CN102970681A - Safe access achieving method and system for mobile terminal - Google Patents

Safe access achieving method and system for mobile terminal Download PDF

Info

Publication number
CN102970681A
CN102970681A CN2012104510343A CN201210451034A CN102970681A CN 102970681 A CN102970681 A CN 102970681A CN 2012104510343 A CN2012104510343 A CN 2012104510343A CN 201210451034 A CN201210451034 A CN 201210451034A CN 102970681 A CN102970681 A CN 102970681A
Authority
CN
China
Prior art keywords
access
portable terminal
time
login password
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104510343A
Other languages
Chinese (zh)
Other versions
CN102970681B (en
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201210451034.3A priority Critical patent/CN102970681B/en
Publication of CN102970681A publication Critical patent/CN102970681A/en
Application granted granted Critical
Publication of CN102970681B publication Critical patent/CN102970681B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safe access achieving method and system for a mobile terminal. The system comprises a default access authorization judgment module, a login password detection module, an authorization monitoring module and an access authorization usage control module. The method comprises (A) judging whether a default access right is set for the mobile terminal when receiving external access request, (B) judging whether a login password is set for the mobile terminal if the default access right is set, (C) judging whether the mobile terminal is in a login mode if the login password is set, and (D) authorizing access to the mobile terminal within access right time if the mobile terminal is in the login mode. According to the safe access achieving method and system, monitoring of the access right and control of access to the mobile terminal are achieved, information safety of the mobile terminal is guaranteed, and access authorization does not need verifying when a standby state of the mobile terminal is transferred to a working state within authorized access time.

