)
Inventor
王力
邓安良
李巍宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201810877795.2A priority Critical patent/CN109327597A/en
Publication of CN109327597A publication Critical patent/CN109327597A/en
Priority to PCT/CN2019/098718 priority patent/WO2020025005A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

Present invention discloses a kind of method, apparatus of the entrance of mobile terminal and secret system, and wherein method detects whether insertion first key unit comprising steps of when user initiates to enter when entering request of secret system;If detecting, the first key unit has been inserted into, and sends the first encryption data to the first key unit;When it is correct that the first key unit, which verifies first encryption data, the second encryption data that the first key unit is sent is received;Whether correct verify second encryption data;If second encryption data is correctly, to allow the entrance request, into the secret system.The present invention correctly enters secret system with the password into system inputted by the key of authentication secret unit afterwards, realizes the beneficial effect for reinforcing private information safeguard protection, it is intended to solve the problems, such as that the private information safeguard protection in mobile terminal is reinforced.

Description

The method, apparatus of the entrance of mobile terminal and secret system
Technical field
The present invention relates to field of mobile equipment, a kind of side of the entrance of mobile terminal and secret system is especially related to Method, device.
Background technique
With the rapid development of network, the safety of the data informations such as system file, the personal information for depositing record is received more Carry out bigger threat.And with the development of social economy and mobile phone technique, mobile phone nowadays has become the daily work of people's indispensability One of tool.Mobile phone EMS memory has a large amount of information and data, and information security is just particularly important, especially the peace of private information Quan Xing.Present mobile phone be all using user name and password or fingerprint as encryption and decryption in a manner of.For some private informations, with User name and password and fingerprint are protected as the safety of encryption and decryption mode just seems especially insufficient, this just needs one kind that can more add The mode of strong private information safeguard protection provides relatively top-secret private information security context.How to the private information of mobile phone The protection that safety is more reinforced just becomes problem extremely to be solved.
Summary of the invention
The main object of the present invention is to provide a kind of method and apparatus of the entrance of secret system, it is intended to solve mobile terminal The problem of interior private information safeguard protection is reinforced.
In order to achieve the above-mentioned object of the invention, the method that the present invention proposes a kind of entrance of secret system, the method includes Step:
When user initiates to detect whether insertion first key unit into secret system into when request;
If detecting, the first key unit has been inserted into, and sends the first encryption data to the first key unit;
When it is correct that the first key unit, which verifies first encryption data, the first key unit hair is received The second encryption data sent;
Whether correct verify second encryption data;
If second encryption data is correctly, to obtain the first password into the secret system;
When getting the first password, whether correct the first password is verified;
If the first password is correctly, to allow the entrance request, into the secret system.
The method that the present invention proposes a kind of entrance of secret system, the method includes the steps:
When user initiates to enter when entering request of secret system, acquisition enters the first password of the secret system;
When getting the first password, whether correct the first password is verified;
If the first password is correctly, to detect whether insertion first key unit;
If detecting, the first key unit has been inserted into, and sends the first encryption data to the first key unit;
When it is correct that the first key unit, which verifies first encryption data, the first key unit hair is received The second encryption data sent;
Whether correct verify second encryption data;
If second encryption data is correctly, to allow the entrance request, into the secret system.
The present invention also provides a kind of device of the entrance of secret system, described device includes:
First detection module, for detecting whether insertion first when user initiates the entrance request for entering secret system Cipher key unit;
First sending module, if for detecting that the first key unit has been inserted into, send the first encryption data to The first key unit;
First receiving module, for receiving when it is correct that the first key unit, which verifies first encryption data, The second encryption data that the first key unit is sent;
First authentication module, it is whether correct for verifying second encryption data;
First obtains module, if for second encryption data be it is correct, obtain the into the secret system One password;
Second authentication module, it is whether correct for when getting the first password, verifying the first password;
First entering module, if being correctly, to allow the entrance request, into the secret for the first password System.
The present invention also provides a kind of device of the entrance of secret system, described device includes:
Second obtain module, for when user initiate enter secret system enter request when, obtain enter the secret The first password of system;
Third authentication module, it is whether correct for when getting the first password, verifying the first password;
Second detection module, if being correctly, to detect whether insertion first key unit for the first password;
Second sending module, if for detecting that the first key unit has been inserted into, send the first encryption data to The first key unit;
Second receiving module, for receiving when it is correct that the first key unit, which verifies first encryption data, The second encryption data that the first key unit is sent;
4th authentication module, it is whether correct for verifying second encryption data;
Second enters module, if for second encryption data be it is correct, allow it is described enter request, into described Secret system.
The present invention also provides a kind of mobile terminal, including processor and memory,
The device that the memory is used to store the entrance of secret system executes the entrance of the secret system of any of the above-described Method program;
The processor is configured to for executing the program stored in the memory.
The present invention enters system with what is inputted by first key the first mobile device information of verifying first key unit The first password of system correctly after system is decrypted into secret system after information, hence into system, it is private to realize reinforcement The beneficial effect of flux density information secure protection, it is intended to solve the private information safeguard protection of system software in mobile terminal, file etc. Need the problem of reinforcing.
Detailed description of the invention
Fig. 1 is the flow diagram of the method for the entrance of the secret system of one embodiment of the invention;
Fig. 2 is the flow diagram of the method for the entrance of the secret system of another embodiment of the present invention;
Fig. 3 is the structural schematic block diagram of the device of the entrance of the secret system of one embodiment of the invention;
Fig. 4 is the structural schematic block diagram of the device of the entrance of the secret system of another embodiment of the present invention;
Fig. 5 is the structural schematic block diagram of the mobile terminal of one embodiment of the invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, the embodiment of the present invention provides a kind of method of the entrance of secret system, it is intended to solve to reinforce secret file The problem of safety of management.In the present embodiment, secret system is in the terminal.Wherein, mobile terminal is mobile phone terminal;The One cipher key unit is UK (UKey).
Method includes the following steps:
S1, when user initiates to detect whether insertion first key unit into secret system into when request.
In the present embodiment, user is initiated by modes such as the desktops of click or sliding mobile terminal secret system is entered It is detected after secret system receives entrance request to whether first key unit is inserted into mobile terminal into request. First key unit is with the entrance of the form control secret system of a hardware key.
S2, if detecting, first key unit has been inserted into, and is sent the first encryption data and is given first key unit.
In the present embodiment, if after secret system detection to first key unit insertion mobile terminal, by the first encryption Data are sent to first key unit, and first key unit verifies the first encryption data.Verify its first encryption data Whether when being that first key unit is inserted into mobile terminal for the first time and connects and binds with secret system, secret system reads and stores up The data information deposited.Wherein, the first encryption data is the IMEI for the mobile terminal bound with first key unit The SN (Series Number) of (International Mobile Equipment Identity) and first key unit.
S3 receives first key unit is sent second when it is correct that first key unit, which verifies the first encryption data, Encryption data.
In the present embodiment, verifying the first encryption data when first key unit is that insertion moves first key unit for the first time Dynamic terminal and when connecting and binding with secret system, when the data information that secret system reads and store, transmission second encrypts number According to secret system.I.e. when it is the mobile terminal bound with it that first key unit, which authenticates to the mobile terminal being currently inserted into, The second encryption data is sent to mobile terminal.Wherein the second encryption data is the mobile terminal bound with first key unit The SN information of IMEI information and first key unit.
Whether S4, the second encryption data of verifying are correct.
In the present embodiment, secret system receives the second encryption data that the first key unit being currently inserted into is sent When, whether the second encryption data of verifying is the first key unit for reading and storing when binding for the first time with first key unit Ciphered data information.Verify whether the first key unit being currently inserted into is the first key unit bound with it.
S5, if the second encryption data is correctly, to obtain the first password into secret system.
In the present embodiment, it is correct (authenticate to current that secret system, which authenticates to the second received encryption data, The first key unit of insertion is the first key unit bound with it) after, it can be inputted by user and enter the close of secret system Code or secret system read the defeated in secret system into modes such as the passwords of secret system of first key unit storage automatically Enter to enter the password of secret system, secret system reads the password into secret system of input secret system, i.e. first password.
S6, when getting first password, whether verifying first password is correct.
In the present embodiment, after secret system obtains the first password into secret system inputted, verifying is inputted First password into secret system and secret system in the encrypted message into system that stores it is whether consistent.
S7, if first password is correctly, request to be allowed access into, into secret system.
In the present embodiment, secret system authenticates to the information and secret of the first password into secret system inputted After the information of the password into system stored in system is consistent, receive the request that Client-initiated enters secret system, i.e., into Enter request, into secret system.
