CN103345596A - Software management system - Google Patents

Software management system Download PDF

Info

Publication number
CN103345596A
CN103345596A CN2013102922945A CN201310292294A CN103345596A CN 103345596 A CN103345596 A CN 103345596A CN 2013102922945 A CN2013102922945 A CN 2013102922945A CN 201310292294 A CN201310292294 A CN 201310292294A CN 103345596 A CN103345596 A CN 103345596A
Authority
CN
China
Prior art keywords
input
security code
key
module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102922945A
Other languages
Chinese (zh)
Other versions
CN103345596B (en
Inventor
刘云峰
惠晓辉
王俊
陆骏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Song Yixiao
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201310292294.5A priority Critical patent/CN103345596B/en
Publication of CN103345596A publication Critical patent/CN103345596A/en
Application granted granted Critical
Publication of CN103345596B publication Critical patent/CN103345596B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a software management system, and belongs to the management system. The software management system comprises a display module, an input module, an encryption setting module, an unlocking module and a storage module. The display module defines a display interface which is displayed on the display device, the input module receives security code input and secret key input of a user, the encryption setting module sets encrypted passwords for reserved software according to security code encryption input and secret key encryption input, according to security code decoding input and secret key decoding input, the unlocking module calculates decoding passwords of the user according to reserved rules and compares the encrypted passwords for the reserved software, the storage module stores the encrypted passwords for the reserved software, a pointing device is arranged on a display device of a mobile terminal, the input module acquires input operation of the user on the display interface of the mobile terminal through the pointing device, the input module is connected with the encryption setting module, the unlocking module and the display module respectively, and the encryption setting module is connected with the storage module. The software management system has the advantages of effectively improving security and privacy of the mobile terminal device.