Description

A kind of secure access implementation method and system of portable terminal
Technical field
The present invention relates to portable terminal, more particularly, relate to a kind of secure access implementation method and system of portable terminal.
Background technology
Current mobile terminal provides the anti-information leakage methods such as the password of separating the portable terminal screen locking, PIN code are set for the user, but in order to make things convenient for portable terminal to be connected with computer, usually portable terminal manufacturer provides pc external member or third party software, can by wired or wireless mode portable terminal be connected with PC or other portable terminals at an easy rate by PC external member or third party software.
With portable terminal and PC or other portable terminal First Contact Connections the time, can require the user to open and use authority, as choose USB connectivity option, wireless network access authority, the user, is traditionally arranged to be acquiescence and authorizes after selecting for the first time for convenient.When connecting for the second time, in the situation of authority, can get access to easily the file in this mobile terminal stores card, comprise the secret files such as information, photo, mail.For example, in the situation of authority, realized being connected of portable terminal and PC or other portable terminals, therefore, PC or other portable terminals by being connected with this portable terminal obtain the various files in this mobile terminal stores card.
Like this, although portable terminal being provided with logs in password, lose or the user is of short duration when leaving when portable terminal, other people can obtain the various information of this user easily, consist of dangerous for user's information security.
Summary of the invention
The present invention is directed in the prior art, when user's portable terminal is set to the mandate of access acquiescence, uncontrollable access to portable terminal, and cause the defective of the information security that can't guarantee portable terminal, a kind of secure access implementation method and system of portable terminal are provided, when portable terminal is set to the mandate of access acquiescence, can to the access control of portable terminal, guarantee the information security of portable terminal.
The technical scheme that the present invention solves its technical problem employing is: a kind of secure access implementation method of portable terminal is provided, may further comprise the steps:
A, when receiving the external reference request, judge whether portable terminal is provided with default access;
If B is provided with default access, judge then whether described portable terminal is provided with login password;
If C is provided with login password, judge then whether described portable terminal is in login mode;
If the described portable terminal of D is in login mode, then authorizes in access rights and access described portable terminal in the time.
Preferably, described method also comprises step:
E, the described external reference request of monitoring.
Preferably, described method also comprises step:
F, set in advance the described access rights time.
Preferably, described step B may further comprise the steps:
B1, judging whether described portable terminal is provided with login password, is execution in step C then, otherwise execution in step B2;
B2, the described portable terminal of granted access.
Preferably, described step C may further comprise the steps:
C1, judging whether described portable terminal is in login mode, is execution in step D then, otherwise execution in step C2;
C2, prompting input login password, and judge whether the login password of input is correct, execution in step D when the login password of input is correct.
Preferably, described step D may further comprise the steps:
The access authorization time whether D1, prompting revise this access, be that access authorization time and the mandate that then receives this access of user's input accessed described portable terminal in the access rights of input in the time, otherwise carry out D2;
D2, mandate be the described portable terminal of access within the access authorization time of acquiescence.
Further preferably, described step D also comprises step:
D3, judging whether the access authorization time expire, is then to stop access authorization.
Provide a kind of secure access of portable terminal to realize system, described system comprises:
Default access mandate judge module is used for judging whether portable terminal is provided with default access when receiving the external reference request;
The login password detection module is used for judging whether described portable terminal is provided with login password when being provided with default access;
Authorize monitoring module, be used for when being provided with login password, judging whether described portable terminal is in login mode; And
Control module is used in access authorization, is used for authorizing and accessing described portable terminal in the time in access rights when described portable terminal is in login mode.
Preferably, described system also comprises:
The external reference monitoring module is used for monitoring described external reference request.
Preferably, described system also comprises:
Access time arranges module, is used for arranging and revising the described access rights time;
The access time modified module, the access authorization time that is used for revising single reference.
Secure access implementation method and the system of portable terminal of the present invention have following beneficial effect: when the present invention is provided with default access at portable terminal, judge whether to be provided with login password, when being provided with login password, judge whether to be in login mode, realized to access rights monitoring, to the control of the access of portable terminal, guarantee the information security of portable terminal; And, authorization access control is carried out in the time in access rights, guaranteed in granted access in the time that portable terminal transfers operating state to from holding state and also need not again authentication-access mandate.
Description of drawings
Fig. 1 is the system block diagram that the secure access of portable terminal of the present invention realizes the first embodiment of system;
Fig. 2 is the system block diagram that the secure access of portable terminal of the present invention realizes the second embodiment of system;
Fig. 3 is the workflow diagram that the secure access of portable terminal of the present invention realizes the second embodiment of system;
Fig. 4 is the flow chart of secure access implementation method first embodiment of portable terminal of the present invention;
Fig. 5 is the flow chart of secure access implementation method second embodiment of portable terminal of the present invention.
Embodiment
Below in conjunction with drawings and Examples the present invention is further explained explanation.
Fig. 1 is the system block diagram that the secure access of portable terminal of the present invention realizes 100 first embodiment of system, as shown in Figure 1, in the present embodiment, system 100 comprises default access mandate judge module 110, login password detection module 120, authorizes monitoring module 130 and access authorization to use control module 140.
Wherein, default access mandate judge module 110 is used for judging whether portable terminal is provided with default access when receiving the external reference request, if portable terminal does not arrange access authorization, and denied access then.
Login password detection module 120 is when default access mandate judge module 110 is judged portable terminal and is provided with default access, judge whether portable terminal is provided with login password, if portable terminal does not arrange login password, control module 140 direct granted access are used in access authorization, and this moment is the mandate time of limiting access not.Wherein, login password be the user arrange the access portable terminal time password that need to input, for example PIN code, separate the password of portable terminal screen locking.
