CN104091133A - Method for protecting security of terminal, terminal and system - Google Patents

Method for protecting security of terminal, terminal and system Download PDF

Info

Publication number
CN104091133A
CN104091133A CN201410155210.8A CN201410155210A CN104091133A CN 104091133 A CN104091133 A CN 104091133A CN 201410155210 A CN201410155210 A CN 201410155210A CN 104091133 A CN104091133 A CN 104091133A
Authority
CN
China
Prior art keywords
terminal
wearable device
security strategy
near field
field communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410155210.8A
Other languages
Chinese (zh)
Inventor
刘专
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410155210.8A priority Critical patent/CN104091133A/en
Priority to PCT/CN2014/081281 priority patent/WO2015158043A1/en
Publication of CN104091133A publication Critical patent/CN104091133A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers

Abstract

The embodiment of the invention discloses a method for protecting the security of a terminal, a terminal and a system. The terminal performs encryption on the self security policy, so that the terminal is in an encryption state; the terminal is connected with wearable equipment in a near field radio communication manner; the terminal deals with the security policy according to the connecting state of the terminal and the wearable equipment.

Description

A kind of method, terminal and system of protecting terminal security
Technical field
The present invention relates to the security resist technology of terminal, relate in particular to a kind of method, terminal and system of protecting terminal security.
Background technology
In order to protect user's privacy and mobile terminal safety; current all kinds of mobile terminal (such as mobile phone, panel computer etc.) can be provided with all kinds of screen locking modes; for example: slip, recognition of face, pattern and individual recognition code (PIN; Personal Identification Number) etc., even have user and select two kinds or two or more lock modes to be combined with.Meanwhile, after unlocking screen, also need the application programs (APP, Application) such as privacy space, cipher protector to lock.Although; adopt various lock modes to can be good at ensureing the security of user profile, user's individual privacy is protected, prevent from being stolen and other disabled users see; but also can cause releasing process loaded down with trivial details, make troubles to normal use of user.
Summary of the invention
In view of this, the fundamental purpose of the embodiment of the present invention is to provide a kind of method, terminal and system of protecting terminal security, in ensureing terminal security, uses terminal to bring convenience to user.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method of protecting terminal security provided by the invention, the method comprises:
Terminal is encrypted the security strategy of self, makes terminal in encrypted state;
Terminal connects by near field communication mode and wearable device;
Terminal is processed security strategy according to the connection status of self and wearable device.
In such scheme, described terminal connects by near field communication mode and wearable device, comprising:
Terminal is initiated connection request by near field communication mode to wearable device, the connection request that wearable device is initiated by near field communication mode receiving terminal, and wearable device and terminal connect; Or,
Wearable device is initiated connection request by near field communication mode to terminal, and terminal receives by near field communication mode the connection request that wearable device is initiated, and terminal and wearable device connect.
In such scheme, described terminal is processed security strategy according to the connection status of self and wearable device, comprising:
Terminal periodic detects the connection status with wearable device, if terminal and wearable device, in connection status, are deciphering by the encryption indicator position of security strategy; If terminal and wearable device, in not-connected status, are encryption by the encryption indicator position of security strategy.
In such scheme, described terminal is processed security strategy according to the connection status of self and wearable device, comprising:
Terminal periodic detects the connection status with wearable device, if terminal and wearable device in connection status, will be bound mark position for binding, and is that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If terminal and wearable device in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
In such scheme, the connection status of described detection and wearable device, comprising:
Terminal is sent and intercepts bag to wearable device by near field communication mode, and when receive the listens for responsive bag that wearable device returns by near field communication mode, terminal and wearable device are in connection status; When not receiving by near field communication mode the listens for responsive bag that wearable device returns, terminal and wearable device are in not-connected status.
In such scheme, the method further comprises:
Terminal reads the value of the encryption indicator position of security strategy, and when the encryption indicator position of security strategy is deciphering, terminal determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, terminal determines that security strategy is in encrypted state.
A kind of terminal provided by the invention, this terminal comprises: encrypting module, near field communication module and processing module; Wherein,
Described encrypting module, is encrypted for the security strategy to terminal, makes terminal in encrypted state;
Described near field communication module, for setting up being connected of terminal and wearable device by near field communication mode;