Description

A kind of software management system
Technical field
The present invention relates to a kind of management system, especially design a kind of software management system.
Background technology
Popularizing fast to people's work and life of smart mobile phone provides a great convenience.By being installed on the various application programs on the smart mobile phone, can realize diversified function.Simultaneously, also just because of the increasing effect of smart mobile phone, the security and the privacy that how effectively to improve smart mobile phone become the problem that smart mobile phone just becomes a needs consideration.
Carry out screen locking and release at mobile phone on the intelligent mobile phone terminal now, or the mode handled of other data encryptions is that form by array arranges mostly.As patent application document (CN102880398A), a kind of mobile phone unlock method and mobile phone based on the random digit array disclosed, method comprises step: receive user's operational order and light mobile phone screen, generate the release interface of a random digit array automatically, enter the release interface; Release interface by the random digit array receives and identifies the unlocking pin that the user imports, and when the unlocking pin of user's input mates with the unlocking pin of presetting, controls the mobile phone removing screen locking.When removing mobile phone screen locking by this technical scheme, because the release digital array during each release has nothing in common with each other, can avoid by user's release gesture motion or be retained in the problem that unlocking pin that the touch vestige on the mobile phone screen causes leaks.The above-mentioned method that mobile phone is encrypted or deciphers, shortcoming is that the robustness of password is not enough, is difficult to effectively realize the relevant important procedure on the smart mobile phone or the security protection of significant data.Need a kind of novelty at the smart mobile phone related subject and authentication management system safely and effectively.
Summary of the invention
At above-described technical matters, the invention discloses a kind of software management system, to improve security and the privacy of smart mobile phone.
Concrete technical scheme is as follows:
A kind of software management system is used for the encryption and decryption to each predetermined software on the portable terminal, and described portable terminal comprises display device, wherein, comprising:
Display module, described display module definition one display interface that is shown on the described display device;
Load module receives user's security code input and key input;
Encryption arranges module, encrypts input and secret key encryption input according to the security code that is received by described load module and according to pre-defined rule Crypted password to each predetermined software is set;
Separate lock module, import the clear crytpographic key that calculates the user according to pre-defined rule according to security code deciphering input and secret key decryption that described load module receives, compare the Crypted password of described predetermined software;
Memory module, the Crypted password to each predetermined software that storage is drawn through pre-defined rule by described security code and described encryption key;
The display device of described portable terminal is provided with pointing device, and described load module obtains the input operation of user on described portable terminal display interface by described pointing device;
Described load module arranges module, described solution lock module, described display module with described encryption respectively and is connected; Described encryption arranges module and is connected with described memory module.
Preferably, described pre-defined rule is correspondingly provided with many according to the number of described key.
Preferably, when described key number was one, described pre-defined rule was:
Ss=F(y)[S1&S6]+F(y-1)[S2&S3]+F(y+1)[S4&S5];
Described Ss is password value; Described S1 is first security code of input; Described S2 is second security code of input; Described S3 is the 3rd security code of input; Described S4 is the 4th security code of input; Described S5 is the 5th security code of input; Described S6 is the 6th security code of input; Described y is key value; Described F is predefined function.
Preferably, when described key number was two, described pre-defined rule was:
Ss=F(y1)[S1&S6]+F(y2)[S2&S3]+F(y3)[S4&S5];
Described Ss is password value; Described S1 is first security code of input; Described S2 is second security code of input; Described S3 is the 3rd security code of input; Described S4 is the 4th security code of input; Described S5 is the 5th security code of input; Described S6 is the 6th security code of input; Described y1 is first key value; Described y2 is second key value; Described y3 is the 3rd key value; Described F is predefined function.
Preferably, when described key number was three, described pre-defined rule was:
Ss=F(y1)[S1]+F(y2)[S2]+F(y3)[S3]+F(y4)[S4]+F(y5)[S5]+F(y6)[S6];
Described Ss is password value; Described S1 is first security code of input; Described S2 is second security code of input; Described S3 is the 3rd security code of input; Described S4 is the 4th security code of input; Described S5 is the 5th security code of input; Described S6 is the 6th security code of input; Described y1 is first key value; Described y2 is second key value; Described y3 is the 3rd key value; Described y4 is the 4th key value; Described y5 is the 5th key value; Described y6 is the 6th key value; Described F is predefined function.
