CN103646217A - Method and device for protecting security of data in terminal and terminal - Google Patents

Method and device for protecting security of data in terminal and terminal Download PDF

Info

Publication number
CN103646217A
CN103646217A CN201310613282.8A CN201310613282A CN103646217A CN 103646217 A CN103646217 A CN 103646217A CN 201310613282 A CN201310613282 A CN 201310613282A CN 103646217 A CN103646217 A CN 103646217A
Authority
CN
China
Prior art keywords
authentication information
terminal
subset
sign
indication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310613282.8A
Other languages
Chinese (zh)
Inventor
谭礼雨
赵福利
陶柳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201310613282.8A priority Critical patent/CN103646217A/en
Publication of CN103646217A publication Critical patent/CN103646217A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

An embodiment of the invention discloses a method and device for protecting security of data in a terminal and the terminal and relates to the technical field of mobile terminals. The method comprises the steps of enabling the terminal to receive operation instructions of users; after receiving the operation instructions, enabling the terminal to send first authentication information to a sub-device, and enabling the first authentication information to correspond to content information indicated by operation; when the first authentication information is matched with second authentication information generated by the sub-device, enabling the terminal to receive success identification sent by the sub-device, and executing operation instructions according to the success identification; when the first authentication information is not matched with the second authentication information generated by the sub-device or is matched with no second authentication information, enabling the terminal to receive failure identification sent by the sub-device, and rejecting to execute the operation instructions according to the failure identification. The method and the device are suitable for the mobile terminal.