In one embodiment, above-mentioned when user initiates when entering request, to detect whether to insert into secret system Before the step S1 for entering first key unit, comprising:
When first time entering secret system, user setting is prompted to enter the first password of secret system;
After completing that first password is arranged, user is prompted to bind first key unit.
When first time entering secret system, secret system is used by forms prompts such as the windows of one setting password of pop-up Family setting enters the password of secret system, which is first password.Secret system is by set into the close of secret system Code stores, as every time into the password of input required for secret system, also conduct enters secret system every time later later Whether the inputted password of verifying correctly compares content when system.After completing that first password is arranged, secret system passes through pop-up The forms prompt user such as one prompt binding window binds first key unit.Secret system identification is to first key unit first Secondary insertion mobile terminal, read and store the information stored in the safety chip of first key unit, i.e. first key unit SN information;Meanwhile the information of mobile terminal, i.e. the IMEI information of mobile terminal are also read and storing, and then generate the first encryption Whether data, being verified in be inserted into cipher key unit when for entering secret system later is bound first key unit Comparison condition content.First key unit also can read and store the IMEI information of be inserted into mobile terminal, and by itself SN information and IMEI information generate the second encryption data.Wherein, the quantity of the first key unit of binding is one.
In one embodiment, above-mentioned first key unit is a cipher key unit or more than one key list Member.
The quantity of above-mentioned bound first key unit can be one or more, the first key list generally bound The quantity of member is up to two.Binding multiple cipher key units is to pass through another when losing a cipher key unit Cipher key unit enters secret system.Binding quantity is unfavorable for the guarantee of secret security of system, thus at most binding two too much Cipher key unit will be unable to enter secret system, it ensure that relatively absolute peace when bound cipher key unit is all lost Entirely.
In one embodiment, above-mentioned first password is a password or more than one password.
The quantity of above-mentioned first password can be with one or more.I.e. first time enter secret system when be arranged into When entering the password of secret system, multiple passwords can be set, enhance its safety.When a password is only arranged, which is Numerical ciphers;It is close after second other than first fundamental cryptographic of setting is numerical ciphers when multiple passwords are arranged Code can be numerical ciphers or pattern password or finger-print cipher.
In one embodiment, user is prompted to bind first key list after completing that first password is arranged above-mentioned After the step of member, comprising:
After completing to bind first key unit, first password is stored in first key unit.
After the completion of secret system and first key unit are bound, pop up whether a prompt authorizes cipher key unit decryption power The window of limit, after user's confirmation, secret system sends first password to bound first key unit, the storage of first key unit Its first password is deposited, later, if user is initiating into secret system into after requesting, close by first into secret system Key unit is inserted into mobile terminal, is bound first key unit when secret system authenticates to be inserted into cipher key unit When, it is automatic read and first key unit that verifying is currently inserted into the first password that stores, verify its first password it is correct after, Receive to enter request, into secret system.After being inserted into bound cipher key unit, no longer needs to input and enter the close of secret system Code can enter secret system.
In one embodiment, before the step of obtaining the first password for entering secret system, comprising:
When the second encryption data is correct, after default first time, input enters the password of secret system.
Secret system authenticates to be inserted into first key unit when being bound first key unit, default first After time, pop-up input enters the prompt window of the password of secret system, and user inputs first password, alternatively, default first After time, secret system can read the first password stored in be inserted into first key unit.Wherein, it presets at the first time It can be set as 1 minute.
In one embodiment, if being correctly, request to be allowed access into, into the step S7 of secret system in first password Later, comprising:
When detecting the extraction of first key unit, secret system is automatically exited from.
Into secret system, after secret system finishing, user is led due to the hasty, factors such as be pressed for time in order to prevent Cause is forgotten to exit secret system and the private information in leakage system, secret system are detecting the extraction movement of first key unit After terminal, system is just automatically exited from.
In one embodiment, allowing access into request, the step of into secret system after, comprising:
When entering secret system, after the second preset time, pop-up inputs the password for entering secret system again Prompt window.
Into after secret system, more than the second preset time, need to input the password into secret system, Fang Keji again Continuous operation secret system.Wherein, the second preset time is 20 minutes;Password into secret system is the entrance secret system of setting The first password of system.Second preset time can be configured by user according to personal inclination.Such as: when user enters secret system Reading file after 20 minutes, pops up a window, and windows content includes the Password Input frame and confirmation into secret system Key, page after user inputs first password, before being restored to pop-up window.
In one embodiment, allowing access into request, the step of into secret system after, further includes:
When enter secret system when, detect secret system in third preset time with the presence or absence of user to secret system into Row operation;
If being operated there is no user to secret system in third preset time, pops up input again and enter secret The prompt window of the password of system.
Enter secret system after, in third preset time, secret system detection user whether have to secret system into Row operation, operates secret system if can't detect user, then current page is switched to input and enter secret system Password window page, user input enter secret system password after, secret system can be opened.Wherein, third is default Time is 20 minutes;Password into secret system is the first password into secret system of setting.Such as: enter secret system Whens system reading file etc., in 20 minutes, secret system detection less than user there are page turning file, input text etc. with it is mobile eventually End screen has the operation of contact induction, pops up a window, and windows content includes the Password Input frame and really into secret system Recognize key, page after user inputs first password, before being restored to pop-up window.
In one embodiment, allowing access into request, the step of into secret system after, further includes:
After entering secret system, when recognizing voice messaging, judge vocal print feature in voice messaging whether with The vocal print feature that typing is arranged is consistent;
If inconsistent, the prompt window that input again enters the password of secret system is popped up.
When first time entering password of the secret system setting into secret system, user has carried out voice input setting, Secret system obtains and stores the vocal print feature of user.It is again introduced into secret system, if using user's sending sound of secret system Sound, secret system collect the voice and judge whether the vocal print feature of the voice messaging is consistent with the setting vocal print feature of typing, It is inconsistent when detecting, pop up a window, windows content includes the Password Input frame and acknowledgement key into secret system, when with After family inputs first password, the page before pop-up window can be restored to.Wherein, into the password of secret system be setting into Enter the first password of secret system.
In one embodiment, allowing access into request, the step of into secret system after, comprising:
After entering secret system, the vocal print feature of user is obtained;
When recognizing voice messaging, whether analysis voice messaging is consistent with the vocal print feature of user;
If inconsistent, the prompt window that input again enters the password of secret system is popped up.
Into after secret system, user needs the acquisition and storage of typing voice progress vocal print feature.When use secret system During system, secret system identification just collects the vocal print feature of the voice messaging to there are voice messagings, and judges the vocal print Whether feature is consistent with the vocal print feature of user.If detecting inconsistent, a window is popped up, windows content includes entering secret The Password Input frame and acknowledgement key of system, page after user inputs first password, before pop-up window can be restored to.Its In, the password into secret system is the first password into secret system of setting.Such as: using secret systematic procedure In, user's first is used together secret system with user's second or is using secret system due to various reasons for user's second, wherein Secret system obtain and storage vocal print feature be user's first vocal print feature.User's second is issued when using secret system Sound, secret system collect the voice messaging and acquire and judge vocal print feature therein, determine the vocal print feature of acquisition not It is the vocal print feature of user's first, closes current page immediately, and pop up a window, windows content includes entering secret system Password Input frame and acknowledgement key, only input first password can be restored to the page before pop-up window.
In conclusion the embodiment of the present invention by the key of authentication secret unit and the password into system inputted just Enter secret system after really, realizes the beneficial effect for reinforcing private information safeguard protection, it is intended to solve secret in mobile terminal Information safety protection needs the problem of reinforcing.
A kind of method of the entrance of secret system is provided in another embodiment referring to Fig. 2, this method step includes:
S1, when user initiates to enter when entering request of secret system, acquisition enters the first password of secret system.
In the present embodiment, user is initiated by modes such as the desktops of click or sliding mobile terminal secret system is entered The password for entering secret system, i.e. first password are obtained after secret system receives entrance request into request.
S2, when getting first password, whether verifying first password is correct.
In the present embodiment, after secret system obtains the first password into secret system inputted, verifying is inputted First password into secret system and secret system in the password into system that stores it is whether consistent.
S3, if first password is correctly, to detect whether insertion first key unit.
In the present embodiment, secret system authenticates in the first password inputted into secret system and secret system After the password into system of storage is consistent, whether detection first key unit is inserted into mobile terminal.First key unit is with one The entrance of the form control secret system of hardware key.
S4, if detecting, first key unit has been inserted into, and is sent the first encryption data and is given first key unit.
