CN100459757C - Method cipher stealing information detecting mobile communication terminal set - Google Patents

Method cipher stealing information detecting mobile communication terminal set Download PDF

Info

Publication number
CN100459757C
CN100459757C CNB2004100708153A CN200410070815A CN100459757C CN 100459757 C CN100459757 C CN 100459757C CN B2004100708153 A CNB2004100708153 A CN B2004100708153A CN 200410070815 A CN200410070815 A CN 200410070815A CN 100459757 C CN100459757 C CN 100459757C
Authority
CN
China
Prior art keywords
cipher
password
input
data
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100708153A
Other languages
Chinese (zh)
Other versions
CN1622667A (en
Inventor
金美暻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LG Electronics China Research and Development Center Co Ltd
Original Assignee
LG Electronics China Research and Development Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LG Electronics China Research and Development Center Co Ltd filed Critical LG Electronics China Research and Development Center Co Ltd
Publication of CN1622667A publication Critical patent/CN1622667A/en
Application granted granted Critical
Publication of CN100459757C publication Critical patent/CN100459757C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/10Scheduling measurement reports ; Arrangements for measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The invention relates to a method for detecting cipher stealing information of a mobile communication terminal set, relates to a mobile communication field. The invention is capable of preventing a cipher of a user terminal set from being stealed by others, and saving corresponding stealing record for being checked by the user, the method comprises following steps: setting a cipher stealing detection condition; inputting the cipher via a cipher input window in a screen menu; comparing the inputted cipher with the saved user's cipher, if they are not the same, judging whether the cipher is accorded with the set cipher stealing detection condition; if the cipher is accorded with the set cipher stealing detection condition, the system instantly outputting a detection information an an alarming voice related to lawless cipher stealing; selecting a hacker history menu, and when the cipher is accorded with the set cipher stealing detection condition, displaying the error inputted cipher and the error cipher inputting time data. With the invention, cipher of the user terminal set can be prevented from being stealed by others except for the user, and the cipher error input history can be checked.