Described processing module, processes security strategy for the connection status according to self and wearable device.
In such scheme,
Described near field communication module, specifically for being initiated connection request or receive by near field communication mode the connection request that wearable device is initiated to wearable device by near field communication mode, sets up being connected of terminal and wearable device.
In such scheme,
Described near field communication module, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module, specifically for receive the notice of listens for responsive bag according to described near field communication module, is deciphering by the encryption indicator position of security strategy; Not receiving the notice of listens for responsive bag according to described near field communication module, is encryption by the encryption indicator position of security strategy.
In such scheme,
Described near field communication module, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module, specifically for receive the notice of listens for responsive bag according to described near field communication module, will bind mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; Do not receive the notice of listens for responsive bag according to described near field communication module, will bind mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
In such scheme,
Described encrypting module, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that security strategy is in encrypted state.
A kind of system of protecting terminal security provided by the invention, this system comprises terminal and wearable device;
Described terminal, is encrypted for the security strategy to self, makes self in encrypted state; Connect by near field communication mode and wearable device; According to the connection status of self and wearable device, security strategy is processed;
Described wearable device, for connecting by near field communication mode and terminal.
In such scheme,
Described terminal, specifically for periodically detecting self and the connection status of wearable device, if self with wearable device in connection status, be to decipher by the encryption indicator position of security strategy; If self and wearable device, in not-connected status, are encryption by the encryption indicator position of security strategy.
In such scheme,
Described terminal, specifically for periodically detecting the connection status of self and wearable device, if self and wearable device in connection status, will be bound mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If self and wearable device in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
In such scheme,
Described terminal, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that the security strategy of self is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that the security strategy of self is in encrypted state.
The embodiment of the present invention provides a kind of method, terminal and system of protecting terminal security, and terminal is encrypted the security strategy of self, makes terminal in encrypted state; Terminal connects by near field communication mode and wearable device; Terminal is processed security strategy according to the connection status of self and wearable device; This method is simple to operate, and the mode connecting by wearable device and terminal, in ensureing terminal security, without terminal is carried out to loaded down with trivial details release, is used terminal to bring convenience to user.
Brief description of the drawings
The schematic flow sheet of a kind of method of protecting security of mobile terminal that Fig. 1 provides for the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the method for the protection mobile phone security of the present invention's one concrete application example;
Fig. 3 is the schematic flow sheet of the method for the protection mobile phone security of another concrete application example of the present invention;
The structural representation of a kind of system of protecting terminal security that Fig. 4 provides for the embodiment of the present invention;
The structural representation of a kind of terminal that Fig. 5 provides for the embodiment of the present invention.
Embodiment
The application of current wearable device (intelligent watch, intelligent glasses and intelligent bracelet etc.) is more and more extensive, bring new science and technology sense to experience to user, simultaneously, because wearable device is to be directly through user with it or to be incorporated into user's clothes or a kind of portable set of accessory, therefore, the stolen risk of wearable device is more much lower than mobile terminal or even terminal, and portable fine.
In embodiments of the present invention, terminal is encrypted the security strategy of self, makes terminal in encrypted state; Terminal connects by near field communication mode and wearable device; Terminal is processed security strategy according to the connection status of self and wearable device.
Taking mobile terminal as example, by drawings and the specific embodiments, the present invention is described in further detail again below.
The workflow schematic diagram of a kind of method of protecting security of mobile terminal that Fig. 1 provides for the embodiment of the present invention, the method comprises the steps:
Step 101, mobile terminal are encrypted the security strategy of self, make mobile terminal in encrypted state;