Preferably, store in the described memory module imaged in advance; Described load module comprises: call unit, and input arranges unit, Input Control Element and input validation unit; Described input arranges the unit and defines security code input operation zone or the key input operation zone that described display interface is, and by described call unit with described pre-imaged described security code input operation zone and the described key input operation zone of being arranged at respectively; Described pointing device comprises: is used for judging user's input operation operating area positional information of living in and described positional information sent to the locating device of described Input Control Element, and the track judgment means that is used for judging the action type of user's input operation and described action type is sent to described Input Control Element; Described Input Control Element is according to positional information and the action type of user's input operation, calls described imagedly in advance by described call unit, and imports demonstration accordingly; Described input validation unit shows according to the described input on the described display interface, determines user's final input.
Preferably, described input arranges the unit and is provided with a plurality of separate security code input operation zones in described display interface, is respectively applied to import security code.
Preferably, described input arranges the unit and is provided with a plurality of being mutually related for the key input operation zone of input key in described display interface;
When described Input Control Element carries out input operation in the user in predetermined cipher key operation zone, call imaged in advance in the described memory module by call unit, change the demonstration in the cipher key operation zone corresponding with described specific key operating area.
Preferably, described Input Control Element is at the direction of operating of user when slide is carried out in the corresponding operating position on described display interface, determine ascending order roll display or the descending roll display of described security code, or the ascending order roll display of described key or descending roll display.
Preferably, described Input Control Element when clicking operation is carried out in the corresponding operating position on described display interface, stops the roll display of described security code or key the user.
The invention has the beneficial effects as follows:
By a kind of software management system of the present invention, improved security and the privacy of mobile terminal device effectively.Number difference according to key is set can arrange different cryptographic levels, has realized the stratification management to the different pieces of information cryptographic object.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the system architecture synoptic diagram of the embodiment of a kind of software management system of the present invention;
Fig. 2 is the inputting interface synoptic diagram of the embodiment of a kind of software management system of the present invention;
Fig. 3 arranges option for the encryption of the embodiment of a kind of software management system of the present invention.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as restriction of the present invention.
A kind of embodiment of the present invention discloses a kind of software management system, is used for the encryption and decryption to the song predetermined software on the portable terminal.Portable terminal comprises display device.As shown in Figure 1, above-mentioned software management system comprises display module, and load module is encrypted module is set, and separates lock module and memory module.Wherein, load module arranges module, security code with security code respectively and module is set, criticizes module and be connected.Encryption arranges module and is connected with memory module.Also comprise in the load module: call unit, input arranges unit, Input Control Element and input validation unit.
Specifically, above-mentioned display module is used for importing by this display interface for the user at display device definition one display interface; Load module be used for to receive security code input and the key input of user under varying environment, is included in to encrypt when arranging and security code input and password during release are imported; Encryption arranges module and encrypts input and secret key encryption input according to the security code that is received by load module and according to pre-defined rule Crypted password to each predetermined software is set; Separate lock module and import the clear crytpographic key that calculates the user according to pre-defined rule according to security code deciphering input and secret key decryption that load module receives, the Crypted password of comparison predetermined software; The Crypted password to each predetermined software that the memory module storage is drawn through pre-defined rule by security code and encryption key.The display device of portable terminal is provided with pointing device, and load module obtains the input operation of user on the portable terminal display interface by pointing device, and then carries out subsequent operation.