Description

A kind of method of cipher stealing information detecting mobile communication terminal set
Technical field
The present invention relates to field of mobile terminals, particularly a kind of method of cipher stealing information detecting mobile communication terminal set, this method can prevent other people usurping the user terminal password.
Background technology
Provide the protection user terminal required lock function by mobile communication terminal machine; at this lock function after setting completed; in case system transfers the state that terminating machine is powered to from the state of powered-down,, just must import the user cipher that has been provided with for normal this terminating machine that uses.
That is to say, when the user dynamo-electric source of opening a terminal, during starting drive, what at first eject is the user cipher input window, when the user cipher of having preserved in password that the user inputs in this window and the system was consistent, the user promptly can enable this terminal function, if but when the inconsistent situation of password takes place, system will require the user to re-enter password, till the password of importing accurately.Certainly, for the project that requires to input password, for example when entering system, just must re-enter password one time with terminating machine management function.
Moreover, also be provided with the individual privacy protection project that to protect terminating machine major function (for example, terminating machine management function) and basic function in the system.In case the user has started this function, as long as use a terminating machine, the user will import user cipher one time.For example, the user needs the input user cipher in order to converse, and the character message that receives in order to confirm also needs to import user cipher.By this function, other people just can't arbitrarily use this user's terminating machine, have just guaranteed that also user's individual privacy is not let out.
But to existing mobile communication terminal machine, the number of times of input password will not be subjected to any restriction, only need to judge password that the user imports whether with user cipher consistent the getting final product whether that is kept in the system.For this user terminal, because the password input is not subjected to the restriction of number of times, other people just have an opportunity not limit number of times ground constantly to carry out the password input and attempt, till the password that has been provided with in the password of being inputed and system is consistent, and because this input is attempted can not leaving any record, the user also can't learn extraneous other people the use attempt to own terminating machine.
As mentioned above, because the restriction of number of times or not in the input of the password of existing mobile communication terminal machine, and only need judge that password that the user inputs is whether consistent with the user cipher preserved in the system.Thereby this mode exists and causes other people illegally to usurp user cipher easily and problem that the user knows nothing this behavior of usurping.
Summary of the invention
In order to solve the problems referred to above that prior art exists in actual mechanical process, the objective of the invention is to provide a kind of method of cipher stealing information detecting mobile communication terminal set for the user, this method with the input bad password and be kept at input time in the internal memory, when if the bad password of input meets the cipher stealing detecting condition that is provided with in advance by the user, system is about to this operation judges for the cipher stealing attempt is arranged, by display screen prompting user, show the people and just attempting to usurp the detecting information of user cipher, also send alarm sound simultaneously, thereby can prevent other people usurping effectively the user terminal password.
Simultaneously, aim of the present invention also is by a kind of method of cipher stealing information detecting mobile communication terminal set is provided, so that with the bad password of input be kept in chronological order input time in the internal memory, can confirm password mistake input history to guarantee the user.
In order to realize above purpose, the invention provides a kind of special mechanism, it is characterized in that: this mechanism comprises the steps: at first, for described terminating machine is provided with lock function or individual privacy defencive function, and cipher stealing detecting condition is set; The user cipher of preserving in password and the system with input compares, and judges whether both are consistent, if there is inconsistent situation, will comprise that importing wrong password and the data of input time is kept in the internal memory of described terminating machine; And judge further whether this input operation meets the cipher stealing detecting condition of above setting; Through judging, if think that it meets the cipher stealing detecting condition of above setting, system promptly exports with this and illegally usurps password behavior relevant detecting information and alarm sound.
Described cipher stealing detecting condition has following feature: whether the number of times of judging input password mistake within the special time of system's setting has surpassed given number of times.
With form described wrong password and the data of input time of input that comprise are kept in the internal memory of described terminating machine.The bad password of above-mentioned input of preserving with form and the affirmation process of this password input time is characterized in that described process comprises the steps: to select hacker's history menu, and by shown password input window mouth input password; When the password of being inputed is consistent with the user cipher of having preserved, can show the password that above input is wrong and data input time of this bad password.
The data such as input time of above-mentioned preservable bad password and this bad password have following feature: above-mentioned bad password and this bad password data bulk input time (N) preserved can be set, after the data bulk of preserving has reached the described particular value that sets in advance, if import next (N+1) data again, holding time data the earliest are promptly deleted, and the data that will newly import are kept in the zone of the intact legacy data of firm deletion.
Described prompting user's cipher stealing detecting information and alarm sound have following feature: if user's input with preserved user cipher corresponding to, accurately during password, above error message demonstration and alarm sound can be removed immediately.
Beneficial effect of the present invention is, can prevent except that the user other people effectively to the usurping of user terminal password, and the password input error history of preserving in can the affirmation system.
Description of drawings
Fig. 1 is the embodiment flow chart of relevant in the present invention mobile communication terminal machine cipher stealing information method for detecting;
Fig. 2 is the operational flowchart that history is confirmed of usurping to having preserved in the present invention;
Fig. 3 be on display window, show among the present invention usurp history display interface schematic diagram.
Embodiment
Below, carry out following detailed description for the present invention in conjunction with the accompanying drawings.
Fig. 1 is the embodiment flow chart of relevant in the present invention mobile communication terminal machine cipher stealing information method for detecting.As shown in the figure, this method for detecting comprises the steps: at first, enters the hacker who is provided with and detect menu on terminating machine, input (setting) cipher stealing detecting condition; After the above cipher stealing detecting condition of input,, judge whether the password of input is consistent with the user cipher of preserving in advance by the password input field input password that on window, shows; If through judging, not consistent between the password of confirming input and the preset user password, and, within the time of appointment, when the number of times that the password input error occurs exceeded set numerical value (cipher stealing detecting condition), system promptly exports illegally to be usurped password with this and attempts corresponding detecting information and alarm sound; If within the time of appointment, the number of times that the password input error occurs does not exceed set numerical value, and system returns the step of re-entering password.
The input number of times of above-mentioned input error password, be included in the user as the data such as preset time of basis for estimation and detect within the cipher stealing detecting condition set behind the menu by entering the hacker, have only after inputing accurately password, could remove the cipher stealing detecting reminding information and the alarm sound that are produced.
And, for the wrong input password and the data such as input time of this password, be with the form of form by input time order be kept in the internal memory of terminating machine inside, the preservation state of these data and the on off state of power supply are irrelevant.
According to the above step that constitutes of the present invention, its operational mode is carried out system specialization below.
At first, the terminating machine user by the password hacker menu that is provided by terminal, is provided with cipher stealing detecting condition in order to detect the attempt that other users usurp password.For example, above cipher stealing detecting condition can be provided with by following mode: within the time (for example 1 minute) of appointment, input error password number of times can not exceed given number of times (for example 3 times), perhaps under the condition that is not subjected to restriction input time, the number of times of input password can not exceed predetermined number of times (for example 10 times) etc.And, before entering above related menu, the corresponding to password of user cipher that must input Yu in system, preserve.
After above cipher stealing detecting condition setting is finished; in case the situation of input password needing to occur; for example; in the time of under above-mentioned terminating machine has been in the lock function that sets in advance or the protection of individual privacy defencive function; the user is for other functions of using terminating machine or in order to enter the terminating machine manager system; just need import corresponding password within the password input window mouth in display screen; after the password input was finished, system will judge also whether this password is consistent with the user cipher that is kept in the system.
Through above deterministic process, if confirm two password unanimities, can carry out function corresponding, if find to exist between the two when inconsistent, system will compare with the cipher stealing detecting condition that sets in advance.For example, suppose that cipher stealing detecting condition is " occurring password input error more than 3 times within 1 minute? " at this moment, if when can only password input error frequency being no more than more than 3 times in one minute, before inputing accurately password, can repeat the display password input window on the screen always; In case satisfy above cipher stealing detecting condition, when the password input error promptly within 1 minute, occurring more than 3 times, detecting information (for example " hacker finds Hacking Detection ") is usurped by system's output password immediately, and the alarm sound that sets in advance (the tinkle of bells), and will there be the people attempting to usurp the advisory user of password.
If above-mentioned cipher stealing detecting reminding information and alarm sound that deactivation system produced must be inputed password accurately.Simultaneously, the password that relevant input is wrong and the data such as input time of this password will be stored in the internal memory with form, and the user can confirm to be kept at intrasystem password input error history (history).
Fig. 2 has represented to confirm above password input error (cipher stealing) historical process, for cipher stealing history is confirmed, need at first input password, have only when the input password be kept at user cipher in the system when consistent, just have the right to carry out the historical affirmation process of password input error (cipher stealing).
For the menu of above affirmation cipher stealing history, both can it be set to subordinate's menu that the hacker detects menu, also can be set to independently menu.If confirm that menu setting for the hacker detects subordinate's menu of menu, then enters menu and also must input password, and detect menu in case enter this hacker with above cipher stealing is historical, just can directly enter the historical affirmation of cipher stealing menu.
After entering that above-mentioned cipher stealing is historical and confirming menu, as shown in Figure 3, be stored in the wrong password of input in the internal memory and the data such as input time of this password and all can be presented on the display screen according to the sequencing of input time.That is to say, show to the such order of data of preserving at first by data from up-to-date preservation.The quantity (N) of the cipher stealing history that allows to be kept in the internal memory can be set by terminal system, after preservation quantity reaches this value of setting (N), the data of follow-up input will cover the longest data of holding time, that is preserve the data of this new input in this deletion zone.
As described in above detailed description, can produce following effect by the present invention: if the password input error, system can and be saved in the internal memory with this bad password input time, if this password input error situation meets when detecting condition by the cipher stealing of user's setting in advance, system will think that it has the attempt of usurping password, existing side by side soon, cipher stealing detecting information is presented on the display screen, produce alarm sound simultaneously, thereby can prevent other people the usurping except that the user effectively the user terminal password.
Simultaneously, the present invention can also produce following effect: be stored in the internal memory password input error history that the user preserves in promptly can the affirmation system by the information such as input time that order will be inputed wrong password and this password data input time.
Above embodiment only is used to illustrate the present invention, but not is used to limit the present invention.

