CN104182667B - Data guard method and device based on screen locking - Google Patents
Data guard method and device based on screen locking Download PDFInfo
- Publication number
- CN104182667B CN104182667B CN201410425084.3A CN201410425084A CN104182667B CN 104182667 B CN104182667 B CN 104182667B CN 201410425084 A CN201410425084 A CN 201410425084A CN 104182667 B CN104182667 B CN 104182667B
- Authority
- CN
- China
- Prior art keywords
- screen locking
- smart machine
- screen
- locking type
- key files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of data guard method based on screen locking, including:Obtaining user carries out selected screen locking type when screen locking is set to smart machine;Default storage region of the screen locking type for obtaining in smart machine is preserved;When there is unblock operation, judge whether the current screen locking type of smart machine is consistent with the screen locking type preserved in the default storage region;If the current screen locking type of smart machine and the screen locking Type-Inconsistencies of preservation in the default storage region, shield the unblock operation.Additionally, also disclosing a kind of data protecting device based on screen locking.Using data guard method and device of the present invention based on screen locking; when the file for preserving screen-lock password is deleted by violence or is replaced by alternative document; when the screen locking type of smart machine is modified or deleted; corresponding unblock operation can be shielded; it is cracked so as to effectively prevent smart machine, protects the safety of data.
Description
Technical field
The present invention relates to Data Protection Technologies field, more particularly to a kind of data guard method and a kind of base based on screen locking
In the data protecting device of screen locking.
Background technology
For smart machine, its data is effectively protected extremely important.Current most of smart electronicses
Equipment is provided with the function of screen locking, when user produces requirements for access, it is necessary to be first unlocked to smart machine, so as to one
Determine to be realized in degree the information security function of smart machine.By taking the smart mobile phone of android system as an example, screen locking function is added
Purpose be to protect the personal secrets of user.The screen locking of smart mobile phone is by being stored in intelligence after encryption by screen-lock password
In certain file under certain catalogue of mobile phone, namely the file for preserving screen-lock password.In releasing process, the application of smart mobile phone
The system password be input into unblock operation carries out same cryptographic calculation and is contrasted with the encryption information for being preserved, if
Comparing result is unanimously then unlocked to smart mobile phone.
Although above-mentioned practices well meets the information security demand of smart mobile phone to a certain extent, but if preserving screen locking
The file of password is deleted or be replaced by alternative document by violence, then screen-lock password is just eliminated or becomes known close
Code, so that original password failure.Therefore, current smart machine still has very big leakage in terms of to its data protection
Hole.
The content of the invention
Based on this, the invention provides a kind of data guard method based on screen locking.
A kind of data guard method based on screen locking, comprises the following steps:
Obtaining user carries out selected screen locking type when screen locking is set to smart machine;
Default storage region of the screen locking type for obtaining in smart machine is preserved;Wherein, it is described default
Storage region has the access rights higher than general storage area in smart machine;
When there is unblock operation, judge the current screen locking type of smart machine with preservation in the default storage region
Whether screen locking type is consistent;
If the screen locking Type-Inconsistencies preserved in the current screen locking type of smart machine and the default storage region,
The shielding unblock operation.
A kind of data protecting device based on screen locking, including acquisition module, preserving module, judge module and shroud module;
The acquisition module, selected screen locking type when screen locking is set is carried out to smart machine for obtaining user;
The preserving module, is protected for the default storage region by the screen locking type for obtaining in smart machine
Deposit;Wherein, the default storage region has the access rights higher than general storage area in smart machine;
The judge module, for when there is unblock operation, judging that the current screen locking type of smart machine is pre- with described
If whether the screen locking type preserved in storage region is consistent;
If the judge module judges the current screen locking type of smart machine with preservation in the default storage region
Screen locking Type-Inconsistencies, then the shroud module is for shielding the unblock operation.