Concrete, security strategy is that user need to select to set to the use of mobile terminal according to self in mobile terminal, wherein, security strategy comprises screen locking, privacy space, program locking etc., and screen locking mode comprises slide lock, recognition of face, pattern, PIN etc.Privacy locking space can carry out cryptoguard to picture, video, specific file.Program locking can application programs lock, and only, after user inputs correct password, just can use this application program.After setting security strategy, password or lock mode that mobile terminal is set according to user are encrypted the security strategy of self, mobile terminal is given tacit consent in encrypted state, be that user need input corresponding password or unlocking manner while using, for example, when user need to open the screen of locking, must first input according to the unlocking manner of setting, mobile terminal just can be opened screen rendering content; For another example, user need to open the application program of encryption, must first input the password of setting, and this application program just can be opened.
Step 102, mobile terminal connect by near field communication mode and wearable device;
Wherein, mobile terminal connects by near field communication mode and wearable device, comprising:
Mobile terminal is initiated connection request by near field communication mode to wearable device, the connection request that wearable device is initiated by near field communication mode mobile terminal receive, and wearable device and mobile terminal connect; Or,
Wearable device is initiated connection request by near field communication mode to mobile terminal, and mobile terminal receives by near field communication mode the connection request that wearable device is initiated, and mobile terminal and wearable device connect.
Concrete, in the process connecting, do not limit initiator and the take over party of the flow process that connects, initiate connection request by near field communication mode to wearable device with mobile terminal, the connection request that wearable device is initiated by near field communication mode mobile terminal receive, wearable device and mobile terminal connect and describe for example:
The input mode that user provides by mobile terminal and wearable device selects to open the near field communication function of mobile terminal and wearable device, if mobile terminal screen is in the lock state, user needs first the screen of mobile terminal to be carried out to release; After near field communication function is opened, mobile terminal and wearable device can be found the other side, and mobile terminal sends connection request by near field communication mode to wearable device; Wearable device receives connection request by near field communication mode, and wearable device and mobile terminal connect.
Wherein, near field communication mode is bluetooth connection, infrared connection etc.Two equipment connect as prior art based near field communication mode, repeat no more herein.
Step 103, mobile terminal are processed security strategy according to the connection status of self and wearable device;
Concrete, mobile terminal can periodically detect the connection status with wearable device, if mobile terminal and wearable device in connection status, show in the controlled range of mobile terminal in user, by the encryption indicator position of security strategy for deciphering; If mobile terminal and wearable device in not-connected status, show that mobile terminal has departed from user's controlled range, be encryption by the encryption indicator position of security strategy;
When user need to access the security strategy of mobile terminal, as open screen, enter privacy space etc., mobile terminal reads the value of the encryption indicator position of security strategy, if the encryption indicator position of security strategy is deciphering, mobile terminal determines that security strategy is current in decrypted state, directly provide respective application to user, as opened screen, opening private space etc., and carry out again the loaded down with trivial details deciphering input of security strategy without user; If the encryption indicator position of security strategy is for encrypting, mobile terminal determines that security strategy is in encrypted state, still needs the loaded down with trivial details deciphering input of user to security strategy.
Concrete, mobile terminal detects the connection status with wearable device, comprise: mobile terminal is sent and intercepts bag to wearable device by near field communication mode, if receive by near field communication mode the listens for responsive bag that wearable device returns, mobile terminal and wearable device are in connection status; If do not receive by near field communication mode the listens for responsive bag that wearable device returns, mobile terminal and wearable device are in not-connected status;
Mobile terminal detection can be arranged by user as required with the cycle of the connection status of wearable device, as 5 minutes, 10 minutes.
Fig. 2 is described below the embodiment of the present invention as an example of a real world applications scene example:
Wherein, mobile terminal is taking mobile phone as example; Wearable device is taking intelligent bracelet as example; Near field communication mode is taking bluetooth as example; Security strategy, taking screen locking as example, comprises the following steps:
Step 201, mobile phone are encrypted the screen locking of self, make the screen of mobile phone in encrypted state;
Here, the encryption of screen locking is that user sets according to self selecting in mobile phone, and the cipher mode of screen locking can comprise slide lock, recognition of face, pattern, PIN etc.After setting, mobile phone screen is given tacit consent in encrypted state, and the input mode that mobile phone is set according to user is carried out release to the screen of locking.
Step 202, mobile phone connect by bluetooth approach and intelligent bracelet;
Here, mobile phone connects by bluetooth approach and intelligent bracelet, comprising:
Mobile phone is initiated connection request by bluetooth approach to intelligent bracelet, and intelligent bracelet receives by bluetooth approach the connection request that mobile phone is initiated, and intelligent bracelet and mobile phone connect; Or,
Intelligence bracelet is initiated connection request by bluetooth approach to mobile phone, and mobile phone receives by bluetooth approach the connection request that intelligent bracelet is initiated, and mobile phone and intelligent bracelet connect.
Concrete, in the process connecting, do not limit initiator and the take over party of the process of connecting, initiate connection request by bluetooth approach to intelligent bracelet with mobile phone, intelligence bracelet receives the connection request of mobile phone initiation by bluetooth approach, intelligent bracelet and mobile phone connect and describe for example:
The input mode that user provides by mobile phone and intelligent bracelet is selected the Bluetooth function of starting hand-set and intelligent bracelet, if the screen terminal of mobile phone is in the lock state, user needs first the screen of mobile phone to be carried out to release; After Bluetooth function is opened, mobile phone and intelligent bracelet can be found the other side, and mobile phone sends connection request by bluetooth approach to intelligent bracelet; Intelligence bracelet receives connection request by bluetooth approach, and intelligent bracelet and mobile phone connect.
Two equipment connect as prior art based on bluetooth approach, repeat no more herein.
Step 203, mobile phone judge the connection status of self and intelligent bracelet, if in connection status, perform step 204; If in not-connected status, perform step 205;
Concrete, mobile phone can periodically detect the connection status with intelligent bracelet, if mobile phone and intelligent bracelet in connection status, show, in the controlled range of mobile phone in user, to perform step 204; If mobile phone and intelligent bracelet in not-connected status, show that mobile phone has departed from user's controlled range, performs step 205;
Step 204, mobile phone are deciphering by the encryption indicator position of screen locking, as encryption indicator position is set to 0;
Step 205, mobile phone are to encrypt by the encryption indicator position of screen locking, as encryption indicator position is set to 1.
When user need to show the screen of mobile phone, mobile phone reads the value of the encryption indicator position of screen locking, if the encryption indicator position of screen locking is deciphering, mobile phone determines that screen locking is current in decrypted state, directly open screen to user, and again unlock screen is carried out to loaded down with trivial details deciphering input without user; If the encryption indicator position of screen locking is for encrypting, mobile phone determines that screen locking is in encrypted state, still needs user in the time of unlock screen, to carry out loaded down with trivial details deciphering input.
Concrete, mobile phone detects the connection status with intelligent bracelet, comprising: mobile phone is sent and intercepts bag to intelligent bracelet by bluetooth approach, if receive by bluetooth approach the listens for responsive bag that intelligent bracelet returns, mobile phone and intelligent bracelet are in connection status; If do not receive by bluetooth approach the listens for responsive bag that intelligent bracelet returns, mobile phone and intelligent bracelet are in not-connected status.
Mobile phone detection can be arranged by user as required with the cycle of the connection status of intelligent bracelet, as 5 minutes, 10 minutes.
Fig. 3 is described below the embodiment of the present invention as an example of another real world applications scene example:
Wherein, mobile terminal is taking mobile phone as example; Wearable device is taking intelligent bracelet as example; Near field communication mode is taking bluetooth as example; Security strategy, taking screen locking as example, comprises the following steps:
Step 501~step 502 is identical with step 201~step 202.
Step 503, mobile phone and intelligent bracelet are bound;
In the time that mobile phone is connected with multiple wearable devices, for avoiding the maloperation of mobile phone, therefore mobile phone and intelligent bracelet can be bound.
Step 504, mobile phone judge the connection status of self and intelligent bracelet, if in connection status, show that mobile phone and intelligent bracelet are still in binding state, execution step 505; If in not-connected status, show that mobile phone and intelligent bracelet have departed from binding state, execution step 507.
Step 505, mobile phone will be bound mark position for binding, be 0 as bound mark position;
Step 506, mobile phone are binding according to binding zone bit, are deciphering, as encryption indicator position is set to 0 by the encryption indicator position of screen locking;
Step 507, mobile phone will be bound mark position for not binding, be 1 as bound mark position;
Step 508, mobile phone are not binding according to binding zone bit, are to encrypt, as encryption indicator position is set to 1 by the encryption indicator position of screen locking.
For realizing said method, the embodiment of the present invention provides a kind of system of protecting terminal security, as shown in Figure 4, comprises terminal 30 and wearable device 40; Wherein,
Terminal 30, is encrypted for the security strategy to self, makes self in encrypted state; Connect by near field communication mode and wearable device 40; According to the connection status of self and wearable device 40, security strategy is processed;
Wearable device 40, for connecting by near field communication mode and terminal.
