CN104091133A - Method for protecting security of terminal, terminal and system - Google Patents
Method for protecting security of terminal, terminal and system Download PDFInfo
- Publication number
- CN104091133A CN104091133A CN201410155210.8A CN201410155210A CN104091133A CN 104091133 A CN104091133 A CN 104091133A CN 201410155210 A CN201410155210 A CN 201410155210A CN 104091133 A CN104091133 A CN 104091133A
- Authority
- CN
- China
- Prior art keywords
- terminal
- wearable device
- security strategy
- near field
- field communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a method for protecting the security of a terminal, a terminal and a system. The terminal performs encryption on the self security policy, so that the terminal is in an encryption state; the terminal is connected with wearable equipment in a near field radio communication manner; the terminal deals with the security policy according to the connecting state of the terminal and the wearable equipment.
Description
Technical field
The present invention relates to the security resist technology of terminal, relate in particular to a kind of method, terminal and system of protecting terminal security.
Background technology
In order to protect user's privacy and mobile terminal safety; current all kinds of mobile terminal (such as mobile phone, panel computer etc.) can be provided with all kinds of screen locking modes; for example: slip, recognition of face, pattern and individual recognition code (PIN; Personal Identification Number) etc., even have user and select two kinds or two or more lock modes to be combined with.Meanwhile, after unlocking screen, also need the application programs (APP, Application) such as privacy space, cipher protector to lock.Although; adopt various lock modes to can be good at ensureing the security of user profile, user's individual privacy is protected, prevent from being stolen and other disabled users see; but also can cause releasing process loaded down with trivial details, make troubles to normal use of user.
Summary of the invention
In view of this, the fundamental purpose of the embodiment of the present invention is to provide a kind of method, terminal and system of protecting terminal security, in ensureing terminal security, uses terminal to bring convenience to user.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method of protecting terminal security provided by the invention, the method comprises:
Terminal is encrypted the security strategy of self, makes terminal in encrypted state;
Terminal connects by near field communication mode and wearable device;
Terminal is processed security strategy according to the connection status of self and wearable device.
In such scheme, described terminal connects by near field communication mode and wearable device, comprising:
Terminal is initiated connection request by near field communication mode to wearable device, the connection request that wearable device is initiated by near field communication mode receiving terminal, and wearable device and terminal connect; Or,
Wearable device is initiated connection request by near field communication mode to terminal, and terminal receives by near field communication mode the connection request that wearable device is initiated, and terminal and wearable device connect.
In such scheme, described terminal is processed security strategy according to the connection status of self and wearable device, comprising:
Terminal periodic detects the connection status with wearable device, if terminal and wearable device, in connection status, are deciphering by the encryption indicator position of security strategy; If terminal and wearable device, in not-connected status, are encryption by the encryption indicator position of security strategy.
In such scheme, described terminal is processed security strategy according to the connection status of self and wearable device, comprising:
Terminal periodic detects the connection status with wearable device, if terminal and wearable device in connection status, will be bound mark position for binding, and is that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If terminal and wearable device in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
In such scheme, the connection status of described detection and wearable device, comprising:
Terminal is sent and intercepts bag to wearable device by near field communication mode, and when receive the listens for responsive bag that wearable device returns by near field communication mode, terminal and wearable device are in connection status; When not receiving by near field communication mode the listens for responsive bag that wearable device returns, terminal and wearable device are in not-connected status.
In such scheme, the method further comprises:
Terminal reads the value of the encryption indicator position of security strategy, and when the encryption indicator position of security strategy is deciphering, terminal determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, terminal determines that security strategy is in encrypted state.
A kind of terminal provided by the invention, this terminal comprises: encrypting module, near field communication module and processing module; Wherein,
Described encrypting module, is encrypted for the security strategy to terminal, makes terminal in encrypted state;
Described near field communication module, for setting up being connected of terminal and wearable device by near field communication mode;
Described processing module, processes security strategy for the connection status according to self and wearable device.
In such scheme,
Described near field communication module, specifically for being initiated connection request or receive by near field communication mode the connection request that wearable device is initiated to wearable device by near field communication mode, sets up being connected of terminal and wearable device.
In such scheme,
Described near field communication module, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module, specifically for receive the notice of listens for responsive bag according to described near field communication module, is deciphering by the encryption indicator position of security strategy; Not receiving the notice of listens for responsive bag according to described near field communication module, is encryption by the encryption indicator position of security strategy.