On the basis of technique scheme, load module comprises: call unit, input arranges unit, Input Control Element and input validation unit.Wherein, input arranges security code input operation zone or the key input operation zone that unit definition display interface is, and will pre-imaged security code input operation zone and the key input operation zone of being arranged at respectively by call unit.As shown in Figure 2, display interface is divided into 10 corresponding operating areas, and operating area 1 to operating area 6 is set to security code input operation zone, and operating area 7 to 9 is set to key input operation zone.Store above-mentioned imaged in advance in the memory module.In a kind of optional embodiment, can be the image of coded lock form corresponding to operating area 1 pre-imaged to the operating area 7, the image of each coded lock form comprises and triangular shapedly upwards or under the line stirs icon, numerical value to be shown, and the current numerical value of choosing up or down.And can be the image of ring gear form corresponding to the pre-imaged of operating area 8 and operating area 9, and this ring gear form image is dynamic image, namely the ring gear in operating area 8 and the operating area 9 can rotate.Preferably, the ring gear rotation direction in operating area 8 and the operating area 9 can be to be set to backward rotation.
In a kind of embodiment, above-mentioned security code input operation zone 1 to 6 is respectively applied to import single security code, and each security code input area is set to separate security code input operation zone.And above-mentioned key input area 7 to 9 then is transfused to the input operation zone that is set to be mutually related, unit is set, and when namely specific operating area was operated therein, the demonstration in can the corresponding change other operating area became with the control object.
Above-mentioned pointing device comprises for judging user's input operation operating area positional information of living in and positional information is sent to the locating device of Input Control Element, and the track judgment means that is used for judging the action type of user's input operation and action type is sent to Input Control Element.Thereby can realize different control and output effect according to user's different operating type.
Above-mentioned Input Control Element is according to positional information and the action type of user's input operation, calls imagedly in advance by call unit, and imports demonstration accordingly.For above-mentioned security code input operation zone 1 to 6, when user's operation is the slide of doing up or down in an operating area, then Input Control Element calls corresponding image by call unit, shows the image that accelerates ascending order or descending and shows.Wherein, if upwards slide, the numerical value ascending order, if to lower slider, numerical value descending then.Here, optional numerical range can be from 1 to 32.According to actual needs, also can set different optional numerical ranges.Operating area 7 is similar with operating area 1 to 6, and difference is that its direction of stirring is left and right directions, and the numerical value that shows is English alphabet a to z.The English alphabet a to z of its demonstration is corresponding numeral 1 to 26 respectively.
The image of operating area 8 and operating area 9 correspondences is the ring gear form image that dynamically shows, and both direction of rotation.When the user does counterclockwise according to the track of gear in operating area 8 or operating area 9 or during clockwise slide, Input Control Element obtains user's input operation by pointing device, and by the dynamic image that obtain corresponding rotation direction of call unit from memory module, be shown in operating area 8 or the operating area 9.Because operating area 7, operating area 8 and operating area 9 are related operating area, therefore, the demonstration in other two operating areas of the corresponding change of input operation meeting of user within operating area 8 or 9.For example, establish the rotation direction of operating area 8 annular wheels for turning clockwise, the rotation direction of operating area 9 annular wheels then for being rotated counterclockwise, can be sent mechanical snap sound when both rotate.If the user does counterclockwise slip in operating area 8, then Input Control Element can call corresponding image, the i.e. image that rotates counterclockwise corresponding to operating area 8 and the image that clockwise rotates corresponding to operating area 9, gear rotation direction in the refresh operation zone 8 is for rotating counterclockwise, and the gear rotation direction in the operating area 9 refreshes to clockwise rotating, simultaneously, according to the setting incidence relation between operating area 7 and operating area 8 and 9, the image in the operating area 7 is done descending or ascending order demonstration.In another kind of embodiment, also can the unit be set by input operating area 8 and operating area 9 are added the corresponding control class of sliding, like this, when the user carries out slide in operating area 8 and 9, also can realize making gear produce corresponding rotation, and change the effect that input is set.
The user can change current input by the slide in the operating area and set.Selected current input and work as the user, just can determine by other action type.In a kind of embodiment, Input Control Element when clicking operation is carried out in the corresponding operating position on display interface, stops the roll display of security code or key the user.So just show that the user has selected the numerical value that shows in the current operating area.At this moment, if when the user carries out slide again, operating area will carry out roll display again again.