Concrete, security strategy is that user sets according to self selecting in terminal 30, and wherein, security strategy comprises screen locking, privacy space, program locking etc., and screen locking mode comprises slide lock, recognition of face, pattern, PIN etc.Privacy locking space can carry out cryptoguard to picture, video, alternative document.Program locking can application programs lock, and only, after the correct password of input, just can use this application program.After setting, the password that terminal 30 is set according to user is encrypted the security strategy of self, and terminal 30 is given tacit consent in encrypted state.
Concrete, terminal 30, specifically for initiating connection request by near field communication mode to wearable device 40, connects with wearable device 40; Wearable device 40, specifically for the connection request of initiating by near field communication mode receiving terminal 30, connects with terminal 30; Or,
Wearable device 40, specifically for initiating connection request by near field communication mode to terminal 30, connects with terminal 30; Terminal 30, specifically for receiving by near field communication mode the connection request that wearable device 40 is initiated, connects with wearable device 40.
Terminal 30, specifically for periodically detecting self and the connection status of wearable device 40, if self with wearable device 40 in connection status, be to decipher by the encryption indicator position of security strategy; If self and wearable device 40, in not-connected status, are encryption by the encryption indicator position of security strategy.
Terminal 30, specifically for periodically detecting the connection status of self and wearable device 40, if self and wearable device 40 in connection status, will be bound mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If self and wearable device 40 in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
Terminal 30, specifically for being sent and intercept bag to wearable device 40 by near field communication mode, if receive by near field communication mode the listens for responsive bag that wearable device 40 returns, determines with wearable device 40 in connection status; If do not receive by near field communication mode the listens for responsive bag that wearable device 40 returns, determine with wearable device 40 in not-connected status;
Wearable device 40, also, for receive intercepting after bag that terminal 30 sends by near field communication mode, sends listens for responsive bag to terminal 30.
Terminal 30, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that the security strategy of self is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that the security strategy of self is in encrypted state.
Terminal 30 detections can be arranged by user as required with the cycle of the connection status of wearable device 40, as 5 minutes, 10 minutes.
As shown in Figure 5, described terminal 30 comprises encrypting module 31, near field communication module 32 and processing module 33; Wherein,
Described encrypting module 31, is encrypted for the security strategy to terminal, makes terminal 30 in encrypted state;
Described near field communication module 32, for setting up being connected of terminal 30 and wearable device by near field communication mode;
Described processing module 33, for processing security strategy according to terminal 30 and the connection status of wearable device.
Near field communication module 32, specifically for being initiated connection request or receive by near field communication mode the connection request that wearable device is initiated to wearable device by near field communication mode, sets up being connected of terminal 30 and wearable device;
Described near field communication module 32, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module 33, specifically for receive the notice of listens for responsive bag according to described near field communication module 32, is deciphering by the encryption indicator position of security strategy; Not receiving the notice of listens for responsive bag according to described near field communication module 32, is encryption by the encryption indicator position of security strategy.
Described near field communication module 32, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module 33, specifically for receive the notice of listens for responsive bag according to described near field communication module 32, will bind mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; Do not receive the notice of listens for responsive bag according to described near field communication module 32, will bind mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
When user needs the security strategy of access terminal 30, described encrypting module 31, also for reading the value of encryption indicator position of security strategy, when the encryption indicator position of security strategy is deciphering, determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that security strategy is in encrypted state;
Concrete, when user needs the security strategy of access terminal 30, as open screen, enter privacy space etc., encrypting module 31 reads the value of the encryption indicator position of security strategy, when the encryption indicator position of security strategy is deciphering, encrypting module 31 determines that security strategy is current in decrypted state, directly provides respective application to user, as open screen, open private space etc., and carry out again the loaded down with trivial details deciphering input to security strategy without user; When the encryption indicator position of security strategy is encryption, encrypting module 31 determines that security strategy is in encrypted state, still needs the loaded down with trivial details deciphering input of user to security strategy.
The above, be only preferred embodiment of the present invention, is not intended to limit protection scope of the present invention.