Description

Method, device and the terminal of protection data safety in terminal
Technical field
The present invention relates to technical field of mobile terminals, particularly a kind of method, device and terminal of protecting data safety in terminal.
Background technology
Along with the development of mobile terminal technology, occurred in the market some can with the matching used utility appliance of mobile terminal.Utility appliance often has less volume and simple function button, and can connect by wired or wireless mode and mobile terminal.After mobile terminal and utility appliance connect, user can be realized and be carried out the operation of specific function to mobile terminal by the function button in utility appliance, for user facilitates.Bluetooth earphone for example, when user drives or when other are inconvenient to pick up terminal, user can use bluetooth earphone to realize and receive calls, and adjusts the operations such as volume.
In prior art, at least there are the following problems: mobile terminal has become a pith in people's Working Life, and people tend to some important private datas to be stored in wherein.Current utility appliance can only be on terminal practical function auxiliary, but cannot provide safeguard to the data security in terminal.
Summary of the invention
A kind of method, device and terminal of protecting data safety in terminal is provided, can solves the problem that utility appliance cannot ensure secure user data in mobile terminal.
First aspect, provides a kind of method of protecting data safety in terminal, comprising:
Terminal receives user's operation indication;
After receiving described operation indication, described terminal sends the first authentication information to described subset, and described the first authentication information is corresponding with the content information of described operation indication;
When described the first authentication information mates with the second authentication information of described subset generation, described terminal receives the successful sign that described subset sends, and according to described successfully sign, carries out described operation indication;
When described the first authentication information does not mate or does not match described the second authentication information with the second authentication information of described subset generation, described terminal receives the failed sign that described subset sends, and according to described unsuccessfully sign refusal, carries out described operation indication.
Second aspect, provides a kind of method of protecting data safety in terminal, comprising:
The first authentication information that subset receiving terminal sends, the content information of the operation indication that described the first authentication information receives with described terminal is corresponding;
Described subset is indicated and is generated the second authentication information according to described user;
Described subset judges whether described the first authentication information and described the second authentication information mate;
When described the first authentication information and described the second authentication information coupling, described subset sends successfully sign to described terminal;
When described the first authentication information and described the second authentication information do not mate, described subset sends unsuccessfully sign to described terminal.
The third aspect, provides a kind of terminal, comprising:
Receiving element, for receiving user's operation indication;
Transmitting element, for receive described operation indication at described receiving element after, sends the first authentication information to described subset, and described the first authentication information is corresponding with the content information of described operation indication;
The first performance element, while mating for the second authentication information generating with described subset when described the first authentication information, receives the successful sign that described subset sends, and according to described successfully sign, carries out described operation indication;
The second performance element, when not mating or not matching described the second authentication information for the second authentication information generating with described subset when described the first authentication information, receive the failed sign that described subset sends, according to described unsuccessfully sign refusal, carry out described operation indication.
Fourth aspect, provides a kind of device of protecting data safety in terminal, comprising:
Receiving element, the first authentication information sending for receiving terminal, the content information of the operation indication that described the first authentication information receives with described terminal is corresponding;
Generation unit, generates the second authentication information for indicating according to described user;
Judging unit, for judging whether described the first authentication information and described the second authentication information mate;
Transmitting element, for when described the first authentication information and described second authentication information when coupling, sends successfully and identifies to described terminal; And for when described the first authentication information and described the second authentication information do not mate, to described terminal, send unsuccessfully sign.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
The method flow diagram that Fig. 1 provides for one embodiment of the invention;
The method flow diagram that Fig. 2 provides for further embodiment of this invention;
The method flow diagram that Fig. 3 provides for further embodiment of this invention;
The method flow diagram that Fig. 4 provides for further embodiment of this invention;
The terminal structure schematic diagram that Fig. 5, Fig. 6 provide for further embodiment of this invention;
The apparatus structure schematic diagram that Fig. 7 provides for further embodiment of this invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making all other embodiment that obtain under creative work prerequisite, belong to the scope of protection of the invention.
For making the advantage of technical solution of the present invention clearer, below in conjunction with drawings and Examples, the present invention is elaborated.
One embodiment of the invention provides a kind of method of protecting data safety in terminal, is applied to terminal, and this terminal can be set up and communicate by letter with the subset of coupling, and as shown in Figure 1, described method comprises:
101, terminal receives user's operation indication.
102, after receiving operation indication, terminal sends the first authentication information to subset.
Wherein, described the first authentication information is corresponding with the content information of described operation indication.
Optionally, described operation indication comprising start indication; Before described terminal sends the first authentication information to described subset, described method also comprises: described terminal enters power-up state according to described start indication;
When the second authentication information 103, generating with subset when the first authentication information mates, terminal receives the successful sign that subset sends, according to successfully identifying executable operations indication.
When the second authentication information 104, generating with subset when the first authentication information does not mate or do not match the second authentication information, terminal receives the failed sign that subset sends, according to unsuccessfully sign refusal executable operations indication.
Optionally, after terminal enters power-up state according to described start indication, when described terminal receives the successful sign of described subset transmission, carry out start; When described terminal receives the failed sign of described subset transmission, carry out shutdown.
Optionally, described terminal can receive the request establishing a communications link sending from subset when Idle state, establishes a communications link with subset; After terminal and subset establish a communications link, receive the successful sign that subset sends, according to successful sign, carry out accordingly and operate.For example, start, release, data access etc.