Above-mentioned input validation unit shows according to the input on the display interface, determines user's final input.In a kind of embodiment, also comprise an operating area 10 in the above-mentioned display interface.As shown in Figure 2, when the user when password input setting is finished, can confirm by clicking operation zone 10.Operating area 10 can be shown as specific image when encryption arranges state, as the image of key, to inform the residing state that arranges of the current system of user.After this, the security code that the input validation unit can arrange the user and key send to encrypt module are set, and encrypting module arranges Crypted password by pre-defined rule for predetermined software, and then Crypted password is stored in the memory module.Similarly, when the user when release input is finished, can confirm by clicking operation zone 10.Operating area 10 can be shown as specific image when released state, as the image of lock.At this moment, the input validation unit can send to the solution lock module with unlocking pin and the key of user's input, separates lock module and calculates user's unlocking pin according to pre-defined rule, and contrast the Crypted password of predetermined software.When both mated, the demonstration image of operating area 10 as lock, can be changed to another kind of image, as encryption demonstration image under the state is set, and can be the image as above-mentioned key, and enter corresponding program interface or standby interface etc.And if both do not match, i.e. password mistake, then Input Control Element can call the respective image in the memory module, as can be "! " image, and eject corresponding image at operating area, inform user's input error.
In a kind of embodiment of the present invention, pre-defined rule is correspondingly provided with many according to the number of key.Operating area 1 to operating area 9 acquiescences all can be done scroll actions.As shown in Figure 2, the user clicks user's clicking operation zone 1 to operating area 6, namely activating this lock district arranges, coded lock as clicking operation zone 2, numerical value in the operating area 2 is 31 at this moment, the user upwards slide in operating area 2 districts 31 be rolled to 32 again since 1 the circulation, namely rolled by the 31-30-29-......-1 backward to lower slider at this operating area.The user clicks again and stops to roll, and the value in the operating area is selected security code at this moment.As Fig. 2, the password that the user arranges is that first security code is that 10, the second security codes are that 31, the three security codes are that 10, the four security codes are that 31, the four security codes are that 31, the five security codes, 10, the six security codes are 31.
The user of operating area 7 is set to y, and key value is y so.By using the low middle high third-class setting of dividing, password arranges grade and is defaulted as low in cryptographic levels.Can be by under in encryption state being set, operation to operating area 10, press in the operating area 10 with the schedule time as long, enter in the encryption setup menu of operating area 10 ejections, carry out the setting of cryptographic levels, the encryption of a kind of embodiment as shown in Figure 3 arranges option, selects corresponding cryptographic levels can carry out different cryptographic levels settings.
Low grade cryptosystem only uses a key, and its default rule is:
Ss=F (y) [S1﹠amp; S6]+F (y-1) [S2﹠amp; S3]+F (y+1) [S4﹠amp; S5], wherein F is predefined function.
Middle rank password and high grade cryptosystem can use a plurality of keys, so middle rank and senior password arrange step and rudimentary different.Arrange for intermediate password, the user will arrange a key value y1 after first security code and the 6th security code are set, this setting is determined in clicking operation zone 10, after second security code and the 3rd security code are set a key value y2 is set again, clicking operation zone 10 confirms, set up the 4th security code and the 5th security code after clicking operation zone 10 confirm to arrange.This moment, the password setting was finished, and operating area 10 intermediate passwords arrange activation, and user clicking operation zone 10 more namely determines to arrange this password.
The middle rank password uses three keys, and its default rule is:
Ss=F (y1) [S1﹠amp; S6]+F (y2) [S2﹠amp; S3]+F (y3) [S4﹠amp; S5], wherein F is predefined function.
For high grade cryptosystem, after the user whenever sets up a security code, a key need be set, to finish to 6 passwords and key setting, operating area 10 arranges activation, and is confirmed by the user, and this password namely is set.Be Ss=F (y1) [S1]+F (y2) [S2]+F (y3) [S3]+F (y4) [S4]+F (y5) [S5]+F (y6) [S6], wherein F is predefined function.
In the time of release, get final product according to the reverse release that password is set accordingly.
Portable terminal in the embodiment of the invention, also can be called mobile communication terminal, referring to the computer equipment with information processing capability that can use in movement, can be that notebook, panel computer, POS locomotive carry a kind of in the apparatus such as computer, especially can be a kind of smart mobile phone.
By a kind of software management system of the present invention, improved security and the privacy of mobile terminal device effectively.Number difference according to key is set can arrange different cryptographic levels, has realized the stratification management to the different pieces of information cryptographic object, is with a wide range of applications.
The above only is preferred embodiment of the present invention; be not so restriction embodiments of the present invention and protection domain; to those skilled in the art; should recognize that being equal to that all utilizations instructions of the present invention and diagramatic content done replace and the resulting scheme of apparent variation, all should be included in protection scope of the present invention.