In the present embodiment, if after secret system detection to first key unit insertion mobile terminal, by the first encryption Data are sent to first key unit, and first key unit verifies the first encryption data.Verify its first encryption data Whether when being that first key unit is inserted into mobile terminal for the first time and connects and binds with secret system, secret system reads and stores up The data information deposited.Wherein, the first encryption data is the IMEI for the mobile terminal bound with first key unit The SN (Series Number) of (International Mobile Equipment Identity) and first key unit.
S5 receives first key unit is sent second when it is correct that first key unit, which verifies the first encryption data, Encryption data.
In the present embodiment, verifying the first encryption data when first key unit is that insertion moves first key unit for the first time Dynamic terminal and when connecting and binding with secret system, when the data information that secret system reads and store, transmission second encrypts number According to secret system.I.e. when it is the mobile terminal bound with it that first key unit, which authenticates to the mobile terminal being currently inserted into, The second encryption data is sent to mobile terminal.Wherein the second encryption data is the mobile terminal bound with first key unit The SN information of IMEI information and first key unit.
Whether S6, the second encryption data of verifying are correct.
In the present embodiment, secret system receives the second encryption data that the first key unit being currently inserted into is sent When, whether the second encryption data of verifying is the first key unit for reading and storing when binding for the first time with first key unit Ciphered data information.Verify whether the first key unit being currently inserted into is the first key unit bound with it.
S7, if the second encryption data is correctly, request to be allowed access into, into secret system.
In the present embodiment, secret system authenticate to the second acquired encryption data it is correct after, receive Client-initiated Into the request of secret system, that is, enter request, into secret system.
In one embodiment, above-mentioned when user initiates to enter when entering request of secret system, acquisition enters private Before the step S1 of the first password of close system, comprising:
When first time entering secret system, user setting is prompted to enter the first password of secret system;
After completing that first password is arranged, user is prompted to bind first key unit.
When first time entering secret system, secret system is used by forms prompts such as the windows of one setting password of pop-up Family setting enters the password of secret system, which is first password.Secret system is by set into the close of secret system Code stores, as every time into the password of input required for secret system, also conduct enters secret system every time later later Whether the inputted password of verifying correctly compares content when system.After completing that first password is arranged, secret system passes through pop-up The forms prompt user such as one prompt binding window binds first key unit.Secret system identification is to first key unit first Secondary insertion mobile terminal, read and store the information stored in the safety chip of first key unit, i.e. first key unit SN information;Meanwhile the information of mobile terminal, i.e. the IMEI information of mobile terminal are also read and storing, and then generate the first encryption Whether data, being verified in be inserted into cipher key unit when for entering secret system later is bound first key unit Comparison condition content.First key unit also can read and store the IMEI information of be inserted into mobile terminal, and by itself SN information and IMEI information generate the second encryption data.Wherein, the quantity of the first key unit of binding is one.
In one embodiment, above-mentioned first key unit is a cipher key unit or more than one key list Member.
The quantity of above-mentioned bound first key unit can be one or more, the first key list generally bound The quantity of member is up to two.Binding multiple cipher key units is to pass through another when losing a cipher key unit Cipher key unit enters secret system.Binding quantity is unfavorable for the guarantee of secret security of system, thus at most binding two too much Cipher key unit will be unable to enter secret system, it ensure that relatively absolute peace when bound cipher key unit is all lost Entirely.
In one embodiment, above-mentioned first password is a password or more than one password.
The quantity of above-mentioned first password can be with one or more.I.e. first time enter secret system when be arranged into When entering the password of secret system, multiple passwords can be set, enhance its safety.When a password is only arranged, which is Numerical ciphers;It is close after second other than first fundamental cryptographic of setting is numerical ciphers when multiple passwords are arranged Code can be numerical ciphers or pattern password or finger-print cipher.
In one embodiment, if being correctly, request to be allowed access into, into the step S7 of secret system in first key Later, comprising:
When detecting the extraction of first key unit, secret system is automatically exited from.
Into secret system, after secret system finishing, user is led due to the hasty, factors such as be pressed for time in order to prevent Cause is forgotten to exit secret system and the private information in leakage system, secret system are detecting the extraction movement of first key unit After terminal, system is just automatically exited from.
In one embodiment, allowing access into request, the step of into secret system after, comprising:
When entering secret system, after the second preset time, pop-up inputs the password for entering secret system again Prompt window.
Into after secret system, more than the second preset time, need to input the password into secret system, Fang Keji again Continuous operation secret system.Wherein, the second preset time is 20 minutes;Password into secret system is the entrance secret system of setting The first password of system.Second preset time can be configured by user according to personal inclination.Such as: when user enters secret system Reading file after 20 minutes, pops up a window, and windows content includes the Password Input frame and confirmation into secret system Key, page after user inputs first password, before being restored to pop-up window.
In one embodiment, allowing access into request, the step of into secret system after, further includes:
When enter secret system when, detect secret system in third preset time with the presence or absence of user to secret system into Row operation;
If being operated there is no user to secret system in third preset time, pops up input again and enter secret The prompt window of the password of system.
Enter secret system after, in third preset time, secret system detection user whether have to secret system into Row operation, operates secret system if can't detect user, then current page is switched to input and enter secret system Password window page, user input enter secret system password after, secret system can be opened.Wherein, third is default Time is 20 minutes;Password into secret system is the first password into secret system of setting.Such as: enter secret system Whens system reading file etc., in 20 minutes, secret system detection less than user there are page turning file, input text etc. with it is mobile eventually End screen has the operation of contact induction, pops up a window, and windows content includes the Password Input frame and really into secret system Recognize key, page after user inputs first password, before being restored to pop-up window.
In one embodiment, allowing access into request, the step of into secret system after, further includes:
After entering secret system, when recognizing voice messaging, judge vocal print feature in voice messaging whether with The vocal print feature that typing is arranged is consistent;
If inconsistent, the prompt window that input again enters the password of secret system is popped up.
When first time entering password of the secret system setting into secret system, user has carried out voice input setting, Secret system obtains and stores the vocal print feature of user.It is again introduced into secret system, if using user's sending sound of secret system Sound, secret system collect the voice and judge whether the vocal print feature of the voice messaging is consistent with the setting vocal print feature of typing, It is inconsistent when detecting, pop up a window, windows content includes the Password Input frame and acknowledgement key into secret system, when with After family inputs first password, the page before pop-up window can be restored to.Wherein, into the password of secret system be setting into Enter the first password of secret system.
In one embodiment, allowing access into request, the step of into secret system after, comprising:
After entering secret system, the vocal print feature of user is obtained;
When recognizing voice messaging, whether analysis voice messaging is consistent with the vocal print feature of user;
If inconsistent, the prompt window that input again enters the password of secret system is popped up.
Into after secret system, user needs the acquisition and storage of typing voice progress vocal print feature.When use secret system During system, secret system identification just collects the vocal print feature of the voice messaging to there are voice messagings, and judges the vocal print Whether feature is consistent with the vocal print feature of user.If detecting inconsistent, a window is popped up, windows content includes entering secret The Password Input frame and acknowledgement key of system, page after user inputs first password, before pop-up window can be restored to.Its In, the password into secret system is the first password into secret system of setting.Such as: using secret systematic procedure In, user's first is used together secret system with user's second or is using secret system due to various reasons for user's second, wherein Secret system obtain and storage vocal print feature be user's first vocal print feature.User's second is issued when using secret system Sound, secret system collect the voice messaging and acquire and judge vocal print feature therein, determine the vocal print feature of acquisition not It is the vocal print feature of user's first, closes current page immediately, and pop up a window, windows content includes entering secret system Password Input frame and acknowledgement key, only input first password can be restored to the page before pop-up window.
In conclusion the embodiment of the present invention by the key of authentication secret unit and the password into system inputted just Enter secret system after really, realizes the beneficial effect for reinforcing private information safeguard protection, it is intended to solve secret in mobile terminal Information safety protection needs the problem of reinforcing.
Referring to Fig. 3, the embodiment of the present invention provides a kind of device 1 of the entrance of secret system, it is intended to solve to reinforce secret text The problem of safety of part management.In the present embodiment, secret system is in the terminal.
The device 1 of the entrance of secret system includes:
First detection module 11 detects whether insertion for initiating to enter when entering request of secret system as user One cipher key unit.
In above-mentioned first detection module 11, user is by modes such as the desktops of click or sliding mobile terminal to entrance Secret system is initiated to enter request, after secret system receives entrance request, whether is inserted into movement to first key unit Terminal is detected.First key unit is with the entrance of the form control secret system of a hardware key.
First obtains module 12, if sending the first encryption data to for detecting that first key unit has been inserted into One cipher key unit.