In such scheme,
Described near field communication module, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module, specifically for receive the notice of listens for responsive bag according to described near field communication module, will bind mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; Do not receive the notice of listens for responsive bag according to described near field communication module, will bind mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
In such scheme,
Described encrypting module, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that security strategy is in encrypted state.
A kind of system of protecting terminal security provided by the invention, this system comprises terminal and wearable device;
Described terminal, is encrypted for the security strategy to self, makes self in encrypted state; Connect by near field communication mode and wearable device; According to the connection status of self and wearable device, security strategy is processed;
Described wearable device, for connecting by near field communication mode and terminal.
In such scheme,
Described terminal, specifically for periodically detecting self and the connection status of wearable device, if self with wearable device in connection status, be to decipher by the encryption indicator position of security strategy; If self and wearable device, in not-connected status, are encryption by the encryption indicator position of security strategy.
In such scheme,
Described terminal, specifically for periodically detecting the connection status of self and wearable device, if self and wearable device in connection status, will be bound mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If self and wearable device in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
In such scheme,
Described terminal, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that the security strategy of self is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that the security strategy of self is in encrypted state.
The embodiment of the present invention provides a kind of method, terminal and system of protecting terminal security, and terminal is encrypted the security strategy of self, makes terminal in encrypted state; Terminal connects by near field communication mode and wearable device; Terminal is processed security strategy according to the connection status of self and wearable device; This method is simple to operate, and the mode connecting by wearable device and terminal, in ensureing terminal security, without terminal is carried out to loaded down with trivial details release, is used terminal to bring convenience to user.
Brief description of the drawings
The schematic flow sheet of a kind of method of protecting security of mobile terminal that Fig. 1 provides for the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the method for the protection mobile phone security of the present invention's one concrete application example;
Fig. 3 is the schematic flow sheet of the method for the protection mobile phone security of another concrete application example of the present invention;
The structural representation of a kind of system of protecting terminal security that Fig. 4 provides for the embodiment of the present invention;
The structural representation of a kind of terminal that Fig. 5 provides for the embodiment of the present invention.
Embodiment
The application of current wearable device (intelligent watch, intelligent glasses and intelligent bracelet etc.) is more and more extensive, bring new science and technology sense to experience to user, simultaneously, because wearable device is to be directly through user with it or to be incorporated into user's clothes or a kind of portable set of accessory, therefore, the stolen risk of wearable device is more much lower than mobile terminal or even terminal, and portable fine.
In embodiments of the present invention, terminal is encrypted the security strategy of self, makes terminal in encrypted state; Terminal connects by near field communication mode and wearable device; Terminal is processed security strategy according to the connection status of self and wearable device.
Taking mobile terminal as example, by drawings and the specific embodiments, the present invention is described in further detail again below.
The workflow schematic diagram of a kind of method of protecting security of mobile terminal that Fig. 1 provides for the embodiment of the present invention, the method comprises the steps:
Step 101, mobile terminal are encrypted the security strategy of self, make mobile terminal in encrypted state;
Concrete, security strategy is that user need to select to set to the use of mobile terminal according to self in mobile terminal, wherein, security strategy comprises screen locking, privacy space, program locking etc., and screen locking mode comprises slide lock, recognition of face, pattern, PIN etc.Privacy locking space can carry out cryptoguard to picture, video, specific file.Program locking can application programs lock, and only, after user inputs correct password, just can use this application program.After setting security strategy, password or lock mode that mobile terminal is set according to user are encrypted the security strategy of self, mobile terminal is given tacit consent in encrypted state, be that user need input corresponding password or unlocking manner while using, for example, when user need to open the screen of locking, must first input according to the unlocking manner of setting, mobile terminal just can be opened screen rendering content; For another example, user need to open the application program of encryption, must first input the password of setting, and this application program just can be opened.
Step 102, mobile terminal connect by near field communication mode and wearable device;
Wherein, mobile terminal connects by near field communication mode and wearable device, comprising:
Mobile terminal is initiated connection request by near field communication mode to wearable device, the connection request that wearable device is initiated by near field communication mode mobile terminal receive, and wearable device and mobile terminal connect; Or,
Wearable device is initiated connection request by near field communication mode to mobile terminal, and mobile terminal receives by near field communication mode the connection request that wearable device is initiated, and mobile terminal and wearable device connect.