Authorize monitoring module 130 when login password detection module 120 is judged portable terminal and is provided with login password, judge whether portable terminal is in login mode, when portable terminal is in non-login mode, prompting user need to be inputted login password, and whether the login password of judging user's input is correct, judges when the login password of input is correct that portable terminal is in login mode.Login mode refers to the normal mode of operation that portable terminal is in screen-unblocking.
Access authorization uses control module 140 to be used for authorizing and accessing portable terminal in access rights in the time when portable terminal is in login mode.Access authorization uses control module 140 can also judge whether the access authorization time expire, and when the access authorization time expires, stops access authorization.In the present embodiment, the access authorization time is default value, and is pre-stored in portable terminal.For example, the access authorization time of acquiescence is 2 hours, access authorization was used control module 140 to authorize and accessed portable terminal in 2 hour, during this period of time, other-end for example computer or other portable terminals can connect by wired or wireless mode and this portable terminal, obtains the file in its storage card.
Fig. 2 is the system block diagram that the secure access of portable terminal of the present invention realizes 100 second embodiment of system, as shown in Figure 2, in the present embodiment, system 100 comprises that also external reference monitoring module 150, access time arrange module 160 and access time modified module 170.
Wherein, external reference monitoring module 150 is used for the request of monitoring external reference.
Access time arranges module 160 and is used for arranging and revising the access rights time of giving tacit consent to.
Access time modified module 170, the access authorization time that is used for revising single reference.
In the present embodiment, when portable terminal is in login mode, whether access time modified module 170 prompting users revise the access authorization time of this access, be the access authorization time that then receives this access of user input, access authorization is used control module 140 to authorize in the access rights of new input and is finished this visit to portable terminal in the time; If the user does not revise the access authorization time, access authorization is used control module 140 to authorize in the access rights of acquiescence and is finished this visit to portable terminal in the time.
Fig. 3 is the workflow diagram that the secure access of portable terminal of the present invention realizes 100 second embodiment of system, as shown in Figure 3, system 100 starts with portable terminal, external reference monitoring module 150 monitoring external reference requests after starting, when user's (computer or other portable terminals) by wired mode (for example by the mobile terminal USB interface) or wireless mode (for example WIFI) when accessing this portable terminal, external reference monitoring module 150 receives the external reference request; Afterwards, default access mandate judge module 110 judges whether portable terminal is provided with default access, if portable terminal does not arrange default access, for example choose the USB connectivity option, then denied access (access request that receives is to be connected with this portable terminal by USB interface); When portable terminal was provided with default access, login password detection module 120 judged whether described portable terminal is provided with login password, if login password is not set, control module 140 direct granted access are used in access authorization; If be provided with login password, authorize monitoring module 130 to judge whether portable terminal is in login mode, when portable terminal is in non-login mode, prompting user need to be inputted login password, and whether the login password of judging user's input is correct, judges when the login password of input is correct that portable terminal is in login mode; When portable terminal is in login mode, whether access time modified module 170 prompting users revise the access authorization time of this access, be the access authorization time that then receives this access of user input, access authorization is used control module 140 to authorize in the access rights of new input and is finished this visit to portable terminal in the time; If the user does not revise the access authorization time, access authorization is used control module 140 to authorize in the access rights of acquiescence and is finished this visit to portable terminal in the time; Access authorization uses control module 140 to judge whether the access authorization time expire, and prompting calling party authority is expired when the access authorization time expires, the termination access authorization.
In the present embodiment, all the other situations realize that with the secure access of portable terminal of the present invention 100 first embodiment of system are identical, do not repeat them here.
Fig. 4 is the flow chart of secure access implementation method first embodiment of portable terminal of the present invention, and as shown in Figure 4, in the present embodiment, method of the present invention may further comprise the steps:
A, default access mandate judge module 110 judge whether portable terminal is provided with default access when receiving the external reference request;
If B is provided with default access, login password detection module 120 judges whether portable terminal is provided with login password;
If C is provided with login password, authorize monitoring module 130 to judge whether portable terminal is in login mode;
If the D portable terminal is in login mode, access authorization is used control module 140 to authorize and is accessed portable terminal in access rights in the time.
In the present embodiment, step B may further comprise the steps: B1, login password detection module 120 judge whether portable terminal is provided with login password, are execution in step C1 then, otherwise execution in step B2; Control module 140 granted access portable terminals are used in B2, access authorization, and this moment is the mandate time of limiting access not.
Described step C may further comprise the steps: C1, authorizing monitoring module 130 to judge whether portable terminal is in login mode, is execution in step D1 then, otherwise execution in step C2; C2, mandate monitoring module 130 prompting input login passwords, and judge whether the login password of input is correct, when the login password of inputting is correct, execution in step D1.
Described step D may further comprise the steps: the access authorization time whether D1,170 promptings of access time modified module revise this access, it is the access authorization time that then receives this access of user's input, access authorization is used control module 140 to authorize in the access rights of input and is accessed portable terminal in the time, otherwise carries out D2; D2, access authorization use control module 140 to authorize the described portable terminal of access within the access authorization time of acquiescence; D3, access authorization use control module 140 to judge whether the access authorization time expire, and are then to stop access authorization.
Fig. 5 is the flow chart of secure access implementation method second embodiment of portable terminal of the present invention, and is as shown in Figure 5, in the present embodiment, further comprising the steps of before steps A:
F, set in advance the described access rights time;
E, the described external reference request of monitoring.
In the present embodiment, all the other situations are identical with secure access implementation method first embodiment of portable terminal of the present invention, do not repeat them here.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within the claim scope of the present invention.