It is obtained in module 12 above-mentioned first, if after secret system detection is inserted into mobile terminal to first key unit, The first encryption data is then sent to first key unit, first key unit verifies the first encryption data.Verify it When whether the first encryption data is that first key unit is inserted into mobile terminal for the first time and connects and binds with secret system, secret system The data information that system reads and stores.Wherein, the first encryption data is the mobile terminal bound with first key unit SN (the Series of IMEI (International Mobile Equipment Identity) and first key unit Number)。
First receiving module 13, for it is close to receive first when it is correct that first key unit, which verifies the first encryption data, The second encryption data that key unit is sent.
In the first above-mentioned receiving module 13, verifying the first encryption data when first key unit is first key unit Insertion mobile terminal and when connecting and binding with secret system for the first time when the data information that secret system reads and stores, is sent out The second encryption data is sent to give secret system.Bound when first key unit authenticates to the mobile terminal being currently inserted into it When mobile terminal, the second encryption data is sent to mobile terminal.Wherein the second encryption data is to bind with first key unit The IMEI information of mobile terminal and the SN information of first key unit.
First authentication module 14, it is whether correct for verifying the second encryption data.
In the first above-mentioned authentication module 14, secret system receive that the first key unit that is currently inserted into sends the When two encryption datas, whether the second encryption data of verifying is first for reading and storing when binding for the first time with first key unit The ciphered data information of cipher key unit.Verify whether the first key unit being currently inserted into is the first key list bound with it Member.Second obtains module 15, if being correctly, to obtain the first password into secret system for the second encryption data.
It is obtained in module 15 above-mentioned second, it is correct that secret system, which authenticates to the second received encryption data, After (authenticating to the first key unit being currently inserted into is the first key unit bound with it), it can be inputted and be entered by user The password or secret system of secret system read existing into modes such as the passwords of secret system for first key unit storage automatically Input enters the password of secret system in secret system, secret system read input secret system into the close of secret system Code, i.e. first password.
Second authentication module 16, for when getting first password, whether verifying first password to be correct.
In the second above-mentioned authentication module 16, secret system obtains the first password into secret system inputted Afterwards, the password into system stored in the first password into secret system and secret system that verifying is inputted whether one It causes.
First entering module 17, if being correctly, request to be allowed access into, into secret system for first password.
In above-mentioned first entering module 17, secret system authenticates to the first password into secret system inputted After consistent with the password into system stored in secret system, receive the request that Client-initiated enters secret system, i.e., into Enter request, into secret system.
In one embodiment, the device 1 of the entrance of secret system further include:
First cue module, for prompting user setting to enter the of secret system when first time entering secret system One password;
Second cue module, for prompting user to bind first key unit after completing that first password is arranged.
In above-mentioned the first cue module and the second cue module, when first time entering secret system, secret system The forms such as the window by one setting password of pop-up prompt user setting to enter the password of secret system, which is first close Code.Secret system stores the set password into secret system, as later every time into needed for secret system The password to be inputted, whether the inputted password of verifying correctly compares content when entering secret system after being also used as every time.? After completing setting first password, secret system binds the forms such as window by one prompt of pop-up and prompts user's binding first close Key unit.To first key unit, insertion mobile terminal, secret system simultaneously store first key list for the first time for secret system identification Information, i.e. the SN information of first key unit are stored in the safety chip of member;Meanwhile also reading and storing the letter of mobile terminal Breath, i.e. the IMEI information of mobile terminal, and then the first encryption data is generated, verifying is inserted into when for entering secret system later Cipher key unit in whether be bound first key unit comparison condition content.First key unit also can read and store up The IMEI information of be inserted into mobile terminal is deposited, and the SN information of itself and IMEI information are generated into the second encryption data.Wherein, The quantity of the first key unit of binding is one.
In one embodiment, above-mentioned first key unit is a cipher key unit or more than one key list Member.
The quantity of above-mentioned bound first key unit can be one or more, the first key list generally bound The quantity of member is up to two.Binding multiple cipher key units is to pass through another when losing a cipher key unit Cipher key unit enters secret system.Binding quantity is unfavorable for the guarantee of secret security of system, thus at most binding two too much Cipher key unit will be unable to enter secret system, it ensure that relatively absolute peace when bound cipher key unit is all lost Entirely.
In one embodiment, above-mentioned first password is a password or more than one password.
The quantity of above-mentioned first password can be with one or more.I.e. first time enter secret system when be arranged into When entering the password of secret system, multiple passwords can be set, enhance its safety.When a password is only arranged, which is Numerical ciphers;It is close after second other than first fundamental cryptographic of setting is numerical ciphers when multiple passwords are arranged Code can be numerical ciphers or pattern password or finger-print cipher.
In one embodiment, the second cue module further include:
Storage module, for after completing to bind first key unit, first password to be stored in first key unit.
In above-mentioned storage module, after the completion of secret system and first key unit are bound, popping up a prompt is The no window for authorizing cipher key unit decrypted rights, after user's confirmation, it is close to bound first that secret system sends first password Key unit, first key unit store its first password, later, if user is initiating to enter secret system into secret system Enter request after, by first key unit be inserted into mobile terminal in, be when secret system authenticates to be inserted into cipher key unit When bound first key unit, it is automatic read and first key unit that verifying is currently inserted into the first password that stores, Verify its first password it is correct after, receive enter request, into secret system.After being inserted into bound cipher key unit, it is not necessarily to The password inputted again into secret system can enter secret system.
In one embodiment, before the step of obtaining the first password for entering secret system, comprising:
First input module, for when the second encryption data is correct, after default first time, input to enter private The password of close system.
In the first above-mentioned input module, it is bound that secret system, which authenticates to be inserted into first key unit, When one cipher key unit, after default first time, pop-up input enters the prompt window of the password of secret system, user's input the One password, alternatively, secret system can read first stored in be inserted into first key unit after default first time Password.Wherein, default first time can be set as 1 minute.
In one embodiment, the device 1 of the entrance of secret system further include:
Module is exited, for automatically exiting from secret system when detecting the extraction of first key unit.
It is exited in module in above-mentioned, into secret system, after secret system finishing, user is due to hurriedly in order to prevent The factors such as hurry, be pressed for time cause to forget to exit secret system and the private information in leakage system, secret system are detecting After first key unit extracts mobile terminal, system is automatically exited from.
In one embodiment, the device 1 of the entrance of secret system further include:
First pop-up module, for when entering secret system, after the second preset time, input to enter again for pop-up The prompt window of the password of secret system.
In the first above-mentioned pop-up module, into after secret system, more than the second preset time, need to input again into The password for entering secret system can continue operation secret system.Wherein, the second preset time is 20 minutes;Into secret system Password be setting the first password into secret system.Second preset time can be set by user according to personal inclination It sets.Such as: when user enters secret system reading file, after 20 minutes, a window is popped up, windows content includes into private The Password Input frame and acknowledgement key of close system, page after user inputs first password, before being restored to pop-up window.
In one embodiment, the device 1 of the entrance of secret system further include:
Third detection module, for when entering secret system, whether detection secret system to deposit in third preset time Secret system is operated in user;
Second pop-up module, if being operated for user to be not present in third preset time to secret system, bullet Input the prompt window for entering the password of secret system again out.
In above-mentioned third detection module and the second pop-up module, after entering secret system, in third preset time Interior, whether secret system detection user, which has, operates secret system, if can't detect user has progress to secret system Operation, then switch to the window page that input enters the password of secret system for current page, and user's input enters secret system After password, secret system can be opened.Wherein, third preset time is 20 minutes;Password into secret system is setting Into the first password of secret system.Such as: whens entering secret system reading file etc., in 20 minutes, secret system detection Less than user there are the operation that page turning file, input text etc. have contact induction with mobile terminal screen, a window, window are popped up Mouth content includes that the Password Input frame and acknowledgement key into secret system are restored to pop-out after user inputs first password The page before mouthful.
In one embodiment, the device 1 of the entrance of secret system further include:
First judgment module, for when recognizing voice messaging, judging in voice messaging after entering secret system Vocal print feature whether with setting the vocal print feature of typing it is consistent;
Third pop-up module, if popping up the prompt window that input again enters the password of secret system for inconsistent.
In above-mentioned first judgment module and third pop-up module, enters the setting of secret system in first time and enter secret When the password of system, user has carried out voice input setting, and secret system obtains and stores the vocal print feature of user.It is again introduced into Secret system, if being made a sound using the user of secret system, secret system collects the voice and judges the sound of the voice messaging Whether line feature consistent with the setting vocal print feature of typing, inconsistent when detecting, pops up a window, windows content include into The Password Input frame and acknowledgement key for entering secret system, page after user inputs first password, before pop-up window can be restored to Face.It wherein, is the first password into secret system of setting into the password of secret system.