Concrete, in the process connecting, do not limit initiator and the take over party of the flow process that connects, initiate connection request by near field communication mode to wearable device with mobile terminal, the connection request that wearable device is initiated by near field communication mode mobile terminal receive, wearable device and mobile terminal connect and describe for example:
The input mode that user provides by mobile terminal and wearable device selects to open the near field communication function of mobile terminal and wearable device, if mobile terminal screen is in the lock state, user needs first the screen of mobile terminal to be carried out to release; After near field communication function is opened, mobile terminal and wearable device can be found the other side, and mobile terminal sends connection request by near field communication mode to wearable device; Wearable device receives connection request by near field communication mode, and wearable device and mobile terminal connect.
Wherein, near field communication mode is bluetooth connection, infrared connection etc.Two equipment connect as prior art based near field communication mode, repeat no more herein.
Step 103, mobile terminal are processed security strategy according to the connection status of self and wearable device;
Concrete, mobile terminal can periodically detect the connection status with wearable device, if mobile terminal and wearable device in connection status, show in the controlled range of mobile terminal in user, by the encryption indicator position of security strategy for deciphering; If mobile terminal and wearable device in not-connected status, show that mobile terminal has departed from user's controlled range, be encryption by the encryption indicator position of security strategy;
When user need to access the security strategy of mobile terminal, as open screen, enter privacy space etc., mobile terminal reads the value of the encryption indicator position of security strategy, if the encryption indicator position of security strategy is deciphering, mobile terminal determines that security strategy is current in decrypted state, directly provide respective application to user, as opened screen, opening private space etc., and carry out again the loaded down with trivial details deciphering input of security strategy without user; If the encryption indicator position of security strategy is for encrypting, mobile terminal determines that security strategy is in encrypted state, still needs the loaded down with trivial details deciphering input of user to security strategy.
Concrete, mobile terminal detects the connection status with wearable device, comprise: mobile terminal is sent and intercepts bag to wearable device by near field communication mode, if receive by near field communication mode the listens for responsive bag that wearable device returns, mobile terminal and wearable device are in connection status; If do not receive by near field communication mode the listens for responsive bag that wearable device returns, mobile terminal and wearable device are in not-connected status;
Mobile terminal detection can be arranged by user as required with the cycle of the connection status of wearable device, as 5 minutes, 10 minutes.
Fig. 2 is described below the embodiment of the present invention as an example of a real world applications scene example:
Wherein, mobile terminal is taking mobile phone as example; Wearable device is taking intelligent bracelet as example; Near field communication mode is taking bluetooth as example; Security strategy, taking screen locking as example, comprises the following steps:
Step 201, mobile phone are encrypted the screen locking of self, make the screen of mobile phone in encrypted state;
Here, the encryption of screen locking is that user sets according to self selecting in mobile phone, and the cipher mode of screen locking can comprise slide lock, recognition of face, pattern, PIN etc.After setting, mobile phone screen is given tacit consent in encrypted state, and the input mode that mobile phone is set according to user is carried out release to the screen of locking.
Step 202, mobile phone connect by bluetooth approach and intelligent bracelet;
Here, mobile phone connects by bluetooth approach and intelligent bracelet, comprising:
Mobile phone is initiated connection request by bluetooth approach to intelligent bracelet, and intelligent bracelet receives by bluetooth approach the connection request that mobile phone is initiated, and intelligent bracelet and mobile phone connect; Or,
Intelligence bracelet is initiated connection request by bluetooth approach to mobile phone, and mobile phone receives by bluetooth approach the connection request that intelligent bracelet is initiated, and mobile phone and intelligent bracelet connect.
Concrete, in the process connecting, do not limit initiator and the take over party of the process of connecting, initiate connection request by bluetooth approach to intelligent bracelet with mobile phone, intelligence bracelet receives the connection request of mobile phone initiation by bluetooth approach, intelligent bracelet and mobile phone connect and describe for example:
The input mode that user provides by mobile phone and intelligent bracelet is selected the Bluetooth function of starting hand-set and intelligent bracelet, if the screen terminal of mobile phone is in the lock state, user needs first the screen of mobile phone to be carried out to release; After Bluetooth function is opened, mobile phone and intelligent bracelet can be found the other side, and mobile phone sends connection request by bluetooth approach to intelligent bracelet; Intelligence bracelet receives connection request by bluetooth approach, and intelligent bracelet and mobile phone connect.