In general, when user carries out screen locking setting to smart machine, can be automatically saved in for screen locking type by smart machine
In general storage area, for example, it is stored in smart machine with " setting " using in corresponding database.Due to smart machine
Can there are some leaks unavoidably in system, thus general storage area security do not ensure that data of the storage in it not by
Modification is deleted.
Compared with general technology, the present invention is based on the data guard method and the data protecting device based on screen locking of screen locking,
When user carries out screen locking setting, in addition to the general storage area that screen locking type is stored in into smart machine, also user is set
The screen locking type put individually is preserved in default storage region.The screen locking type preserved in general storage area is identified as intelligence
The current screen locking type of energy equipment, when there is unblock operation, the screen locking type with preservation in default storage region is compared,
The unblock operation is shielded if both are inconsistent.
There are the access rights and safe level higher than general storage area in smart machine due to presetting storage region
Not, the screen locking type being stored therein cannot be deleted or change.When the file of preservation screen-lock password is by violence deletion or quilt
Alternative document is replaced, and when the screen locking type of smart machine is modified or deleted, corresponding unblock operation can be shielded, so that
Effectively prevent smart machine to be cracked, protect the safety of data.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of data guard method of the present invention based on screen locking;
Fig. 2 is the structural representation of data protecting device of the present invention based on screen locking.
Specific embodiment
It is below in conjunction with the accompanying drawings and preferably real further to illustrate the effect of the technological means taken of the invention and acquirement
Example is applied, to technical scheme, clear and complete description is carried out.
Fig. 1 is referred to, is the schematic flow sheet of data guard method of the present invention based on screen locking.
Data guard method of the present invention based on screen locking, comprises the following steps:
S101 obtains user and selected screen locking type when screen locking is set is carried out to smart machine;
Default storage regions of the S102 by the screen locking type for obtaining in smart machine is preserved;Wherein, it is described
Default storage region has the access rights higher than general storage area in smart machine;
S103 judges to be protected in the current screen locking type of smart machine and the default storage region when there is unblock operation
Whether the screen locking type deposited is consistent;
If the current screen locking type of S104 smart machines differs with the screen locking type of preservation in the default storage region
Cause, then shield the unblock operation.
It refers to that the screen of smart machine is locked that the screen locking is set, and sets screen-lock password;When screen is locked
Afterwards, it is necessary to being unlocked operation could return to the system application interface of smart machine.
The general storage area refers to the conventional storage region in smart machine, for example, correspond to the data of every application
Storehouse, including database corresponding with the function such as " setting ", " calendar ", " photo ", " social software ".With the intelligence of android system
As a example by energy mobile phone, when with ROOT authorities, general storage area is just may have access to, data therein are modified or deleted
Operation.Wherein, ROOT is present in unix system (such as AIX, BSD) and class unix system (such as Debian, Redhat, Ubuntu
Deng the linux system and android system of version) in, power user is generally designated as root, equivalent to Windows systems
In Administrator.Root is unique power user in system, with all of authority in system, such as starts or stops
Only a process, deletes or increases user, increases or disable hardware etc..
In step S101, when user carries out screen locking setting to smart machine, smart machine can automatically protect screen locking type
Exist in general storage area, for example, be stored in smart machine with " setting " using in corresponding database.Into corresponding
Database, can obtain user carries out selected screen locking type when screen locking is set to smart machine.
As one preferred embodiment, the acquisition user carries out selected lock when screen locking is set to smart machine
In the step of screen type, the screen locking type includes pattern screen locking, password screen locking and mixing screen locking;Wherein, the pattern screen locking
Screen-lock password be pattern, the screen-lock password of the password screen locking is numeral, the screen-lock password of the mixing screen locking for letter and
Number combinatorics on words.