In one embodiment, the device 1 of the entrance of secret system further include:
Third obtains module, for obtaining the vocal print feature of user after entering secret system;
Analysis module, for when recognizing voice messaging, whether analysis voice messaging to be consistent with the vocal print feature of user;
4th pop-up module, if popping up the prompt window that input again enters the password of secret system for inconsistent.
It is obtained in module, analysis module and the 4th pop-up module in above-mentioned third, into after secret system, user needs The acquisition and storage of typing voice progress vocal print feature.During using secret system, secret system identification is to there are languages Message breath, just collects the vocal print feature of the voice messaging, and judge whether the vocal print feature is consistent with the vocal print feature of user.If It detects inconsistent, pops up a window, windows content includes the Password Input frame and acknowledgement key into secret system, works as user After inputting first password, the page before pop-up window can be restored to.It wherein, is the entrance of setting into the password of secret system The first password of secret system.Such as: using in secret systematic procedure, user's first be used together with user's second secret system or Person is that user's second is using secret system due to various reasons, wherein the vocal print feature that secret system is obtained and stored is to use The vocal print feature of family first.User's second is made a sound when using secret system, secret system collect the voice messaging and acquire and Judging vocal print feature therein, the vocal print feature for determining acquisition is not the vocal print feature of user's first, current page is closed immediately, And a window is popped up, windows content includes the Password Input frame and acknowledgement key into secret system, only input first password The page before pop-up window can be restored to.
In conclusion the embodiment of the present invention by the key of authentication secret unit and the password into system inputted just Enter secret system after really, realizes the beneficial effect for reinforcing private information safeguard protection, it is intended to solve secret in mobile terminal Information safety protection needs the problem of reinforcing.
Referring to Fig. 4, in another embodiment, the present invention also provides a kind of device 2 of the entrance of secret system, the secrets The device 2 of the entrance of system includes:
Second obtain module 21, for when user initiate enter secret system enter request when, obtain enter secret system The first password of system.
It is obtained in module 21 in above-mentioned third, user is by modes such as the desktops of click or sliding mobile terminal to entrance Secret system is initiated to enter request, after secret system receives entrances request, obtains the password into secret system, i.e., the One password.
Third authentication module 22, for when getting first password, whether verifying first password to be correct.
In above-mentioned third authentication module 22, secret system obtains the first password into secret system inputted Afterwards, the password into system stored in the first password into secret system and secret system that verifying is inputted whether one It causes.
Second detection module 23, if being correctly, to detect whether insertion first key unit for first password.
In the second above-mentioned detection module 23, secret system authenticates to the first password into secret system inputted After consistent with the password into system stored in secret system, whether detection first key unit is inserted into mobile terminal.First Cipher key unit is with the entrance of the form control secret system of a hardware key.
Second sending module 24, if sending the first encryption data to for detecting that first key unit has been inserted into One cipher key unit.
In the second above-mentioned sending module 24, if after secret system detection is inserted into mobile terminal to first key unit, The first encryption data is then sent to first key unit, first key unit verifies the first encryption data.Verify it When whether the first encryption data is that first key unit is inserted into mobile terminal for the first time and connects and binds with secret system, secret system The data information that system reads and stores.Wherein, the first encryption data is the mobile terminal bound with first key unit SN (the Series of IMEI (International Mobile Equipment Identity) and first key unit Number)。
Second receiving module 25, for it is close to receive first when it is correct that first key unit, which verifies the first encryption data, The second encryption data that key unit is sent
In the second above-mentioned receiving module 25, verifying the first encryption data when first key unit is first key unit Insertion mobile terminal and when connecting and binding with secret system for the first time when the data information that secret system reads and stores, is sent out The second encryption data is sent to give secret system.Bound when first key unit authenticates to the mobile terminal being currently inserted into it When mobile terminal, the second encryption data is sent to mobile terminal.Wherein the second encryption data is to bind with first key unit The IMEI information of mobile terminal and the SN information of first key unit.
4th authentication module 26, it is whether correct for verifying the second encryption data.
In the 4th above-mentioned authentication module 26, secret system receive that the first key unit that is currently inserted into sends the When two encryption datas, whether the second encryption data of verifying is first for reading and storing when binding for the first time with first key unit The ciphered data information of cipher key unit.Verify whether the first key unit being currently inserted into is the first key list bound with it Member.Second enters module 27, if being correctly, request to be allowed access into, into secret system for first key.
Enter in module 27 above-mentioned second, secret system authenticate to the second acquired encryption data it is correct after, connect Entered the request of secret system by Client-initiated, that is, enters request, into secret system.
In one embodiment, the device 1 of the entrance of secret system further include:
Third cue module, for prompting user setting to enter secret system when first time entering the secret system First password;
4th cue module, for prompting user to bind first key unit after completing that first password is arranged.
In above-mentioned third cue module and the 4th cue module, when first time entering secret system, secret system The forms such as the window by one setting password of pop-up prompt user setting to enter the password of secret system, which is first close Code.Secret system stores the set password into secret system, as later every time into needed for secret system The password to be inputted, whether the inputted password of verifying correctly compares content when entering secret system after being also used as every time.? After completing setting first password, secret system binds the forms such as window by one prompt of pop-up and prompts user's binding first close Key unit.Secret system identification is inserted into mobile terminal to first key unit for the first time, reads and stores first key unit The information stored in safety chip, i.e. the SN information of first key unit;Meanwhile the information of mobile terminal is also read and storing, That is the IMEI information of mobile terminal, and then the first encryption data is generated, verifying is inserted into when for entering secret system later In cipher key unit whether be bound first key unit comparison condition content.First key unit also can read and store The IMEI information for the mobile terminal being inserted into, and the SN information of itself and IMEI information are generated into the second encryption data.Wherein, it ties up The quantity of fixed first key unit is one.
In one embodiment, above-mentioned first key unit is a cipher key unit or more than one key list Member.
The quantity of above-mentioned bound first key unit can be one or more, the first key list generally bound The quantity of member is up to two.Binding multiple cipher key units is to pass through another when losing a cipher key unit Cipher key unit enters secret system.Binding quantity is unfavorable for the guarantee of secret security of system, thus at most binding two too much Cipher key unit will be unable to enter secret system, it ensure that relatively absolute peace when bound cipher key unit is all lost Entirely.
In one embodiment, above-mentioned first password is a password or more than one password.
The quantity of above-mentioned first password can be with one or more.I.e. first time enter secret system when be arranged into When entering the password of secret system, multiple passwords can be set, enhance its safety.When a password is only arranged, which is Numerical ciphers;It is close after second other than first fundamental cryptographic of setting is numerical ciphers when multiple passwords are arranged Code can be numerical ciphers or pattern password or finger-print cipher.
In one embodiment, the device 1 of the entrance of secret system further include:
First exits module, for automatically exiting from secret system when detecting the extraction of first key unit.
Exited in module above-mentioned first, into secret system, after secret system finishing, in order to prevent user by In hasty, the factors such as be pressed for time cause to forget to exit secret system and the private information in leakage system, secret system are being examined After measuring first key unit extraction mobile terminal, system is automatically exited from.
In one embodiment, the device 2 of the entrance of secret system further include:
5th pop-up module, for when entering secret system, after the second preset time, input to enter again for pop-up The prompt window of the password of secret system.
In the 5th above-mentioned pop-up module, into after secret system, more than the second preset time, need to input again into The password for entering secret system can continue operation secret system.Wherein, the second preset time is 20 minutes;Into secret system Password be setting the first password into secret system.Second preset time can be set by user according to personal inclination It sets.Such as: when user enters secret system reading file, after 20 minutes, a window is popped up, windows content includes into private The Password Input frame and acknowledgement key of close system, page after user inputs first password, before being restored to pop-up window.
In one embodiment, the device 2 of the entrance of secret system further include:
4th detection module, for when entering secret system, whether detection secret system to deposit in third preset time Secret system is operated in user;
6th pop-up module, if being operated for user to be not present in third preset time to secret system, bullet Input the prompt window for entering the password of secret system again out.
In the 4th above-mentioned detection module and the 6th pop-up module, after entering secret system, in third preset time Interior, whether secret system detection user, which has, operates secret system, if can't detect user has progress to secret system Operation, then switch to the window page that input enters the password of secret system for current page, and user's input enters secret system After password, secret system can be opened.Wherein, third preset time is 20 minutes;Password into secret system is setting Into the first password of secret system.Such as: whens entering secret system reading file etc., in 20 minutes, secret system detection Less than user there are the operation that page turning file, input text etc. have contact induction with mobile terminal screen, a window, window are popped up Mouth content includes that the Password Input frame and acknowledgement key into secret system are restored to pop-out after user inputs first password The page before mouthful.