Wherein, described operation indication is corresponding one by one with described the first authentication information, and described operation indication is corresponding one by one with the successful sign that subset sends.
Optionally, described the first authentication information can corresponding a plurality of operations indications.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind of method of protecting data safety in terminal, is applied to subset, and this subset can be set up and communicate by letter with the terminal of coupling, and as shown in Figure 2, described method comprises:
201, the first authentication information that subset receiving terminal sends.
The content information of the operation indication that wherein, the first authentication information receives with terminal is corresponding.
202, subset is indicated and is generated the second authentication information according to user.
203, subset judges whether the first authentication information and the second authentication information mate.
204, when the first authentication information and the second authentication information coupling, subset sends successfully sign to terminal.
205,, when the first authentication information and the second authentication information do not mate, subset sends unsuccessfully sign to terminal.
Optionally, if described subset does not generate the second authentication information, described subset directly sends unsuccessfully sign to described terminal.
Optionally, user can initiatively indicate to terminal transmit operation by subset, and terminal is controlled.Comprise: subset receives after user's indication, establishes a communications link with terminal; To terminal, send and indicate corresponding successful sign with user.For example, on subset, there is the function key of setting, the operations such as corresponding start, release; User has assigned user's indication to subset after pressing function key, and subset initiatively establishes a communications link with terminal, to terminal, sends the successful sign corresponding with function key; Terminal is carried out operation accordingly after receiving and successfully identifying.
Wherein, described user's indication is corresponding one by one with described the second authentication information.
Optionally, described the second authentication information can corresponding a plurality of users' indications.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind of method of protecting data safety in terminal; be applied to mobile terminal and subset; wherein; terminal is indicated first and is set up and communicate by letter with the subset of coupling according to user, after setting up communication, and the mutual authentication information of terminal and subset; according to interaction results, realize the security control of subset to terminal; the start process of terminal of take is example, and as shown in Figure 3, described method comprises:
301, user presses the key in terminal.
Wherein, user presses after key, and terminal can not started shooting immediately, but in power-up state, through follow-up judgement, carries out start or shutdown process.
302, terminal detects the function of whether opening start authentication according to user's indication, if opened the function execution step 303 of start authentication; If do not open the function of start authentication, execution step 311.
Wherein, whether user can open the function of authentication in the middle selection of arranging of terminal, if user has opened authentication functions, needs with subset alternately, could start shooting after completing authentication; If do not open authentication functions, terminal normal boot-strap.
303, terminal sends communication request to subset, carried terminal sign in communication request.
Wherein, terminal before mutual with subset, need to first be set up a communication connection.For fear of establishing a communications link with incoherent subset, in communication request, carry unique terminal iidentification, only have the subset mating with terminal iidentification to establish a communications link with terminal, improve the security of terminal.
304, subset judges whether the terminal iidentification in communication request mates with subset, if coupling, execution step 305; If do not mated, execution step 312.
305, subset is to the terminal message of returning to that the match is successful.
306, after the terminal message that receives that the match is successful, set up communication connection with subset.
For example, terminal can be passed through bluetooth, infrared or WIFI(Wireless Fidelity, Wireless Fidelity) etc. near radio link and subset establish a communications link, also can establish a communications link by wired mode.
307, terminal sends authentication information to subset.
Wherein, the operational order that authentication information is assigned to terminal to user in step 301 is relevant, and each operational order has its authentication information one to one.By multi-level authentication information is set, can more comprehensively protect the data security of terminal.For example, the operations such as start, release, visit data are arranged respectively to different authentication informations, and it is encrypted.
308, subset receives user's indication, according to user, generates corresponding authentication information.
For example, on subset, be provided with different function buttons, the operation of respective user to terminal respectively, such as start, release etc.User presses after corresponding button according to the operation in step 301, in subset, can generate corresponding authentication information, in order to the authentication information sending over terminal, mates.
It should be noted that, if now there is people privately to employ user's terminal, want to carry out start operation, and now user does not press the button on subset, can not generate authentication information.
309, subset judges whether the authentication information self generating mates with the authentication information that terminal sends; If coupling, execution step 310; If do not mate execution step 312.
Wherein, two authentication informations can be that Default Value is good, also can according to self, need to carry out Function Extension by user, and the corresponding more authentication information of multiple operation type is set.
Optionally, if do not generate authentication information in subset, directly perform step 312.
Optionally, when whether two authentication informations of detection mate, the authentication information first terminal being sent is decrypted, then mates.
310, subset is to the terminal message that sends that the match is successful.
311, terminal normal boot-strap.
312, subset is to the terminal message that sends that it fails to match.
313, terminal closedown.
Optionally, user can initiatively indicate to terminal transmit operation by subset, and terminal is controlled.Comprise: subset receives after user's indication, establishes a communications link with terminal; To terminal, send and indicate corresponding successful sign with user.For example, on subset, there is the function key of setting, the operations such as corresponding start, release; User has assigned user's indication to subset after pressing function key, and subset initiatively establishes a communications link with terminal, to terminal, sends the successful sign corresponding with function key; Terminal is carried out operation accordingly after receiving and successfully identifying.
Optionally; in the function key of subset, can also comprise the function of data access, terminal is deposited into private data in default hidden folder, only has subset to send after corresponding indication to terminal; in terminal, just show this hidden folder, can effectively protect user's private data.
It should be noted that, the flow process of the present embodiment be take starting up of terminal as example is described, and for other flow processs, such as terminal unlocking etc., please refer to above-mentioned flow process, no longer repeats herein.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind of method of protecting data safety in terminal; be applied to mobile terminal and subset; wherein; terminal has been set up and has been communicated by letter with the subset of coupling; when user needs release terminal, the mutual authentication information of terminal and subset, realizes the security control of subset to terminal according to interaction results; as shown in Figure 4, described method comprises:
401, user assigns release indication to terminal.
Concrete, user issues release by modes such as release gesture, input unlocking pins to terminal and indicates.
402, terminal detects whether opened the function of release authentication according to user's release indication, if opened the function execution step 403 of release authentication; If do not open the function of release authentication, execution step 407.
Wherein, whether user can open the function of release authentication in the middle selection of arranging of terminal, if user has opened release authentication functions, needs with subset alternately, and completing after release authentication could release; If do not open release authentication functions, terminal normal release.
403, terminal sends authentication information to subset.
Wherein, the operational order that authentication information is assigned to terminal to user in step 401 is relevant, the corresponding one or more operational orders of each authentication information.By multi-level authentication information is set, can more comprehensively protect the data security of terminal.For example, the operations such as start, release, visit data are arranged respectively to different authentication informations, and it is encrypted.
404, subset receives user's indication, according to user, generates corresponding authentication information.
For example, on subset, be provided with different function buttons, the operation of respective user to terminal respectively, such as start, release etc.User presses after corresponding button according to the operation in step 401, in subset, can generate corresponding authentication information, in order to the authentication information sending over terminal, mates.
It should be noted that, if now there is people privately to employ user's terminal, want to carry out unlocking operation, and now user does not press the button on subset, can not generate authentication information.
405, subset judges whether the authentication information self generating mates with the authentication information that terminal sends; If coupling, execution step 406; If do not mate execution step 408.
Wherein, two authentication informations can be that Default Value is good, also can according to self, need to carry out Function Extension by user, and the corresponding more authentication information of multiple operation type is set.
Optionally, if do not generate authentication information in subset, perform step 408.
Optionally, when whether two authentication informations of detection mate, the authentication information first terminal being sent is decrypted, then mates.
406, subset is to the terminal message that sends that the match is successful.
407, terminal normal release.
408, subset is to the terminal message that sends that it fails to match.
409, terminal keeps lock-out state.
Optionally, user can initiatively indicate to terminal transmit operation by subset, and terminal is controlled.Comprise: subset receives after user's indication, establishes a communications link with terminal; To terminal, send and indicate corresponding successful sign with user.For example, on subset, there is the function key of setting, the operations such as corresponding start, release; User has assigned user's indication to subset after pressing function key, and subset initiatively establishes a communications link with terminal, to terminal, sends the successful sign corresponding with function key; Terminal is carried out operation accordingly after receiving and successfully identifying.
Optionally; in the function key of subset, can also comprise the function of data access, terminal is deposited into private data in default hidden folder, only has subset to send after corresponding indication to terminal; in terminal, just show this hidden folder, can effectively protect user's private data.
It should be noted that, the flow process of the present embodiment be take terminal unlocking as example is described, and for other user's operations, please refer to above-mentioned flow process, no longer repeats herein.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind of terminal 50, and as shown in Figure 5, described terminal 50 comprises:
Receiving element 51, for receiving user's operation indication;
Transmitting element 52, for receive described operation indication at described receiving element 51 after, sends the first authentication information to described subset, and described the first authentication information is corresponding with the content information of described operation indication;
The first performance element 53, when the second authentication information generating with described subset for described the first authentication information when sending mates, receives the successful sign that described subset sends, and according to described successfully sign, carries out described operation indication;
The second performance element 54, when the second authentication information generating with described subset for described the first authentication information when sending does not mate or does not match described the second authentication information, receive the failed sign that described subset sends, according to described unsuccessfully sign refusal, carry out described operation indication.
Wherein, described operation indication comprises start indication;
Further, as shown in Figure 6, described terminal 50 also comprises: upper electric unit 55, for before sending the first authentication information to described subset, enters power-up state according to described start indication;
Described the first performance element 53, specifically for when receiving the successful sign of described subset transmission, is carried out start; Described the second performance element 54, specifically for when receiving the failed sign of described subset transmission, is carried out shutdown.
Wherein, described operation indication is corresponding one by one with described the first authentication information.
Optionally, corresponding a plurality of operation indications of described the first authentication information.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind of device 60 of protecting data safety in terminal, and as shown in Figure 7, described device 60 comprises:
Receiving element 61, the first authentication information sending for receiving terminal, the content information of the operation indication that described the first authentication information receives with described terminal is corresponding;
Generation unit 62, generates the second authentication information for indicating according to described user;
Judging unit 63, for judging whether described the first authentication information and described the second authentication information mate;
Transmitting element 64, for when described the first authentication information and described second authentication information when coupling, sends successfully and identifies to described terminal; And for when described the first authentication information and described the second authentication information do not mate, to described terminal, send unsuccessfully sign.
Further, described transmitting element 64 also for: if described generation unit does not generate the second authentication information, directly to described terminal, send unsuccessfully sign.
Wherein, described user's indication is corresponding one by one with described the second authentication information.
Optionally, the corresponding a plurality of user's indications of described the second authentication letter.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
The above-mentioned embodiment of the method providing can be provided for the device of the protection data safety in terminal that the embodiment of the present invention provides and terminal, and concrete function is realized and referred to the explanation in embodiment of the method, does not repeat them here.Method, device and the terminal of the protection data safety in terminal that the embodiment of the present invention provides go for mobile terminal, but are not limited only to this.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, to come the hardware that instruction is relevant to complete by computer program, described program can be stored in a computer read/write memory medium, this program, when carrying out, can comprise as the flow process of the embodiment of above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited to this, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (10)