Two equipment connect as prior art based on bluetooth approach, repeat no more herein.
Step 203, mobile phone judge the connection status of self and intelligent bracelet, if in connection status, perform step 204; If in not-connected status, perform step 205;
Concrete, mobile phone can periodically detect the connection status with intelligent bracelet, if mobile phone and intelligent bracelet in connection status, show, in the controlled range of mobile phone in user, to perform step 204; If mobile phone and intelligent bracelet in not-connected status, show that mobile phone has departed from user's controlled range, performs step 205;
Step 204, mobile phone are deciphering by the encryption indicator position of screen locking, as encryption indicator position is set to 0;
Step 205, mobile phone are to encrypt by the encryption indicator position of screen locking, as encryption indicator position is set to 1.
When user need to show the screen of mobile phone, mobile phone reads the value of the encryption indicator position of screen locking, if the encryption indicator position of screen locking is deciphering, mobile phone determines that screen locking is current in decrypted state, directly open screen to user, and again unlock screen is carried out to loaded down with trivial details deciphering input without user; If the encryption indicator position of screen locking is for encrypting, mobile phone determines that screen locking is in encrypted state, still needs user in the time of unlock screen, to carry out loaded down with trivial details deciphering input.
Concrete, mobile phone detects the connection status with intelligent bracelet, comprising: mobile phone is sent and intercepts bag to intelligent bracelet by bluetooth approach, if receive by bluetooth approach the listens for responsive bag that intelligent bracelet returns, mobile phone and intelligent bracelet are in connection status; If do not receive by bluetooth approach the listens for responsive bag that intelligent bracelet returns, mobile phone and intelligent bracelet are in not-connected status.
Mobile phone detection can be arranged by user as required with the cycle of the connection status of intelligent bracelet, as 5 minutes, 10 minutes.
Fig. 3 is described below the embodiment of the present invention as an example of another real world applications scene example:
Wherein, mobile terminal is taking mobile phone as example; Wearable device is taking intelligent bracelet as example; Near field communication mode is taking bluetooth as example; Security strategy, taking screen locking as example, comprises the following steps:
Step 501~step 502 is identical with step 201~step 202.
Step 503, mobile phone and intelligent bracelet are bound;
In the time that mobile phone is connected with multiple wearable devices, for avoiding the maloperation of mobile phone, therefore mobile phone and intelligent bracelet can be bound.
Step 504, mobile phone judge the connection status of self and intelligent bracelet, if in connection status, show that mobile phone and intelligent bracelet are still in binding state, execution step 505; If in not-connected status, show that mobile phone and intelligent bracelet have departed from binding state, execution step 507.
Step 505, mobile phone will be bound mark position for binding, be 0 as bound mark position;
Step 506, mobile phone are binding according to binding zone bit, are deciphering, as encryption indicator position is set to 0 by the encryption indicator position of screen locking;
Step 507, mobile phone will be bound mark position for not binding, be 1 as bound mark position;
Step 508, mobile phone are not binding according to binding zone bit, are to encrypt, as encryption indicator position is set to 1 by the encryption indicator position of screen locking.
For realizing said method, the embodiment of the present invention provides a kind of system of protecting terminal security, as shown in Figure 4, comprises terminal 30 and wearable device 40; Wherein,
Terminal 30, is encrypted for the security strategy to self, makes self in encrypted state; Connect by near field communication mode and wearable device 40; According to the connection status of self and wearable device 40, security strategy is processed;
Wearable device 40, for connecting by near field communication mode and terminal.
Concrete, security strategy is that user sets according to self selecting in terminal 30, and wherein, security strategy comprises screen locking, privacy space, program locking etc., and screen locking mode comprises slide lock, recognition of face, pattern, PIN etc.Privacy locking space can carry out cryptoguard to picture, video, alternative document.Program locking can application programs lock, and only, after the correct password of input, just can use this application program.After setting, the password that terminal 30 is set according to user is encrypted the security strategy of self, and terminal 30 is given tacit consent in encrypted state.