In one embodiment, the device 2 of the entrance of secret system further include:
Second judgment module, for when recognizing voice messaging, judging in voice messaging after entering secret system Vocal print feature whether with setting the vocal print feature of typing it is consistent;
7th pop-up module, if popping up the prompt window that input again enters the password of secret system for inconsistent.
In above-mentioned the second judgment module and the 7th pop-up module, enters the setting of secret system in first time and enter secret When the password of system, user has carried out voice input setting, and secret system obtains and stores the vocal print feature of user.It is again introduced into Secret system, if being made a sound using the user of secret system, secret system collects the voice and judges the sound of the voice messaging Whether line feature consistent with the setting vocal print feature of typing, inconsistent when detecting, pops up a window, windows content include into The Password Input frame and acknowledgement key for entering secret system, page after user inputs first password, before pop-up window can be restored to Face.It wherein, is the first password into secret system of setting into the password of secret system.
In one embodiment, the device 2 of the entrance of secret system further include:
4th obtains module, for obtaining the vocal print feature of user after entering secret system;
First analysis module, for when recognizing voice messaging, analysis voice messaging whether the vocal print feature with user Unanimously;
8th pop-up module, if popping up the prompt window that input again enters the password of secret system for inconsistent.
It is obtained in module, the first analysis module and the 8th pop-up module the above-mentioned the 4th, into after secret system, user Typing voice is needed to carry out the acquisition and storage of vocal print feature.When using during secret system, secret system identification is to depositing In voice messaging, just collect the vocal print feature of the voice messaging, and judge the vocal print feature whether the vocal print feature one with user It causes.If detecting inconsistent, a window is popped up, windows content includes the Password Input frame and acknowledgement key into secret system, Page after user inputs first password, before pop-up window can be restored to.It wherein, is setting into the password of secret system The first password into secret system.Such as: using in secret systematic procedure, user's first is used together secret with user's second System is using secret system due to various reasons for user's second, wherein secret system obtains and the vocal print feature of storage Be user's first vocal print feature.User's second is made a sound, secret system collects the voice messaging simultaneously when using secret system Acquire and judge vocal print feature therein, the vocal print feature for determining acquisition is not the vocal print feature of user's first, closes work as immediately The preceding page, and pop up a window, windows content includes the Password Input frame and acknowledgement key into secret system, only input the One password can be restored to the page before pop-up window.
In conclusion the embodiment of the present invention by the key of authentication secret unit and the password into system inputted just Enter secret system after really, realizes the beneficial effect for reinforcing private information safeguard protection, it is intended to solve secret in mobile terminal Information safety protection needs the problem of reinforcing.
Referring to Fig. 5, the embodiment of the present invention also provides a kind of mobile terminal, including processor 1080 and memory 1020, institute State memory 1020 executed for the device of the entrance that stores secret system above-mentioned secret system entrance method program; The processor 1080 is configurable for executing the program stored in the memory.
For ease of description, only parts related to embodiments of the present invention are shown, disclosed by specific technical details, asks Referring to present invention method part.The mobile terminal can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer etc. it is any eventually End equipment, by taking mobile terminal is mobile phone as an example:
Fig. 5 shows the block diagram of the part-structure of mobile phone relevant to mobile terminal provided in an embodiment of the present invention.Ginseng Fig. 5 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input unit 1030, display Unit 1040, sensor 1050, voicefrequency circuit 1060, Wireless Fidelity (wireless fidelity, WiFi) module 1070, place Manage the components such as device 1080 and power supply 1090.It will be understood by those skilled in the art that the not structure of handset structure shown in Fig. 5 The restriction of pairs of mobile phone may include perhaps combining certain components or different components than illustrating more or fewer components Arrangement.
It is specifically introduced below with reference to each component parts of the Fig. 5 to mobile phone:
RF circuit 1010 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 1080;In addition, the data for designing uplink are sent to base station.In general, RF circuit 1010 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 1010 can also be logical with network and other equipment by wireless communication Letter.Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 1020 can be used for storing software program and module, and processor 1080 is stored in memory by operation 1020 software program and module, thereby executing the various function application and data processing of mobile phone.Memory 1020 can be led It to include storing program area and storage data area, wherein storing program area can be needed for storage program area, at least one function Application program (such as sound-playing function, image player function etc.) etc.;Storage data area, which can be stored, uses institute according to mobile phone Data (such as audio data, phone directory etc.) of creation etc..In addition, memory 1020 may include high random access storage Device, can also include nonvolatile memory, and a for example, at least disk memory, flush memory device or other volatibility are solid State memory device.
Input unit 1030 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 1030 may include touch panel 1031 and other inputs Equipment 1032.Touch panel 1031, also referred to as touch screen collect touch operation (such as the user of user on it or nearby Use the behaviour of any suitable object or attachment such as finger, stylus on touch panel 1031 or near touch panel 1031 Make), and corresponding attachment device is driven according to preset formula.Optionally, touch panel 1031 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 1080, and order that processor 1080 is sent can be received and executed.In addition, Touch panel 1031 can be realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch surface Plate 1031, input unit 1030 can also include other input equipments 1032.Specifically, other input equipments 1032 may include But in being not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more.
Display unit 1040 can be used for showing information input by user or be supplied to user information and mobile phone it is each Kind menu.Display unit 1040 may include display panel 1041, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 1041.Further, touch panel 1031 can cover display panel 1041, when touch panel 1031 detects After arriving touch operation on it or nearby, processor 1080 is sent to determine the type of touch event, is followed by subsequent processing device 1080 provide corresponding visual output according to the type of touch event on display panel 1041.Although in Fig. 5, touch panel 1031 and display panel 1041 are the input and input function for realizing mobile phone as two independent components, but in certain realities Apply in example, can be integrated by touch panel 1031 and display panel 1041 and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 1050, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 1041, proximity sensor can close display panel when mobile phone is moved in one's ear 1041 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Also as mobile phone The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 1060, loudspeaker 1061, microphone 1062 can provide the audio interface between user and mobile phone.Audio Electric signal after the audio data received conversion can be transferred to loudspeaker 1061, be converted by loudspeaker 1061 by circuit 1060 For voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1062, by voicefrequency circuit 1060 Audio data is converted to after reception, then by after the processing of audio data output processor 1080, through RF circuit 1010 to be sent to ratio Such as another mobile phone, or audio data is exported to memory 1020 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 1070 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 5 is shown WiFi module 1070, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 1080 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, By running or execute the software program and/or module that are stored in memory 1020, and calls and be stored in memory 1020 Interior data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 1080 may include one or more processing units;Preferably, processor 1080 can integrate application processor and modulation /demodulation processing Device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1080.
Mobile phone further includes the power supply 1090 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply Management system and processor 1080 are logically contiguous, to realize management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
Referring to Fig. 5, in embodiments of the present invention, processor 1080 included by the mobile terminal is also with the following functions:
When user initiates to detect whether insertion first key unit into secret system into when request;
If detecting, the first key unit has been inserted into, and sends the first encryption data to the first key unit;
When it is correct that the first key unit, which verifies first encryption data, the first key unit hair is received The second encryption data sent;
Whether correct verify second encryption data;
If second encryption data is correctly, to obtain the first password into the secret system;
When getting the first password, whether correct the first password is verified;
If the first password is correctly, to allow the entrance request, into the secret system.
Referring to Fig. 5, in embodiments of the present invention, processor 1080 included by the mobile terminal is also with the following functions:
When user initiates to enter when entering request of secret system, acquisition enters the first password of the secret system;
When getting the first password, whether correct the first password is verified;
If the first password is correctly, to detect whether insertion first key unit;
If detecting, the first key unit has been inserted into, and sends the first encryption data to the first key unit;
When it is correct that the first key unit, which verifies first encryption data, the first key unit hair is received The second encryption data sent;
Whether correct verify second encryption data;
If second encryption data is correctly, to allow the entrance request, into the secret system.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
Those of ordinary skill in the art will appreciate that implement the method for the above embodiments be can be with Relevant hardware is instructed to complete by program, the program can store in a kind of computer readable storage medium, on Stating the storage medium mentioned can be read-only memory, disk or CD etc..
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all utilizations Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content is applied directly or indirectly in other correlations Technical field, be included within the scope of the present invention.