Claims (10)

1. a software management system is used for the encryption and decryption to each predetermined software on the portable terminal, and described portable terminal comprises display device, it is characterized in that, comprising:
Display module, described display module definition one display interface that is shown on the described display device;
Load module receives user's security code input and key input;
Encryption arranges module, encrypts input and secret key encryption input according to the security code that is received by described load module and according to pre-defined rule Crypted password to each predetermined software is set;
Separate lock module, import the clear crytpographic key that calculates the user according to pre-defined rule according to security code deciphering input and secret key decryption that described load module receives, compare the Crypted password of described predetermined software;
Memory module, the Crypted password to each predetermined software that storage is drawn through pre-defined rule by described security code and described encryption key;
The display device of described portable terminal is provided with pointing device, and described load module obtains the input operation of user on described portable terminal display interface by described pointing device;
Described load module arranges module, described solution lock module, described display module with described encryption respectively and is connected; Module is set in described encryption and described solution lock module is connected with described memory module respectively.
2. software management system as claimed in claim 1 is characterized in that, described pre-defined rule is correspondingly provided with many according to the number of described key.
3. software management system as claimed in claim 2 is characterized in that, when described key number was one, described pre-defined rule was: Ss=F (y) [S1﹠amp; S6]+F (y-1) [S2﹠amp; S3]+F (y+1) [S4﹠amp; S5];
Described Ss is password value; Described S1 is first security code of input; Described S2 is second security code of input; Described S3 is the 3rd security code of input; Described S4 is the 4th security code of input; Described S5 is the 5th security code of input; Described S6 is the 6th security code of input; Described y is key value; Described F is predefined function.
4. software management system as claimed in claim 2 is characterized in that, when described key number was three, described pre-defined rule was: Ss=F (y1) [S1﹠amp; S6]+F (y2) [S2﹠amp; S3]+F (y3) [S4﹠amp; S5];
Described Ss is password value; Described S1 is first security code of input; Described S2 is second security code of input; Described S3 is the 3rd security code of input; Described S4 is the 4th security code of input; Described S5 is the 5th security code of input; Described S6 is the 6th security code of input; Described y1 is first key value; Described y2 is second key value; Described y3 is the 3rd key value; Described F is predefined function.
5. software management system as claimed in claim 2 is characterized in that, when described key number was six, described pre-defined rule was:
Ss=F(y1)[S1]+F(y2)[S2]+F(y3)[S3]+F(y4)[S4]+F(y5)[S5]+F(y6)[S6];
Described Ss is password value; Described S1 is first security code of input; Described S2 is second security code of input; Described S3 is the 3rd security code of input; Described S4 is the 4th security code of input; Described S5 is the 5th security code of input; Described S6 is the 6th security code of input; Described y1 is first key value; Described y2 is second key value; Described y3 is the 3rd key value; Described y4 is the 4th key value; Described y5 is the 5th key value; Described y6 is the 6th key value; Described F is predefined function.
6. software management system as claimed in claim 1 is characterized in that,
Store imaged in advance in the described memory module;
Described load module comprises: call unit, and input arranges unit, Input Control Element and input validation unit;
Described input arranges the unit and defines security code input operation zone or the key input operation zone that described display interface is, and by described call unit with described pre-imaged described security code input operation zone and the described key input operation zone of being arranged at respectively;
Described pointing device comprises: is used for judging user's input operation operating area positional information of living in and described positional information sent to the locating device of described Input Control Element, and the track judgment means that is used for judging the action type of user's input operation and described action type is sent to described Input Control Element;
Described Input Control Element is according to positional information and the action type of user's input operation, calls described imagedly in advance by described call unit, and imports demonstration accordingly;
Described input validation unit shows according to the described input on the described display interface, determines user's final input.
7. software management system as claimed in claim 6 is characterized in that, described input arranges the unit and is provided with a plurality of separate security code input operation zones in described display interface, is respectively applied to import security code.
8. software management system as claimed in claim 6 is characterized in that,
Described input arranges the unit and is provided with a plurality of being mutually related for the key input operation zone of input key in described display interface;
When described Input Control Element carries out input operation in the user in predetermined cipher key operation zone, call imaged in advance in the described memory module by call unit, change the demonstration in the cipher key operation zone corresponding with described specific key operating area.
9. as claim 7 or 8 described software management systems, it is characterized in that,
Described Input Control Element is determined ascending order roll display or the descending roll display of described security code at the direction of operating of user when slide is carried out in the corresponding operating position on described display interface, or the ascending order roll display of described key or descending roll display.
10. software management system as claimed in claim 9 is characterized in that,
Described Input Control Element when clicking operation is carried out in the corresponding operating position on described display interface, stops the roll display of described security code or key the user.
CN201310292294.5A 2013-07-11 2013-07-11 A kind of software management system Active CN103345596B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310292294.5A CN103345596B (en) 2013-07-11 2013-07-11 A kind of software management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310292294.5A CN103345596B (en) 2013-07-11 2013-07-11 A kind of software management system