Concrete, terminal 30, specifically for initiating connection request by near field communication mode to wearable device 40, connects with wearable device 40; Wearable device 40, specifically for the connection request of initiating by near field communication mode receiving terminal 30, connects with terminal 30; Or,
Wearable device 40, specifically for initiating connection request by near field communication mode to terminal 30, connects with terminal 30; Terminal 30, specifically for receiving by near field communication mode the connection request that wearable device 40 is initiated, connects with wearable device 40.
Terminal 30, specifically for periodically detecting self and the connection status of wearable device 40, if self with wearable device 40 in connection status, be to decipher by the encryption indicator position of security strategy; If self and wearable device 40, in not-connected status, are encryption by the encryption indicator position of security strategy.
Terminal 30, specifically for periodically detecting the connection status of self and wearable device 40, if self and wearable device 40 in connection status, will be bound mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If self and wearable device 40 in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
Terminal 30, specifically for being sent and intercept bag to wearable device 40 by near field communication mode, if receive by near field communication mode the listens for responsive bag that wearable device 40 returns, determines with wearable device 40 in connection status; If do not receive by near field communication mode the listens for responsive bag that wearable device 40 returns, determine with wearable device 40 in not-connected status;
Wearable device 40, also, for receive intercepting after bag that terminal 30 sends by near field communication mode, sends listens for responsive bag to terminal 30.
Terminal 30, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that the security strategy of self is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that the security strategy of self is in encrypted state.
Terminal 30 detections can be arranged by user as required with the cycle of the connection status of wearable device 40, as 5 minutes, 10 minutes.
As shown in Figure 5, described terminal 30 comprises encrypting module 31, near field communication module 32 and processing module 33; Wherein,
Described encrypting module 31, is encrypted for the security strategy to terminal, makes terminal 30 in encrypted state;
Described near field communication module 32, for setting up being connected of terminal 30 and wearable device by near field communication mode;
Described processing module 33, for processing security strategy according to terminal 30 and the connection status of wearable device.
Near field communication module 32, specifically for being initiated connection request or receive by near field communication mode the connection request that wearable device is initiated to wearable device by near field communication mode, sets up being connected of terminal 30 and wearable device;
Described near field communication module 32, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module 33, specifically for receive the notice of listens for responsive bag according to described near field communication module 32, is deciphering by the encryption indicator position of security strategy; Not receiving the notice of listens for responsive bag according to described near field communication module 32, is encryption by the encryption indicator position of security strategy.
Described near field communication module 32, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module 33, specifically for receive the notice of listens for responsive bag according to described near field communication module 32, will bind mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; Do not receive the notice of listens for responsive bag according to described near field communication module 32, will bind mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
When user needs the security strategy of access terminal 30, described encrypting module 31, also for reading the value of encryption indicator position of security strategy, when the encryption indicator position of security strategy is deciphering, determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that security strategy is in encrypted state;
Concrete, when user needs the security strategy of access terminal 30, as open screen, enter privacy space etc., encrypting module 31 reads the value of the encryption indicator position of security strategy, when the encryption indicator position of security strategy is deciphering, encrypting module 31 determines that security strategy is current in decrypted state, directly provides respective application to user, as open screen, open private space etc., and carry out again the loaded down with trivial details deciphering input to security strategy without user; When the encryption indicator position of security strategy is encryption, encrypting module 31 determines that security strategy is in encrypted state, still needs the loaded down with trivial details deciphering input of user to security strategy.
The above, be only preferred embodiment of the present invention, is not intended to limit protection scope of the present invention.
Claims (15)
1. a method of protecting terminal security, is characterized in that, the method comprises:
Terminal is encrypted the security strategy of self, makes terminal in encrypted state;
Terminal connects by near field communication mode and wearable device;
Terminal is processed security strategy according to the connection status of self and wearable device.
2. method according to claim 1, is characterized in that, described terminal connects by near field communication mode and wearable device, comprising:
Terminal is initiated connection request by near field communication mode to wearable device, the connection request that wearable device is initiated by near field communication mode receiving terminal, and wearable device and terminal connect; Or,
Wearable device is initiated connection request by near field communication mode to terminal, and terminal receives by near field communication mode the connection request that wearable device is initiated, and terminal and wearable device connect.
3. method according to claim 1, is characterized in that, described terminal is processed security strategy according to the connection status of self and wearable device, comprising:
Terminal periodic detects the connection status with wearable device, if terminal and wearable device, in connection status, are deciphering by the encryption indicator position of security strategy; If terminal and wearable device, in not-connected status, are encryption by the encryption indicator position of security strategy.