Claims (8)

1. the method for a cipher stealing information detecting mobile communication terminal set is characterized in that, described method comprises the steps:
Step 1 for described terminating machine is provided with lock function or individual privacy defencive function, is provided with cipher stealing detecting condition;
Whether the user cipher of preservation is consistent in the step 2, the password of relatively being inputed and system, if exist when inconsistent, will comprise that importing wrong password and the data of input time is kept in the internal memory of described terminating machine; And judge further whether this input operation meets the cipher stealing detecting condition of setting;
Step 3 is through above deterministic process, if system thinks that output was about illegally usurping the detecting information and the alarm sound of password immediately when described input operation met described cipher stealing detecting condition.
2. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 1, it is characterized in that: utilize described cipher stealing detecting condition, judge whether password mistake input number of times has surpassed given number of times within set certain hour.
3. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 1 is characterized in that: with form described wrong password and the data of input time of input that comprise are kept in the internal memory of described terminating machine.
4. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 3, it is characterized in that: confirm to import the wrong password and the step of the data of input time comprising of form preservation, comprise and select hacker's history menu, and by shown password input window mouth input password; When the user cipher of preserving in this password of being inputed and the system is consistent, comprise password that input is wrong and the data of input time more than can showing.
5. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 4 is characterized in that: be stored in and comprise that password and the data of input time that input is wrong are to show for order to the data of preserving at first according to the data from nearest preservation in the internal memory.
6. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 3, it is characterized in that: the preservable quantity of importing wrong password and the data of input time that comprises can not surpass the data bulk (N) that pre-sets, after the data bulk of preserving has reached this value of setting, if when importing the next one (N+1) data again, be about to delete holding time data the earliest, and the data that will newly import are kept in the zone of the intact legacy data of firm deletion.
7. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 1, it is characterized in that: when the user inputed with system in the user cipher preserved corresponding to, accurately during password, can remove detecting information and the alarm sound relevant with illegally usurping password.
8. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 1, it is characterized in that also comprising the steps: through described deterministic process, when if described operation does not meet the cipher stealing detecting condition of above setting, system will continue the display password input window, and the chance of re-entering password is provided for the user.
CNB2004100708153A 2003-11-26 2004-07-20 Method cipher stealing information detecting mobile communication terminal set Expired - Fee Related CN100459757C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020030084648 2003-11-26
KR1020030084648A KR20050050976A (en) 2003-11-26 2003-11-26 Method for detecting password's hacking of mobile communication terminal