Claims (10)

1. the secure access implementation method of a portable terminal is characterized in that, may further comprise the steps:
A, when receiving the external reference request, judge whether portable terminal is provided with default access;
If B is provided with default access, judge then whether described portable terminal is provided with login password;
If C is provided with login password, judge then whether described portable terminal is in login mode;
If the described portable terminal of D is in login mode, then authorizes in access rights and access described portable terminal in the time.
2. the secure access implementation method of portable terminal according to claim 1 is characterized in that, described method also comprises step:
E, the described external reference request of monitoring.
3. the secure access implementation method of portable terminal according to claim 1 is characterized in that, described method also comprises step:
F, set in advance the described access rights time.
4. the secure access implementation method of portable terminal according to claim 1 is characterized in that, described step B may further comprise the steps:
B1, judging whether described portable terminal is provided with login password, is execution in step C then, otherwise execution in step B2;
B2, the described portable terminal of granted access.
5. the secure access implementation method of portable terminal according to claim 1 is characterized in that, described step C may further comprise the steps:
C1, judging whether described portable terminal is in login mode, is execution in step D then, otherwise execution in step C2;
C2, prompting input login password, and judge whether the login password of input is correct, execution in step D when the login password of input is correct.
6. the secure access implementation method of portable terminal according to claim 1 is characterized in that, described step D may further comprise the steps:
The access authorization time whether D1, prompting revise this access, be that access authorization time and the mandate that then receives this access of user's input accessed described portable terminal in the access rights of input in the time, otherwise carry out D2;
D2, mandate be the described portable terminal of access within the access authorization time of acquiescence.
7. the secure access implementation method of portable terminal according to claim 6 is characterized in that, described step D also comprises step:
D3, judging whether the access authorization time expire, is then to stop access authorization.
8. the secure access of a portable terminal realizes system, it is characterized in that described system comprises:
Default access mandate judge module (110) is used for judging whether portable terminal is provided with default access when receiving the external reference request;
Login password detection module (120) is used for judging whether described portable terminal is provided with login password when being provided with default access;
Authorize monitoring module (130), be used for when being provided with login password, judging whether described portable terminal is in login mode; And
Control module (140) is used in access authorization, is used for authorizing and accessing described portable terminal in the time in access rights when described portable terminal is in login mode.
9. the secure access of portable terminal according to claim 8 realizes system, it is characterized in that described system also comprises:
External reference monitoring module (150) is used for monitoring described external reference request.
10. the secure access of portable terminal according to claim 8 realizes system, it is characterized in that described system also comprises:
Access time arranges module (160), is used for the access rights time that arranges and revise acquiescence;
Access time modified module (170), the access authorization time that is used for revising single reference.
CN201210451034.3A 2012-11-12 2012-11-12 A kind of secure access implementation method of mobile terminal and system Expired - Fee Related CN102970681B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210451034.3A CN102970681B (en) 2012-11-12 2012-11-12 A kind of secure access implementation method of mobile terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210451034.3A CN102970681B (en) 2012-11-12 2012-11-12 A kind of secure access implementation method of mobile terminal and system

Publications (2)

Publication Number Publication Date
CN102970681A true CN102970681A (en) 2013-03-13
CN102970681B CN102970681B (en) 2015-12-16

Family

ID=47800480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210451034.3A Expired - Fee Related CN102970681B (en) 2012-11-12 2012-11-12 A kind of secure access implementation method of mobile terminal and system

Country Status (1)

Country Link
CN (1) CN102970681B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310148A (en) * 2013-05-23 2013-09-18 上海斐讯数据通信技术有限公司 Login mode realization method and mobile terminal
CN103488936A (en) * 2013-09-03 2014-01-01 福建伊时代信息科技股份有限公司 Mobile terminal and mobile terminal security code validation method and device
CN103927474A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for monitoring application programs
WO2015143786A1 (en) * 2014-03-28 2015-10-01 中兴通讯股份有限公司 Message transmission method and node device based on network selection and temporal arrangement
CN106843693A (en) * 2017-02-13 2017-06-13 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN111597544A (en) * 2020-05-18 2020-08-28 贵州电网有限责任公司 Intermediary physical isolation method and system applied to USB interface