1. a method of protecting data safety in terminal, is characterized in that, comprising:
Terminal receives user's operation indication;
After receiving described operation indication, described terminal sends the first authentication information to described subset, and described the first authentication information is corresponding with the content information of described operation indication;
When described the first authentication information mates with the second authentication information of described subset generation, described terminal receives the successful sign that described subset sends, and according to described successfully sign, carries out described operation indication;
When described the first authentication information does not mate or does not match described the second authentication information with the second authentication information of described subset generation, described terminal receives the failed sign that described subset sends, and according to described unsuccessfully sign refusal, carries out described operation indication.
2. method according to claim 1, is characterized in that, described operation indication comprises start indication; Before described terminal sends the first authentication information to described subset, described method also comprises: described terminal enters power-up state according to described start indication;
In described terminal, after described subset sends the first authentication information, described method also comprises: when described terminal receives the successful sign of described subset transmission, carry out start; When described terminal receives the failed sign of described subset transmission, carry out shutdown.
3. method according to claim 1 and 2, is characterized in that, described operation indication is corresponding one by one with described the first authentication information.
4. a method of protecting data safety in terminal, is characterized in that, comprising:
The first authentication information that subset receiving terminal sends, the content information of the operation indication that described the first authentication information receives with described terminal is corresponding;
Described subset is indicated and is generated the second authentication information according to described user;
Described subset judges whether described the first authentication information and described the second authentication information mate;
When described the first authentication information and described the second authentication information coupling, described subset sends successfully sign to described terminal;
When described the first authentication information and described the second authentication information do not mate, described subset sends unsuccessfully sign to described terminal.
5. method according to claim 4, is characterized in that, described user's indication is corresponding one by one with described the second authentication information.
6. a terminal, is characterized in that, comprising:
Receiving element, for receiving user's operation indication;
Transmitting element, for receive described operation indication at described receiving element after, sends the first authentication information to described subset, and described the first authentication information is corresponding with the content information of described operation indication;
The first performance element, while mating for the second authentication information generating with described subset when described the first authentication information, receives the successful sign that described subset sends, and according to described successfully sign, carries out described operation indication;
The second performance element, when not mating or not matching described the second authentication information for the second authentication information generating with described subset when described the first authentication information, receive the failed sign that described subset sends, according to described unsuccessfully sign refusal, carry out described operation indication.
7. terminal according to claim 6, is characterized in that, described operation indication comprises start indication;
Described terminal also comprises: upper electric unit, for before sending the first authentication information to described subset, enters power-up state according to described start indication;
Described the first performance element, specifically for when receiving the successful sign of described subset transmission, is carried out start; Described the second performance element, specifically for when receiving the failed sign of described subset transmission, is carried out shutdown.
8. according to the terminal described in claim 6 or 7, it is characterized in that, described operation indication is corresponding one by one with described the first authentication information.
9. a device of protecting data safety in terminal, is characterized in that, comprising:
Receiving element, the first authentication information sending for receiving terminal, the content information of the operation indication that described the first authentication information receives with described terminal is corresponding;
Generation unit, generates the second authentication information for indicating according to described user;
Judging unit, for judging whether described the first authentication information and described the second authentication information mate;
Transmitting element, for when described the first authentication information and described second authentication information when coupling, sends successfully and identifies to described terminal; And for when described the first authentication information and described the second authentication information do not mate, to described terminal, send unsuccessfully sign.
10. device according to claim 9, is characterized in that, described user's indication is corresponding one by one with described the second authentication information.
CN201310613282.8A 2013-11-27 2013-11-27 Method and device for protecting security of data in terminal and terminal Pending CN103646217A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310613282.8A CN103646217A (en) 2013-11-27 2013-11-27 Method and device for protecting security of data in terminal and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310613282.8A CN103646217A (en) 2013-11-27 2013-11-27 Method and device for protecting security of data in terminal and terminal