4. method according to claim 1, is characterized in that, described terminal is processed security strategy according to the connection status of self and wearable device, comprising:
Terminal periodic detects the connection status with wearable device, if terminal and wearable device in connection status, will be bound mark position for binding, and is that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If terminal and wearable device in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
5. according to the method described in claim 3 or 4, it is characterized in that, the connection status of described detection and wearable device, comprising:
Terminal is sent and intercepts bag to wearable device by near field communication mode, and when receive the listens for responsive bag that wearable device returns by near field communication mode, terminal and wearable device are in connection status; When not receiving by near field communication mode the listens for responsive bag that wearable device returns, terminal and wearable device are in not-connected status.
6. according to the method described in claim 3 or 4, it is characterized in that, the method further comprises:
Terminal reads the value of the encryption indicator position of security strategy, and when the encryption indicator position of security strategy is deciphering, terminal determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, terminal determines that security strategy is in encrypted state.
7. a terminal, is characterized in that, this terminal comprises: encrypting module, near field communication module and processing module; Wherein,
Described encrypting module, is encrypted for the security strategy to terminal, makes terminal in encrypted state;
Described near field communication module, for setting up being connected of terminal and wearable device by near field communication mode;
Described processing module, processes security strategy for the connection status according to self and wearable device.
8. terminal according to claim 7, is characterized in that,
Described near field communication module, specifically for being initiated connection request or receive by near field communication mode the connection request that wearable device is initiated to wearable device by near field communication mode, sets up being connected of terminal and wearable device.
9. terminal according to claim 7, is characterized in that,
Described near field communication module, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module, specifically for receive the notice of listens for responsive bag according to described near field communication module, is deciphering by the encryption indicator position of security strategy; Not receiving the notice of listens for responsive bag according to described near field communication module, is encryption by the encryption indicator position of security strategy.
10. terminal according to claim 7, is characterized in that,
Described near field communication module, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module, specifically for receive the notice of listens for responsive bag according to described near field communication module, will bind mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; Do not receive the notice of listens for responsive bag according to described near field communication module, will bind mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
11. according to the terminal described in claim 9 or 10, it is characterized in that,
Described encrypting module, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that security strategy is in encrypted state.
Protect the system of terminal security for 12. 1 kinds, it is characterized in that, this system comprises terminal and wearable device;
Described terminal, is encrypted for the security strategy to self, makes self in encrypted state; Connect by near field communication mode and wearable device; According to the connection status of self and wearable device, security strategy is processed;
Described wearable device, for connecting by near field communication mode and terminal.
13. systems according to claim 12, is characterized in that,
Described terminal, specifically for periodically detecting self and the connection status of wearable device, if self with wearable device in connection status, be to decipher by the encryption indicator position of security strategy; If self and wearable device, in not-connected status, are encryption by the encryption indicator position of security strategy.
14. systems according to claim 12, is characterized in that,
Described terminal, specifically for periodically detecting the connection status of self and wearable device, if self and wearable device in connection status, will be bound mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If self and wearable device in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