Above-mentioned three kinds of screen locking types are the most commonly used screen locking types, the present invention is had the maximum scope of application, and
Beneficial to popularization, it is easy to accomplish.Pattern screen locking refers to draw specific pattern by gesture, and pattern is often by several points institute group
Into.In password screen locking, the character for constituting screen-lock password is string number.In mixing screen locking, by the alphabetical sum of certain length
Combinatorics on words constitutes screen-lock password.Because three kinds of screen locking types are more commonly used, no longer it is described in more detail.
As one preferred embodiment, the acquisition user carries out selected lock when screen locking is set to smart machine
After the step of screen type, comprise the following steps:
Acquisition user carries out the file status of the key files generated when screen locking is set to smart machine;Wherein, it is described
Key files are the file for preserving screen-lock password;
The file status of the key files for obtaining are preserved in the default storage region.
When user carries out screen locking setting to smart machine, smart machine can automatically generate key files, be set for preserving user
Fixed screen-lock password.The data of screen-lock password are stored in key files after being encrypted according to certain AES.Key texts
Part is automatically saved in the general storage area of smart machine, by taking the smart mobile phone of android system as an example, is weighed when with ROOT
In limited time, general storage area is just may have access to, the data in key files are modified or deleted etc. operates.
The file status of key files are also carried out individually storage by screen locking setting up procedure in addition to recording screen locking type.It is logical
Chang Di, smart machine can carry out routine preservation to key files, and the file status to key files are carried out again in default storage region
Backup, has access rights and the level of security higher than general storage area in smart machine due to presetting storage region,
The file status of the key files being stored therein cannot be deleted or change.
As one preferred embodiment, the acquisition user carries out what is generated when screen locking is set to smart machine
In the step of file status of key files, the file status of the key files include:The key files whether there is, described
The timestamp of the file size of key files and the key files.
According to the file status of key files, the storage state of key files can be grasped.If above-mentioned key files are by without authorization
When being deleted or modified, the storage state of key files can change.For example, when key files be deleted when, can detect its
No longer exist in general storage area;If be replaced, file size or timestamp can change such that it is able to know
Whether key files are maliciously tampered.
In step s 102, the screen locking type for obtaining is preserved in default storage region.Described presetting is deposited
Storage area domain has the access rights higher than general storage area in smart machine.
As one preferred embodiment, the default storage region is the based non-volatile random access in smart machine
Memory.
NVRAM (Non-Volatile Random Access Memory, nonvolatile random access memory) is powered off
Remain to keep a kind of RAM of data afterwards.If generically explaining nonvolatile memory, that is, refer to after power-off, stored
The random access storage device do not lost of data.
NVRAM is transparent to user.User cannot see the data in the region, also cannot be to the data in the region
Carry out the operation such as rewriting, on ordinary meaning, only manufacturer has the access rights of NVRAM, therefore level of security is at a relatively high.Will lock
Screen type NVRAM ad hoc in smart machine be kept separately and be may insure to be changed.
In step s 103, when unblock operation generation has been detected, the current screen locking type of smart machine is obtained, and sentence
Whether the current screen locking type of disconnected smart machine is consistent with the screen locking type preserved in the default storage region.
By taking smart mobile phone as an example, screen locking type is stored in the corresponding database of " setting " application, is grasped when there is unblock
When making, screen locking type, namely the current screen locking type of smart machine are obtained in the corresponding database of " setting " application.
As one preferred embodiment, the screen locking type for judging that smart machine is current and the default memory block
In domain after the whether consistent step of the screen locking type of preservation, comprise the following steps:
If the current screen locking type of smart machine is consistent with the screen locking type preserved in the default storage region, obtain
Take the file status of the current key files of smart machine;
Judge the file status of the current key files of smart machine and the key files of preservation in the default storage region
File status it is whether consistent;
If it is inconsistent, the shielding unblock operation.