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1786864A (en) * 2004-12-10 2006-06-14 上海迪比特实业有限公司 Method for safety identification of computer
CN101123769A (en) * 2007-08-02 2008-02-13 深圳市杰特电信控股有限公司 A method for editing mobile phone information using computer
CN102331976A (en) * 2011-09-13 2012-01-25 珠海市魅族科技有限公司 Control method for USB (universal serial bus) memory function of terminal and terminal
US20120129496A1 (en) * 2010-11-23 2012-05-24 Jonghoon Park Content control apparatus and method thereof
CN102542189A (en) * 2010-12-31 2012-07-04 联想(北京)有限公司 Authentication method, device and electronic equipment
CN103313238A (en) * 2013-06-20 2013-09-18 天翼电信终端有限公司 Safety system and safety protection method for mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1786864A (en) * 2004-12-10 2006-06-14 上海迪比特实业有限公司 Method for safety identification of computer
CN101123769A (en) * 2007-08-02 2008-02-13 深圳市杰特电信控股有限公司 A method for editing mobile phone information using computer
US20120129496A1 (en) * 2010-11-23 2012-05-24 Jonghoon Park Content control apparatus and method thereof
CN102542189A (en) * 2010-12-31 2012-07-04 联想(北京)有限公司 Authentication method, device and electronic equipment
CN102331976A (en) * 2011-09-13 2012-01-25 珠海市魅族科技有限公司 Control method for USB (universal serial bus) memory function of terminal and terminal
CN103313238A (en) * 2013-06-20 2013-09-18 天翼电信终端有限公司 Safety system and safety protection method for mobile terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310148A (en) * 2013-05-23 2013-09-18 上海斐讯数据通信技术有限公司 Login mode realization method and mobile terminal
CN103310148B (en) * 2013-05-23 2015-12-23 上海斐讯数据通信技术有限公司 A kind of implementation method of login mode and mobile terminal
CN103488936A (en) * 2013-09-03 2014-01-01 福建伊时代信息科技股份有限公司 Mobile terminal and mobile terminal security code validation method and device
WO2015143786A1 (en) * 2014-03-28 2015-10-01 中兴通讯股份有限公司 Message transmission method and node device based on network selection and temporal arrangement
CN103927474A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for monitoring application programs
CN106843693A (en) * 2017-02-13 2017-06-13 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN111597544A (en) * 2020-05-18 2020-08-28 贵州电网有限责任公司 Intermediary physical isolation method and system applied to USB interface
CN111597544B (en) * 2020-05-18 2024-05-14 贵州电网有限责任公司 Intermediate physical isolation method and system applied to USB interface

Also Published As

Publication number Publication date
CN102970681B (en) 2015-12-16

Similar Documents

Publication Publication Date Title
CN105681328B (en) The method, apparatus and electronic equipment of controlling electronic devices
CN102970681B (en) A kind of secure access implementation method of mobile terminal and system
CN106031087B (en) Method and apparatus for Authentication Client voucher
KR20190028824A (en) Methods and apparatus for user authentication and human intent verification in mobile devices
CN103813334A (en) Right control method and right control device
CN103152329B (en) Bluetooth is utilized to carry out identity authentication method and system
US20150026790A1 (en) Method for Computer Access Control by Means of Mobile End Device
CN104156657A (en) Information input method and information input device of terminal and terminal
CN102413220B (en) Method for controlling right of using connection function and mobile terminal
CN106204003B (en) Method, device and system for safely transferring virtual resources
CN103283268A (en) Wireless terminal and method for managing connection of network using same
CN103955203A (en) Method and system for authority management of elevator controller debugging system
CN105790962A (en) Conference document obtaining method, apparatus, and system
EP3306969B1 (en) Terminal authentication method and device
CN107223328A (en) A kind of method and system of Root authority management and control
CN104580191A (en) Offline control method and system for smart home
CN107710673B (en) User identity authentication method and device
KR101355972B1 (en) Method and a device to suspend the access to a service
CN114244568A (en) Security access control method, device and equipment based on terminal access behavior
CN105871840B (en) A kind of certificate management method and system
CN103678972A (en) System and method for limits of authority
CN108133142A (en) A kind of mobile device remote connection and the method for manipulation PC machine
KR101502999B1 (en) Authentication system and method using one time password
CN106375304A (en) One-time authentication method realized by utilization of intelligent hardware
CN108038367B (en) Method and system for controlling authority management of user equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151216