15. according to the system described in claim 13 or 14, it is characterized in that,
Described terminal, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that the security strategy of self is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that the security strategy of self is in encrypted state.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410155210.8A CN104091133A (en) | 2014-04-17 | 2014-04-17 | Method for protecting security of terminal, terminal and system |
PCT/CN2014/081281 WO2015158043A1 (en) | 2014-04-17 | 2014-06-30 | Method, terminal and system for protecting terminal security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410155210.8A CN104091133A (en) | 2014-04-17 | 2014-04-17 | Method for protecting security of terminal, terminal and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104091133A true CN104091133A (en) | 2014-10-08 |
Family
ID=51638848
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410155210.8A Pending CN104091133A (en) | 2014-04-17 | 2014-04-17 | Method for protecting security of terminal, terminal and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104091133A (en) |
WO (1) | WO2015158043A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104408360A (en) * | 2014-10-24 | 2015-03-11 | 上海微肯网络科技有限公司 | Encryption equipment and method based on mobile terminal |
CN104732158A (en) * | 2015-04-09 | 2015-06-24 | 上海斐讯数据通信技术有限公司 | Encryption photographing method, system and device |
CN104751066A (en) * | 2015-03-10 | 2015-07-01 | 广东欧珀移动通信有限公司 | Information processing method and device |
CN104951703A (en) * | 2015-05-27 | 2015-09-30 | 小米科技有限责任公司 | Terminal control method and device |
CN105630144A (en) * | 2014-11-26 | 2016-06-01 | 华为终端(东莞)有限公司 | Handheld terminal and screen display control method thereof |
CN105787395A (en) * | 2016-02-29 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Data access method and device and mobile terminal |
WO2016112566A1 (en) * | 2015-01-16 | 2016-07-21 | 宇龙计算机通信科技(深圳)有限公司 | System processing method, system processing device and terminal |
CN106326724A (en) * | 2016-08-18 | 2017-01-11 | 捷开通讯(深圳)有限公司 | Unlocking method based on terminal added with trusted device and terminal |
CN107622547A (en) * | 2017-09-13 | 2018-01-23 | 广州咩也科技有限公司 | Method, apparatus, storage medium and the computer equipment that terminal is unlocked |
CN107678533A (en) * | 2016-08-01 | 2018-02-09 | 北京心有灵犀科技有限公司 | A kind of gesture identification method for wearable device |
CN108259661A (en) * | 2017-12-27 | 2018-07-06 | 北京海杭通讯科技有限公司 | Method for protecting privacy and mobile terminal based on bluetooth connection |
US10198563B2 (en) | 2015-03-20 | 2019-02-05 | Xiaomi Inc. | Methods and apparatuses for controlling state of terminal screen |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247579A (en) * | 2007-02-14 | 2008-08-20 | 德信无线通讯科技(北京)有限公司 | Method for locking mobile communication terminal through Bluetooth earphone |
CN101739529A (en) * | 2009-12-01 | 2010-06-16 | 深圳华为通信技术有限公司 | Device, computer, system and method for locking computer by data card |
CN102402651A (en) * | 2010-09-09 | 2012-04-04 | 三星电子(中国)研发中心 | Device and method for protecting information and portable terminal |
CN103023539A (en) * | 2012-12-04 | 2013-04-03 | 中兴通讯股份有限公司 | Method and system for starting functions of electronic devices |
WO2013095356A1 (en) * | 2011-12-20 | 2013-06-27 | Intel Corporation | File encryption, decryption and accessvia near field communication |
CN103369511A (en) * | 2012-03-28 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | WiFi network-based unlocking or locking method and communication terminal |
CN103473514A (en) * | 2013-09-06 | 2013-12-25 | 宇龙计算机通信科技(深圳)有限公司 | Data storage access method and device |
CN103647587A (en) * | 2013-12-30 | 2014-03-19 | 华为终端有限公司 | Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device |
-
2014
- 2014-04-17 CN CN201410155210.8A patent/CN104091133A/en active Pending
- 2014-06-30 WO PCT/CN2014/081281 patent/WO2015158043A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247579A (en) * | 2007-02-14 | 2008-08-20 | 德信无线通讯科技(北京)有限公司 | Method for locking mobile communication terminal through Bluetooth earphone |
CN101739529A (en) * | 2009-12-01 | 2010-06-16 | 深圳华为通信技术有限公司 | Device, computer, system and method for locking computer by data card |
CN102402651A (en) * | 2010-09-09 | 2012-04-04 | 三星电子(中国)研发中心 | Device and method for protecting information and portable terminal |
WO2013095356A1 (en) * | 2011-12-20 | 2013-06-27 | Intel Corporation | File encryption, decryption and accessvia near field communication |
CN103369511A (en) * | 2012-03-28 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | WiFi network-based unlocking or locking method and communication terminal |