If the current screen locking type of smart machine is consistent with the screen locking type preserved in the default storage region, anticipate
Taste screen locking type and is not changed, and further obtains the file status of the current key files of smart machine, and judges intelligence
The file status of the key files preserved in the file status of the current key files of equipment and the default storage region whether one
Cause, if it is inconsistent, the shielding unblock operation.On the basis of being monitored to screen locking type, further to key files
File status be monitored, can further prevent the screen locking function of smart machine to be cracked or invade, it is ensured that the peace of data
Entirely.
As one preferred embodiment, the file status for judging the current key files of smart machine with it is described
In default storage region after the whether consistent step of the file status of the key files of preservation, comprise the following steps:
If the key files preserved in the file status of the current key files of smart machine and the default storage region
File status it is consistent, then obtain the be input into unlocking pin of unblock operation;
Judge whether the unlocking pin is consistent with the screen-lock password preserved in the key files;
If it is inconsistent, the shielding unblock operation.
If relative to the screen locking type and the file status of key files that are stored in default storage region, smart machine
Current screen locking type and the file status of key files do not change, then mean that the file for preserving screen-lock password does not have
Have and be deleted or be replaced by alternative document, i.e., smart machine is not cracked or invades, at this moment again by unblock operation institute
The unlocking pin of input is compared with screen-lock password, if inconsistent, still not unlocks.
In step S104, if the screen locking preserved in the current screen locking type of smart machine and the default storage region
Type-Inconsistencies, the then screen locking function of representing smart machine is possible to be cracked or is broken into, and now shields the unblock behaviour
Make, it is ensured that the safety of data in smart machine.
As one preferred embodiment, the screen locking for judging the unlocking pin and preservation in the key files
After the whether consistent step of password, comprise the following steps:
If the unlocking pin is consistent with the screen-lock password preserved in the key files, smart machine is unlocked.
If relative to the screen locking type and the file status of key files that are stored in default storage region, smart machine
Current screen locking type and the file status of key files do not change, then mean that the file for preserving screen-lock password does not have
Have and be deleted or be replaced by alternative document, i.e., smart machine is not cracked or invades, at this moment again by unblock operation institute
The unlocking pin of input is compared with screen-lock password, if unanimously, be unlocked.The present invention is so enabled to be applied to
Various smart machines, especially smart mobile phone, obtain wider application.
As one preferred embodiment, after the step of shielding unblock is operated, comprise the following steps:
Receive the short message that default non-native contact person sends;
If the content of the short message for receiving is consistent with the content of default unblock short message, release to the unblock behaviour
The shielding of work is simultaneously unlocked to smart machine.
After unblock operation is by shielding, screen lock state is kept, the short message that can be sent by default non-native contact person
Mode be unlocked.The safety of data is so both ensure that significantly, can still can in the case where user forgets Password again
Enough unblocks, realize taking into account for security and flexibility.
As one preferred embodiment, the smart machine is smart mobile phone.
Smart mobile phone is provided with screen locking function substantially, and situation about being cracked often occurs.The present invention is in intelligent hand
Machine field will have broad application prospects.
Data guard method of the present invention based on screen locking is described in detail with reference to a specific embodiment:
During screen-lock password and unblock are set, add and obtain and judge screen locking type, the function of key file status,
Specific process description is as follows:
Screen-lock password flow is set:
Obtain the data and screen locking type of the password for setting;
Obtain the key file status of correspondence screen locking type;
Storage is encrypted to code data;
Individually stored after screen locking type is encoded with key file status;
Unblock flow:
1. the screen locking type and the current screen locking type of system of storage are obtained;
2. if judging, mobile phone is not provided with screen locking, goes to 9;If screen lock state changes, 10 are gone to;Otherwise then after
It is continuous;
3. the key file status and the current key file status of system of storage are obtained;
4., if key file status change (no longer existing, file size is abnormal, timestamp changes), 10 are gone to;Otherwise
Then continue;
5. the data of user's unlocking pin are obtained;
6. pair data are encrypted;
7. encrypted result is contrasted with the key files of storage in mobile phone;
8. unanimously then unlock, otherwise unblock failure;
9. unblock enters mobile phone desktop;
10. screen lock state, and shielding Password Input are kept, and the short message that can only be sent by default non-native contact person is entered
Row unblock.