Claims (10)

1. a kind of method of the entrance of secret system, which is characterized in that the method includes the steps:
When user initiates to detect whether insertion first key unit into secret system into when request;
If detecting, the first key unit has been inserted into, and sends the first encryption data to the first key unit;
When it is correct that the first key unit, which verifies first encryption data, receive what the first key unit was sent Second encryption data;
Whether correct verify second encryption data;
If second encryption data is correctly, to obtain the first password into the secret system;
When getting the first password, whether correct the first password is verified;
If the first password is correctly, to allow the entrance request, into the secret system.
2. the method for the entrance of secret system according to claim 1, which is characterized in that described when user initiates to enter private Close system enter request when, detect whether insertion first key unit the step of before, comprising:
When first time entering the secret system, user setting is prompted to enter the first password of the secret system;
After completing that the first password is arranged, user is prompted to bind the first key unit.
3. the method for the entrance of secret system according to claim 1, which is characterized in that the first key unit is one A cipher key unit or more than one cipher key unit.
4. the method for the entrance of secret system according to claim 2, which is characterized in that completed described in setting described After first password, prompt user bind the first key unit the step of after, which comprises
After completing to bind the first key unit, the first password is stored in the first key unit.
5. the method for the entrance of secret system according to claim 1, which is characterized in that if in the first password Be it is correct, then allow it is described enter request, the step of into the secret system after, which comprises
When detecting first key unit extraction, the secret system is automatically exited from.
6. a kind of method of the entrance of secret system, which is characterized in that the method includes the steps:
When user initiates to enter when entering request of secret system, acquisition enters the first password of the secret system;
When getting the first password, whether correct the first password is verified;
If the first password is correctly, to detect whether insertion first key unit;
If detecting, the first key unit has been inserted into, and sends the first encryption data to the first key unit;
When it is correct that the first key unit, which verifies first encryption data, receive what the first key unit was sent Second encryption data;
Whether correct verify second encryption data;
If second encryption data is correctly, to allow the entrance request, into the secret system.
7. a kind of device of the entrance of secret system, which is characterized in that described device includes:
First detection module, for when user initiate enter secret system enter request when, detect whether insertion first key Unit;
First sending module, if sending the first encryption data to described for detecting that the first key unit has been inserted into First key unit;
First receiving module, for when it is correct that the first key unit, which verifies first encryption data, described in reception The second encryption data that first key unit is sent;
First authentication module, it is whether correct for verifying second encryption data;
First obtains module, if being that correctly, obtain the entrance secret system first is close for second encryption data Code;
Second authentication module, it is whether correct for when getting the first password, verifying the first password;
First entering module, if being correctly, to allow the entrance request, into the secret system for the first password System.
8. the device of the entrance of secret system according to claim 7, which is characterized in that described device further include:
First cue module, for prompting user setting to enter the secret system when first time entering the secret system First password;
Second cue module, for prompting user to bind first key unit after completing that the first password is arranged.
9. a kind of device of the entrance of secret system, which is characterized in that described device includes:
Second obtain module, for when user initiate enter secret system enter request when, obtain enter the secret system First password;
Third authentication module, it is whether correct for when getting the first password, verifying the first password;
Second detection module, if being correctly, to detect whether insertion first key unit for the first password;
Second sending module, if sending the first encryption data to described for detecting that the first key unit has been inserted into First key unit;
Second receiving module, for when it is correct that the first key unit, which verifies first encryption data, described in reception The second encryption data that first key unit is sent;
4th authentication module, it is whether correct for verifying second encryption data;
Second enters module, if being correctly, to allow the entrance request, into the secret for second encryption data System.
10. a kind of mobile terminal, which is characterized in that including processor and memory,
The memory is used to store the device right of execution 1 of the entrance of secret system to secret system described in power any one of 6 Entrance method program;
The processor is configured to for executing the program stored in the memory.
CN201810877795.2A 2018-08-03 2018-08-03 The method, apparatus of the entrance of mobile terminal and secret system Pending CN109327597A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810877795.2A CN109327597A (en) 2018-08-03 2018-08-03 The method, apparatus of the entrance of mobile terminal and secret system
PCT/CN2019/098718 WO2020025005A1 (en) 2018-08-03 2019-07-31 Mobile terminal, and entering method and device of privacy system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810877795.2A CN109327597A (en) 2018-08-03 2018-08-03 The method, apparatus of the entrance of mobile terminal and secret system