CN103023539A (en) * | 2012-12-04 | 2013-04-03 | 中兴通讯股份有限公司 | Method and system for starting functions of electronic devices |
CN103473514A (en) * | 2013-09-06 | 2013-12-25 | 宇龙计算机通信科技(深圳)有限公司 | Data storage access method and device |
CN103647587A (en) * | 2013-12-30 | 2014-03-19 | 华为终端有限公司 | Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device |
Non-Patent Citations (1)
Title |
---|
赵丽花: "《计算机网络通信》", 31 January 2011 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104408360B (en) * | 2014-10-24 | 2018-01-12 | 上海微肯网络科技有限公司 | Encryption device and method based on mobile terminal |
CN104408360A (en) * | 2014-10-24 | 2015-03-11 | 上海微肯网络科技有限公司 | Encryption equipment and method based on mobile terminal |
CN105630144A (en) * | 2014-11-26 | 2016-06-01 | 华为终端(东莞)有限公司 | Handheld terminal and screen display control method thereof |
WO2016082752A1 (en) * | 2014-11-26 | 2016-06-02 | 华为技术有限公司 | Hand-held terminal and screen display control method thereof |
WO2016112566A1 (en) * | 2015-01-16 | 2016-07-21 | 宇龙计算机通信科技(深圳)有限公司 | System processing method, system processing device and terminal |
CN104751066A (en) * | 2015-03-10 | 2015-07-01 | 广东欧珀移动通信有限公司 | Information processing method and device |
US10198563B2 (en) | 2015-03-20 | 2019-02-05 | Xiaomi Inc. | Methods and apparatuses for controlling state of terminal screen |
CN104732158A (en) * | 2015-04-09 | 2015-06-24 | 上海斐讯数据通信技术有限公司 | Encryption photographing method, system and device |
CN104951703A (en) * | 2015-05-27 | 2015-09-30 | 小米科技有限责任公司 | Terminal control method and device |
CN105787395A (en) * | 2016-02-29 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Data access method and device and mobile terminal |
CN105787395B (en) * | 2016-02-29 | 2019-03-22 | 宇龙计算机通信科技(深圳)有限公司 | Data access method, data access device and mobile terminal |
CN107678533A (en) * | 2016-08-01 | 2018-02-09 | 北京心有灵犀科技有限公司 | A kind of gesture identification method for wearable device |
CN106326724A (en) * | 2016-08-18 | 2017-01-11 | 捷开通讯(深圳)有限公司 | Unlocking method based on terminal added with trusted device and terminal |
CN107622547A (en) * | 2017-09-13 | 2018-01-23 | 广州咩也科技有限公司 | Method, apparatus, storage medium and the computer equipment that terminal is unlocked |
CN108259661A (en) * | 2017-12-27 | 2018-07-06 | 北京海杭通讯科技有限公司 | Method for protecting privacy and mobile terminal based on bluetooth connection |
Also Published As
Publication number | Publication date |
---|---|
WO2015158043A1 (en) | 2015-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104091133A (en) | Method for protecting security of terminal, terminal and system | |
CN103092484B (en) | The method of unlock screen, device and terminal | |
CN103838992B (en) | A kind of fingerprint identification method and terminal | |
EP2770702B1 (en) | Mobile phone and communication method thereof | |
CN201828919U (en) | Remote control lock using mobile phone blue tooth | |
CN102945526B (en) | A kind of device and method for improving mobile equipment on-line safety of payment | |
WO2016061899A1 (en) | Fingerprint decryption method and device | |
CN103037370A (en) | Portable storage device and identity authentication method | |
CN102509055A (en) | Mobile terminal and method for hiding programs of mobile terminal | |
JP2017504137A (en) | Management authority unlocking method, authentication device, program, and recording medium | |
CN103440446A (en) | Protective unlocking operating method and device of private content of intelligent terminal | |
CN104243165A (en) | Intelligent movable terminal privacy protection system and method based on intelligent bracelet | |
CN102833068B (en) | Method for bidirectional authentication of terminal and smart card, protocol and smart card | |
CN104268451A (en) | Mobile terminal and shortcut starting method and device thereof | |
WO2013123453A1 (en) | Data storage devices, systems, and methods | |
CN102521169B (en) | Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk | |
CN103488920A (en) | Implementation method and system of wireless information safety device | |
CN103200562A (en) | Communication terminal locking method and communication terminal | |
CN102402651B (en) | Information protection device and method and portable terminal | |
CN105933503B (en) | Information processing method and electronic equipment | |
CN105787319A (en) | Iris recognition-based portable terminal and method for same | |
CN104156653B (en) | A kind of application guard method and the device of mobile terminal | |
CN103702323A (en) | Wireless information security equipment system and method | |
CN103532697B (en) | A kind of realization method and system of wireless messages safety means | |
CN104966014A (en) | Terminal encryption method and apparatus and terminal decryption method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141008 |
|
RJ01 | Rejection of invention patent application after publication |