Publications (2)

Publication Number Publication Date
CN1622667A CN1622667A (en) 2005-06-01
CN100459757C true CN100459757C (en) 2009-02-04

Family

ID=34793117

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100708153A Expired - Fee Related CN100459757C (en) 2003-11-26 2004-07-20 Method cipher stealing information detecting mobile communication terminal set

Country Status (2)

Country Link
KR (1) KR20050050976A (en)
CN (1) CN100459757C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110225648A1 (en) * 2010-03-15 2011-09-15 Intuit Inc. Method and apparatus for reducing the use of insecure passwords
CN103413081B (en) * 2013-08-29 2016-08-31 惠州Tcl移动通信有限公司 A kind of input reminding method, password amending method and electronic equipment after password
CN105094664A (en) * 2015-06-10 2015-11-25 小米科技有限责任公司 Terminal device privacy protection method and apparatus
CN106295276A (en) * 2016-08-09 2017-01-04 浪潮电子信息产业股份有限公司 A kind of user of record inputs the method that BIOS password enters system
CN112419627B (en) * 2020-11-20 2021-10-08 深圳市捷诚技术服务有限公司 POS machine PIN input protection method and device, storage medium and POS machine

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1407787A (en) * 2001-09-08 2003-04-02 深圳市中兴通讯股份有限公司上海第二研究所 Self-alarming and anti-theft method for mobile terminals
CN1420480A (en) * 2000-01-21 2003-05-28 索尼公司 Data processing apparatus and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1420480A (en) * 2000-01-21 2003-05-28 索尼公司 Data processing apparatus and method
CN1407787A (en) * 2001-09-08 2003-04-02 深圳市中兴通讯股份有限公司上海第二研究所 Self-alarming and anti-theft method for mobile terminals

Also Published As

Publication number Publication date
KR20050050976A (en) 2005-06-01
CN1622667A (en) 2005-06-01

Similar Documents

Publication Publication Date Title
US8290473B2 (en) Remotely modifying data in memory in a mobile device
CN104091376A (en) Intelligent lock control method and apparatus thereof
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
CN103034414A (en) Electronic equipment and screen unlocking method thereof
CN104966007A (en) Multi-user login method and apparatus
US8706158B2 (en) Mobile phone for authenticating SIM card and method thereof
CN104794405A (en) Method and system for achieving private storage of messages
CN111581665B (en) Data processing method and device and electronic equipment
CN106385506A (en) Information notification management method and device
CN103019599A (en) Electronic equipment and unlocking method of screen thereof
CN108090331A (en) A kind of unlocking method and equipment
CN105827817A (en) Alarm method and mobile terminal
CN106021010A (en) Processing method and device for anomaly of proximity detector
CN107135229A (en) Intelligent home information safe verification method, device, equipment and system
CN100459757C (en) Method cipher stealing information detecting mobile communication terminal set
CN105488372A (en) Verification method and device
CN106303371A (en) Take pictures monitoring system, method and mobile terminal
CN105184184A (en) Anti-theft method for terminal data
CN105516500B (en) A kind of method and system selecting equipment mode
CN105721664B (en) A kind of SMS processing method and device
CN102404728A (en) System and method for mobile phone tracking and privacy protection
CN106874795B (en) Mobile terminal and machine disassembly prevention method and device thereof
CN104796885A (en) Method and system for realizing private conversation in conversation process
CN106529319A (en) File protection method and device, and terminal
Manual About this Manual

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090204