Claims (15)

1. a method of protecting terminal security, is characterized in that, the method comprises:
Terminal is encrypted the security strategy of self, makes terminal in encrypted state;
Terminal connects by near field communication mode and wearable device;
Terminal is processed security strategy according to the connection status of self and wearable device.
2. method according to claim 1, is characterized in that, described terminal connects by near field communication mode and wearable device, comprising:
Terminal is initiated connection request by near field communication mode to wearable device, the connection request that wearable device is initiated by near field communication mode receiving terminal, and wearable device and terminal connect; Or,
Wearable device is initiated connection request by near field communication mode to terminal, and terminal receives by near field communication mode the connection request that wearable device is initiated, and terminal and wearable device connect.
3. method according to claim 1, is characterized in that, described terminal is processed security strategy according to the connection status of self and wearable device, comprising:
Terminal periodic detects the connection status with wearable device, if terminal and wearable device, in connection status, are deciphering by the encryption indicator position of security strategy; If terminal and wearable device, in not-connected status, are encryption by the encryption indicator position of security strategy.
4. method according to claim 1, is characterized in that, described terminal is processed security strategy according to the connection status of self and wearable device, comprising:
Terminal periodic detects the connection status with wearable device, if terminal and wearable device in connection status, will be bound mark position for binding, and is that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If terminal and wearable device in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
5. according to the method described in claim 3 or 4, it is characterized in that, the connection status of described detection and wearable device, comprising:
Terminal is sent and intercepts bag to wearable device by near field communication mode, and when receive the listens for responsive bag that wearable device returns by near field communication mode, terminal and wearable device are in connection status; When not receiving by near field communication mode the listens for responsive bag that wearable device returns, terminal and wearable device are in not-connected status.
6. according to the method described in claim 3 or 4, it is characterized in that, the method further comprises:
Terminal reads the value of the encryption indicator position of security strategy, and when the encryption indicator position of security strategy is deciphering, terminal determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, terminal determines that security strategy is in encrypted state.
7. a terminal, is characterized in that, this terminal comprises: encrypting module, near field communication module and processing module; Wherein,
Described encrypting module, is encrypted for the security strategy to terminal, makes terminal in encrypted state;
Described near field communication module, for setting up being connected of terminal and wearable device by near field communication mode;
Described processing module, processes security strategy for the connection status according to self and wearable device.
8. terminal according to claim 7, is characterized in that,
Described near field communication module, specifically for being initiated connection request or receive by near field communication mode the connection request that wearable device is initiated to wearable device by near field communication mode, sets up being connected of terminal and wearable device.
9. terminal according to claim 7, is characterized in that,
Described near field communication module, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module, specifically for receive the notice of listens for responsive bag according to described near field communication module, is deciphering by the encryption indicator position of security strategy; Not receiving the notice of listens for responsive bag according to described near field communication module, is encryption by the encryption indicator position of security strategy.
10. terminal according to claim 7, is characterized in that,
Described near field communication module, also for being sent and intercept bag to wearable device by near field communication mode, and receives that by near field communication mode the result of the listens for responsive bag that wearable device returns notifies to described processing module by whether;
Described processing module, specifically for receive the notice of listens for responsive bag according to described near field communication module, will bind mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; Do not receive the notice of listens for responsive bag according to described near field communication module, will bind mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
11. according to the terminal described in claim 9 or 10, it is characterized in that,
Described encrypting module, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that security strategy is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that security strategy is in encrypted state.
Protect the system of terminal security for 12. 1 kinds, it is characterized in that, this system comprises terminal and wearable device;
Described terminal, is encrypted for the security strategy to self, makes self in encrypted state; Connect by near field communication mode and wearable device; According to the connection status of self and wearable device, security strategy is processed;
Described wearable device, for connecting by near field communication mode and terminal.
13. systems according to claim 12, is characterized in that,
Described terminal, specifically for periodically detecting self and the connection status of wearable device, if self with wearable device in connection status, be to decipher by the encryption indicator position of security strategy; If self and wearable device, in not-connected status, are encryption by the encryption indicator position of security strategy.
14. systems according to claim 12, is characterized in that,
Described terminal, specifically for periodically detecting the connection status of self and wearable device, if self and wearable device in connection status, will be bound mark position for binding, and be that binding is deciphering by the encryption indicator position of security strategy according to binding zone bit; If self and wearable device in not-connected status, will be bound mark position for not binding, and be not bind the encryption indicator position of security strategy as encrypting according to binding zone bit.
15. according to the system described in claim 13 or 14, it is characterized in that,
Described terminal, is further used for the value of the encryption indicator position of reading security strategy, when the encryption indicator position of security strategy is deciphering, determines that the security strategy of self is current in decrypted state; When the encryption indicator position of security strategy is encryption, determine that the security strategy of self is in encrypted state.
CN201410155210.8A 2014-04-17 2014-04-17 Method for protecting security of terminal, terminal and system Pending CN104091133A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410155210.8A CN104091133A (en) 2014-04-17 2014-04-17 Method for protecting security of terminal, terminal and system
PCT/CN2014/081281 WO2015158043A1 (en) 2014-04-17 2014-06-30 Method, terminal and system for protecting terminal security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410155210.8A CN104091133A (en) 2014-04-17 2014-04-17 Method for protecting security of terminal, terminal and system