Publications (1)

Publication Number Publication Date
CN109327597A true CN109327597A (en) 2019-02-12

Family

ID=65263263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810877795.2A Pending CN109327597A (en) 2018-08-03 2018-08-03 The method, apparatus of the entrance of mobile terminal and secret system

Country Status (2)

Country Link
CN (1) CN109327597A (en)
WO (1) WO2020025005A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020025005A1 (en) * 2018-08-03 2020-02-06 奇酷互联网络科技(深圳)有限公司 Mobile terminal, and entering method and device of privacy system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN105429937A (en) * 2015-10-22 2016-03-23 同济大学 Identity authentication method and system based on keystroke behaviors
CN106973054A (en) * 2017-03-29 2017-07-21 山东超越数控电子有限公司 A kind of operating system login authentication method and system based on credible platform
CN106982224A (en) * 2017-04-28 2017-07-25 南京网博计算机软件系统有限公司 The method and system of real time identity checking identification
CN107145773A (en) * 2017-04-17 2017-09-08 努比亚技术有限公司 A kind of information cuing method and its device based on full frame fingerprint recognition

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904719B (en) * 2011-07-27 2016-05-18 国民技术股份有限公司 The using method of a kind of USB-key and USB-key
WO2014059604A1 (en) * 2012-10-16 2014-04-24 华为技术有限公司 Method and device for secure access to resource
CN103051631B (en) * 2012-12-21 2015-07-15 国云科技股份有限公司 Unified security authentication method for PaaS (Platform as a Service) platform and SaaS (Software as a Service) application system
CN103218716A (en) * 2013-03-06 2013-07-24 交通银行股份有限公司 Safety certification terminal USBkey (Ukey), internet bank operation method and internet bank operation equipment
CN104243155B (en) * 2013-06-18 2019-01-22 腾讯科技(深圳)有限公司 The method and device of safety verification
CN104951409B (en) * 2015-06-12 2019-03-08 中国科学院信息工程研究所 A kind of hardware based full disk encryption system and encryption method
CN109327597A (en) * 2018-08-03 2019-02-12 奇酷互联网络科技(深圳)有限公司 The method, apparatus of the entrance of mobile terminal and secret system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN105429937A (en) * 2015-10-22 2016-03-23 同济大学 Identity authentication method and system based on keystroke behaviors
CN106973054A (en) * 2017-03-29 2017-07-21 山东超越数控电子有限公司 A kind of operating system login authentication method and system based on credible platform
CN107145773A (en) * 2017-04-17 2017-09-08 努比亚技术有限公司 A kind of information cuing method and its device based on full frame fingerprint recognition
CN106982224A (en) * 2017-04-28 2017-07-25 南京网博计算机软件系统有限公司 The method and system of real time identity checking identification

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020025005A1 (en) * 2018-08-03 2020-02-06 奇酷互联网络科技(深圳)有限公司 Mobile terminal, and entering method and device of privacy system

Also Published As

Publication number Publication date
WO2020025005A1 (en) 2020-02-06

Similar Documents

Publication Publication Date Title
CN107437009B (en) Authority control method and related product
CN106778175B (en) Interface locking method and device and terminal equipment
CN106331370B (en) A kind of data transmission method and terminal device
CN109923544A (en) Method for authenticating and electronic equipment
CN107483213B (en) Security authentication method, related device and system
CN111758095A (en) Method and terminal for quickly opening application or application function
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN104967593B (en) A kind of auth method, device and system
CN108171037A (en) Using startup method, terminal and computer storage media
CN105678553A (en) Method, device and system for processing order information
CN106327193B (en) A kind of system unlocking method and equipment
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN108196762A (en) A kind of terminal control method, terminal and computer readable storage medium
CN106952089A (en) A kind of startup method, device and the mobile terminal at payment interface
CN110941821A (en) Data processing method, device and storage medium
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN109863504A (en) A kind of cryptographic check method, cipher set-up method and mobile terminal
CN109300203A (en) Mobile terminal and unlocking method, device
CN104573437B (en) Information authentication method, device and terminal
CN109409044A (en) A kind of verifying interface display method and terminal
CN107480495B (en) Unlocking method of mobile terminal and related product
WO2017193645A1 (en) Method and apparatus for displaying data, and terminal
CN107480996A (en) A kind of method of payment and terminal
CN109462693A (en) A kind of information processing method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190212