Publications (2)

Publication Number Publication Date
CN103345596A true CN103345596A (en) 2013-10-09
CN103345596B CN103345596B (en) 2018-07-31

Family

ID=49280391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310292294.5A Active CN103345596B (en) 2013-07-11 2013-07-11 A kind of software management system

Country Status (1)

Country Link
CN (1) CN103345596B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660786A (en) * 2013-11-21 2015-05-27 上海斐讯数据通信技术有限公司 Mobile terminal, setting method of unlocking password and unlocking method
CN105335672A (en) * 2014-06-16 2016-02-17 华为技术有限公司 Security mode prompting method and apparatus
CN107016263A (en) * 2017-03-27 2017-08-04 谭宁敏 The privacy management system of mobile terminal communication software and social software
CN110034931A (en) * 2015-03-06 2019-07-19 苹果公司 Message is transmitted using intermittently available encrypted credentials

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980131A (en) * 2010-10-29 2011-02-23 东莞宇龙通信科技有限公司 Unlocking method, system and communication terminal
CN102842007A (en) * 2012-07-16 2012-12-26 腾讯科技(深圳)有限公司 Access control method and system of mobile terminal application program
CN102880398A (en) * 2012-09-24 2013-01-16 惠州Tcl移动通信有限公司 Mobile phone unlocking method based on random digital arrays and mobile phone
CN102890614A (en) * 2012-09-20 2013-01-23 清华大学 Random screen unlocking system and method of mobile terminal equipment
CN103092484A (en) * 2013-02-06 2013-05-08 北京小米科技有限责任公司 Method and device and terminal for unlocking screen

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980131A (en) * 2010-10-29 2011-02-23 东莞宇龙通信科技有限公司 Unlocking method, system and communication terminal
CN102842007A (en) * 2012-07-16 2012-12-26 腾讯科技(深圳)有限公司 Access control method and system of mobile terminal application program
CN102890614A (en) * 2012-09-20 2013-01-23 清华大学 Random screen unlocking system and method of mobile terminal equipment
CN102880398A (en) * 2012-09-24 2013-01-16 惠州Tcl移动通信有限公司 Mobile phone unlocking method based on random digital arrays and mobile phone
CN103092484A (en) * 2013-02-06 2013-05-08 北京小米科技有限责任公司 Method and device and terminal for unlocking screen

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赖溪松等: "《计算机密码学及其应用》", 31 July 2001 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660786A (en) * 2013-11-21 2015-05-27 上海斐讯数据通信技术有限公司 Mobile terminal, setting method of unlocking password and unlocking method
CN104660786B (en) * 2013-11-21 2018-04-06 上海斐讯数据通信技术有限公司 The method to set up and unlocking method of a kind of mobile terminal, unlocking pin
CN105335672A (en) * 2014-06-16 2016-02-17 华为技术有限公司 Security mode prompting method and apparatus
CN110034931A (en) * 2015-03-06 2019-07-19 苹果公司 Message is transmitted using intermittently available encrypted credentials
US10616759B2 (en) 2015-03-06 2020-04-07 Apple Inc. Communicating messages with intermittently available encryption credentials
CN110034931B (en) * 2015-03-06 2020-11-17 苹果公司 Apparatus, method and medium for communication
CN107016263A (en) * 2017-03-27 2017-08-04 谭宁敏 The privacy management system of mobile terminal communication software and social software

Also Published As

Publication number Publication date
CN103345596B (en) 2018-07-31

Similar Documents

Publication Publication Date Title
US9613356B2 (en) Secure passcode entry user interface
US9558491B2 (en) Scrambling passcode entry interface
KR101228088B1 (en) System and method for inputing password
CN102880398A (en) Mobile phone unlocking method based on random digital arrays and mobile phone
JP2009503656A (en) Memory lock system
CN102804195A (en) Graphical authentication
CN101930511A (en) Password protection method
CN103488940A (en) Password protection system and method for application programs of intelligent equipment
CN103092484A (en) Method and device and terminal for unlocking screen
CN103345596A (en) Software management system
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN103220148A (en) Method and system for electronic signature token to respond operation request, and electronic signature token
CN104657655A (en) Unlocking method of mobile terminal and mobile terminal
CN103310146A (en) Picture password protection method and terminal
CN101877195A (en) Password protection method
CN104571894A (en) Touch screen unlocking method and device
KR102230003B1 (en) Method and Device for Unlocking Input using the Combination of Number and Pattern Image at Smartphone
CN104915583A (en) Interface decryption processing method and mobile terminal
CN101859504B (en) Electronic device and password protection method thereof
CN104966017B (en) A kind of Password Input protects system and method
Bianchi et al. Open sesame: Design guidelines for invisible passwords
CN103002117A (en) Phone information encryption method and phone information encryption system
CN108256301A (en) A kind of unlocking method and tripper
CN105160277A (en) Mobile terminal encrypting and decrypting method and mobile terminal
CN104504306A (en) Method and equipment both for encrypting files

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201118

Address after: 221700 4-1-110-shop, Nanyuan new town, Fengxian County, Xuzhou City, Jiangsu Province

Patentee after: Song Yixiao

Address before: 201616 Shanghai city Songjiang District Guangfulin road 4855 Lane 20, No. 90

Patentee before: Phicomm (Shanghai) Co.,Ltd.