Publications (1)

Publication Number Publication Date
CN103646217A true CN103646217A (en) 2014-03-19

Family

ID=50251430

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310613282.8A Pending CN103646217A (en) 2013-11-27 2013-11-27 Method and device for protecting security of data in terminal and terminal

Country Status (1)

Country Link
CN (1) CN103646217A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650394A (en) * 2018-04-27 2018-10-12 努比亚技术有限公司 Terminal security control method, mobile terminal and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1399850A (en) * 1999-08-31 2003-02-26 高通股份有限公司 Method and apparatus for remote activation of wireless device features using short message services (SMS)
CN101114901A (en) * 2006-07-26 2008-01-30 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN102065412A (en) * 2010-11-03 2011-05-18 中兴通讯股份有限公司 Method and system for improving processing capacity of handheld terminal
CN102571708A (en) * 2010-12-27 2012-07-11 联想(北京)有限公司 Security certification method, portable terminal and portable mobile equipment
CN102724350A (en) * 2012-06-26 2012-10-10 宇龙计算机通信科技(深圳)有限公司 Terminal unlocking method, terminal and auxiliary equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1399850A (en) * 1999-08-31 2003-02-26 高通股份有限公司 Method and apparatus for remote activation of wireless device features using short message services (SMS)
CN101114901A (en) * 2006-07-26 2008-01-30 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN102065412A (en) * 2010-11-03 2011-05-18 中兴通讯股份有限公司 Method and system for improving processing capacity of handheld terminal
CN102571708A (en) * 2010-12-27 2012-07-11 联想(北京)有限公司 Security certification method, portable terminal and portable mobile equipment
CN102724350A (en) * 2012-06-26 2012-10-10 宇龙计算机通信科技(深圳)有限公司 Terminal unlocking method, terminal and auxiliary equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650394A (en) * 2018-04-27 2018-10-12 努比亚技术有限公司 Terminal security control method, mobile terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN107341387B (en) Electronic seal system for security enhancement and control method thereof
CA2935199C (en) Communication device, method and system for establishing communications using the subscriber identity data of another communication device
CN101690125B (en) Communication of information between a host device and an accessory via an intermediate device
US11216549B2 (en) Security verification method and device
EP3468068B1 (en) Method for establishing classic bluetooth connection between dual-mode bluetooth devices, and dual-mode bluetooth device
CN103838992B (en) A kind of fingerprint identification method and terminal
US20170127282A1 (en) Secure protocol for peer-to-peer network
CN108370599B (en) Information processing method, computer-readable storage medium, and information processing system
CN102936980B (en) Method and device for controlling electronic lock
US20110106954A1 (en) System and method for inductively pairing devices to share data or resources
US20100211685A1 (en) Pairing exchange
RU2608539C2 (en) Communication device, communication device control method, communication system and data medium
CN105393564A (en) Communication between host and accessory devices using accessory protocols via wireless transport
CN103037370A (en) Portable storage device and identity authentication method
CN104350484A (en) Message-based identification of an electronic device
CN105045085A (en) Control method of smart watch and the smart watch
CN102308562A (en) Mobile terminal and method, device, system for controlling mobile terminal
CN103488920B (en) A kind of wireless messages safety equipment realize method and system
CN104091133A (en) Method for protecting security of terminal, terminal and system
CN112106118A (en) Intelligent lock control method and device
CN104092823A (en) Information safety device and Bluetooth pairing method
CN110278083A (en) ID authentication request treating method and apparatus, equipment replacement method and apparatus
CN104159259A (en) A wireless communication method and a wireless communication apparatus
CN105516889A (en) Bluetooth connection method and terminal
US20140025946A1 (en) Audio-security storage apparatus and method for managing certificate using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140319