Setting screen-lock password and when encrypting storage, record screen locking type, key file status (whether there is, file it is long
Degree, timestamp), during unblock, judge whether extremely (file does not exist corresponding key file status, file is long according to screen locking type
Degree is abnormal, document time stamp is mismatched), screen lock state, and shielding Password Input are kept under abnormality, cannot thus pass through
Delete or alternate file is cracked.
Screen locking setting up procedure record screen locking type, key file status, judge screen locking type, key file status during unblock,
, it is necessary to the short message that the non-native contact person of acceptance presupposition sends is unlocked when released state is abnormal, personal secrets are strengthened.
Fig. 2 is referred to, is the structural representation of data protecting device of the present invention based on screen locking.
Data protecting device of the present invention based on screen locking, including acquisition module 201, preserving module 202, judge module 203
With shroud module 204;
The acquisition module 201, selected screen locking type when screen locking is set is carried out to smart machine for obtaining user;
The preserving module 202, enters for the default storage region by the screen locking type for obtaining in smart machine
Row is preserved;Wherein, the default storage region has the access rights higher than general storage area in smart machine;
The judge module 203, for when occur unblock operation when, judge the current screen locking type of smart machine with it is described
Whether the screen locking type preserved in default storage region is consistent;
If the judge module 203 judges to be preserved in the current screen locking type of smart machine and the default storage region
Screen locking Type-Inconsistencies, then the shroud module 204 be used for shield it is described unblock operation.
As one preferred embodiment, the screen locking type includes pattern screen locking, password screen locking and mixing screen locking;Its
In, the screen-lock password of the pattern screen locking is pattern, and the screen-lock password of the password screen locking is numeral, the lock of the mixing screen locking
Screen password is the combination of letter and number.
Above-mentioned three kinds of screen locking types are the most commonly used screen locking types, the present invention is had the maximum scope of application, and
Beneficial to popularization, it is easy to accomplish.Pattern screen locking refers to draw specific pattern by gesture, and pattern is often by several points institute group
Into.In password screen locking, the character for constituting screen-lock password is string number.In mixing screen locking, by the alphabetical sum of certain length
Combinatorics on words constitutes screen-lock password.Because three kinds of screen locking types are more commonly used, no longer it is described in more detail.
As one preferred embodiment, the acquisition module 201 be additionally operable to obtain user smart machine is locked
The file status of the key files that screen is generated when setting;Wherein, the key files are the file for preserving screen-lock password;
The file status of the key files include:The key files whether there is, the file size of the key files and
The timestamp of the key files.
According to the file status of key files, the storage state of key files can be grasped.If above-mentioned key files are by without authorization
When being deleted or modified, the storage state of key files can change.For example, when key files be deleted when, can detect its
No longer exist in general storage area;If be replaced, file size or timestamp can change such that it is able to know
Whether key files are maliciously tampered.
The preserving module 202 is additionally operable to the file status of the key files that will be obtained in the default storage region
Preserved.
When user carries out screen locking setting to smart machine, smart machine can automatically generate key files, be set for preserving user
Fixed screen-lock password.The data of screen-lock password are stored in key files after being encrypted according to certain AES.Key texts
Part is automatically saved in the general storage area of smart machine, by taking the smart mobile phone of android system as an example, is weighed when with ROOT
In limited time, general storage area is just may have access to, the data in key files are modified or deleted etc. operates.
The file status of key files are also carried out individually storage by screen locking setting up procedure in addition to recording screen locking type.It is logical
Chang Di, smart machine can carry out routine preservation to key files, and the file status to key files are carried out again in default storage region
Backup, has access rights and the level of security higher than general storage area in smart machine due to presetting storage region,
The file status of the key files being stored therein cannot be deleted or change.