Publications (1)

Publication Number Publication Date
CN104091133A true CN104091133A (en) 2014-10-08

Family

ID=51638848

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410155210.8A Pending CN104091133A (en) 2014-04-17 2014-04-17 Method for protecting security of terminal, terminal and system

Country Status (2)

Country Link
CN (1) CN104091133A (en)
WO (1) WO2015158043A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408360A (en) * 2014-10-24 2015-03-11 上海微肯网络科技有限公司 Encryption equipment and method based on mobile terminal
CN104732158A (en) * 2015-04-09 2015-06-24 上海斐讯数据通信技术有限公司 Encryption photographing method, system and device
CN104751066A (en) * 2015-03-10 2015-07-01 广东欧珀移动通信有限公司 Information processing method and device
CN104951703A (en) * 2015-05-27 2015-09-30 小米科技有限责任公司 Terminal control method and device
CN105630144A (en) * 2014-11-26 2016-06-01 华为终端(东莞)有限公司 Handheld terminal and screen display control method thereof
CN105787395A (en) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Data access method and device and mobile terminal
WO2016112566A1 (en) * 2015-01-16 2016-07-21 宇龙计算机通信科技(深圳)有限公司 System processing method, system processing device and terminal
CN106326724A (en) * 2016-08-18 2017-01-11 捷开通讯(深圳)有限公司 Unlocking method based on terminal added with trusted device and terminal
CN107622547A (en) * 2017-09-13 2018-01-23 广州咩也科技有限公司 Method, apparatus, storage medium and the computer equipment that terminal is unlocked
CN107678533A (en) * 2016-08-01 2018-02-09 北京心有灵犀科技有限公司 A kind of gesture identification method for wearable device
CN108259661A (en) * 2017-12-27 2018-07-06 北京海杭通讯科技有限公司 Method for protecting privacy and mobile terminal based on bluetooth connection
US10198563B2 (en) 2015-03-20 2019-02-05 Xiaomi Inc. Methods and apparatuses for controlling state of terminal screen

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247579A (en) * 2007-02-14 2008-08-20 德信无线通讯科技(北京)有限公司 Method for locking mobile communication terminal through Bluetooth earphone
CN101739529A (en) * 2009-12-01 2010-06-16 深圳华为通信技术有限公司 Device, computer, system and method for locking computer by data card
CN102402651A (en) * 2010-09-09 2012-04-04 三星电子(中国)研发中心 Device and method for protecting information and portable terminal
CN103023539A (en) * 2012-12-04 2013-04-03 中兴通讯股份有限公司 Method and system for starting functions of electronic devices
WO2013095356A1 (en) * 2011-12-20 2013-06-27 Intel Corporation File encryption, decryption and accessvia near field communication
CN103369511A (en) * 2012-03-28 2013-10-23 宇龙计算机通信科技(深圳)有限公司 WiFi network-based unlocking or locking method and communication terminal
CN103473514A (en) * 2013-09-06 2013-12-25 宇龙计算机通信科技(深圳)有限公司 Data storage access method and device
CN103647587A (en) * 2013-12-30 2014-03-19 华为终端有限公司 Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247579A (en) * 2007-02-14 2008-08-20 德信无线通讯科技(北京)有限公司 Method for locking mobile communication terminal through Bluetooth earphone
CN101739529A (en) * 2009-12-01 2010-06-16 深圳华为通信技术有限公司 Device, computer, system and method for locking computer by data card
CN102402651A (en) * 2010-09-09 2012-04-04 三星电子(中国)研发中心 Device and method for protecting information and portable terminal
WO2013095356A1 (en) * 2011-12-20 2013-06-27 Intel Corporation File encryption, decryption and accessvia near field communication
CN103369511A (en) * 2012-03-28 2013-10-23 宇龙计算机通信科技(深圳)有限公司 WiFi network-based unlocking or locking method and communication terminal
CN103023539A (en) * 2012-12-04 2013-04-03 中兴通讯股份有限公司 Method and system for starting functions of electronic devices
CN103473514A (en) * 2013-09-06 2013-12-25 宇龙计算机通信科技(深圳)有限公司 Data storage access method and device
CN103647587A (en) * 2013-12-30 2014-03-19 华为终端有限公司 Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵丽花: "《计算机网络通信》", 31 January 2011 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408360B (en) * 2014-10-24 2018-01-12 上海微肯网络科技有限公司 Encryption device and method based on mobile terminal
CN104408360A (en) * 2014-10-24 2015-03-11 上海微肯网络科技有限公司 Encryption equipment and method based on mobile terminal
CN105630144A (en) * 2014-11-26 2016-06-01 华为终端(东莞)有限公司 Handheld terminal and screen display control method thereof
WO2016082752A1 (en) * 2014-11-26 2016-06-02 华为技术有限公司 Hand-held terminal and screen display control method thereof
WO2016112566A1 (en) * 2015-01-16 2016-07-21 宇龙计算机通信科技(深圳)有限公司 System processing method, system processing device and terminal
CN104751066A (en) * 2015-03-10 2015-07-01 广东欧珀移动通信有限公司 Information processing method and device
US10198563B2 (en) 2015-03-20 2019-02-05 Xiaomi Inc. Methods and apparatuses for controlling state of terminal screen
CN104732158A (en) * 2015-04-09 2015-06-24 上海斐讯数据通信技术有限公司 Encryption photographing method, system and device
CN104951703A (en) * 2015-05-27 2015-09-30 小米科技有限责任公司 Terminal control method and device
CN105787395A (en) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Data access method and device and mobile terminal
CN105787395B (en) * 2016-02-29 2019-03-22 宇龙计算机通信科技(深圳)有限公司 Data access method, data access device and mobile terminal
CN107678533A (en) * 2016-08-01 2018-02-09 北京心有灵犀科技有限公司 A kind of gesture identification method for wearable device
CN106326724A (en) * 2016-08-18 2017-01-11 捷开通讯(深圳)有限公司 Unlocking method based on terminal added with trusted device and terminal
CN107622547A (en) * 2017-09-13 2018-01-23 广州咩也科技有限公司 Method, apparatus, storage medium and the computer equipment that terminal is unlocked
CN108259661A (en) * 2017-12-27 2018-07-06 北京海杭通讯科技有限公司 Method for protecting privacy and mobile terminal based on bluetooth connection

Also Published As

Publication number Publication date
WO2015158043A1 (en) 2015-10-22

Similar Documents

Publication Publication Date Title
CN104091133A (en) Method for protecting security of terminal, terminal and system
CN103092484B (en) The method of unlock screen, device and terminal
CN103838992B (en) A kind of fingerprint identification method and terminal
EP2770702B1 (en) Mobile phone and communication method thereof
CN201828919U (en) Remote control lock using mobile phone blue tooth
CN102945526B (en) A kind of device and method for improving mobile equipment on-line safety of payment
WO2016061899A1 (en) Fingerprint decryption method and device
CN103037370A (en) Portable storage device and identity authentication method
CN102509055A (en) Mobile terminal and method for hiding programs of mobile terminal
CN103440446A (en) Protective unlocking operating method and device of private content of intelligent terminal
CN104243165A (en) Intelligent movable terminal privacy protection system and method based on intelligent bracelet
CN102833068B (en) Method for bidirectional authentication of terminal and smart card, protocol and smart card
WO2014079139A1 (en) Method and system for protecting data of mobile terminal
CN102495983A (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN103488920A (en) Implementation method and system of wireless information safety device
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN103200562A (en) Communication terminal locking method and communication terminal
CN102402651B (en) Information protection device and method and portable terminal
CN105933503B (en) Information processing method and electronic equipment
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN104156653B (en) A kind of application guard method and the device of mobile terminal
CN103532697B (en) A kind of realization method and system of wireless messages safety means
CN104966014A (en) Terminal encryption method and apparatus and terminal decryption method and apparatus
CN105512541A (en) Screen unlocking method, data encryption and decryption methods as well as related devices
CN103067172A (en) Information safety management method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141008

RJ01 Rejection of invention patent application after publication