As one preferred embodiment, the default storage region is the based non-volatile random access in smart machine
Memory.
NVRAM (Non-Volatile Random Access Memory, nonvolatile random access memory) is powered off
Remain to keep a kind of RAM of data afterwards.If generically explaining nonvolatile memory, that is, refer to after power-off, stored
The random access storage device do not lost of data.
NVRAM is transparent to user.User cannot see the data in the region, also cannot be to the data in the region
Carry out the operation such as rewriting, on ordinary meaning, only manufacturer has the access rights of NVRAM, therefore level of security is at a relatively high.Will lock
Screen type NVRAM ad hoc in smart machine be kept separately and be may insure to be changed.
When unblock operation generation has been detected, the current screen locking type of smart machine is obtained, the judge module 203 is sentenced
Whether the current screen locking type of disconnected smart machine is consistent with the screen locking type preserved in the default storage region.
By taking smart mobile phone as an example, screen locking type is stored in the corresponding database of " setting " application, is grasped when there is unblock
When making, screen locking type, namely the current screen locking type of smart machine are obtained in the corresponding database of " setting " application.
As one preferred embodiment, if the judge module 203 judges the current screen locking type of smart machine
Consistent with the screen locking type preserved in the default storage region, then the acquisition module 201 obtains the current key of smart machine
The file status of file;The judge module 203 judges that the file status of the current key files of smart machine are deposited with described presetting
Whether the file status of the key files preserved in storage area domain are consistent;If it is inconsistent, the shroud module 204 shield it is described
Unblock operation.
On the basis of being monitored to screen locking type, further the file status to key files are monitored, Neng Goujin
One step prevents the screen locking function of smart machine to be cracked or invade, it is ensured that the safety of data.
As one preferred embodiment, if the judge module 203 judges the current key files of smart machine
File status are consistent with the file status of the key files preserved in the default storage region, then the acquisition module 201 is obtained
The be input into unlocking pin of unblock operation;The judge module 203 judges the unlocking pin with preservation in the key files
Whether screen-lock password is consistent;If it is inconsistent, the shroud module 204 shields the unblock operation.
If relative to the screen locking type and the file status of key files that are stored in default storage region, smart machine
Current screen locking type and the file status of key files do not change, then mean that the file for preserving screen-lock password does not have
Have and be deleted or be replaced by alternative document, i.e., smart machine is not cracked or invades, at this moment again by unblock operation institute
The unlocking pin of input is compared with screen-lock password, if inconsistent, still not unlocks.
If the screen locking Type-Inconsistencies preserved in the current screen locking type of smart machine and the default storage region,
The screen locking function of representing smart machine is possible to be cracked or is broken into, and now shields the unblock operation, it is ensured that intelligence sets
The safety of standby middle data.
As one preferred embodiment, data protecting device of the present invention based on screen locking also includes unlocked state, such as
Really described judge module 203 judges the file status of the current key files of smart machine and preservation in the default storage region
Key files file status it is consistent, and the judge module 203 judges to be protected in the unlocking pin and the key files
The screen-lock password deposited is consistent, then the unlocked state is used to unlock smart machine.
If relative to the screen locking type and the file status of key files that are stored in default storage region, smart machine
Current screen locking type and the file status of key files do not change, then mean that the file for preserving screen-lock password does not have
Have and be deleted or be replaced by alternative document, i.e., smart machine is not cracked or invades, at this moment again by unblock operation institute
The unlocking pin of input is compared with screen-lock password, if unanimously, be unlocked.The present invention is so enabled to be applied to
Various smart machines, especially smart mobile phone, obtain wider application.
As one preferred embodiment, data protecting device of the present invention based on screen locking also includes receiver module, institute
Receiver module is stated for receiving the short message that default non-native contact person sends;If the content of the short message for receiving with it is default
Unblock short message content it is consistent, then the unlocked state is used to release the shielding to the unblock operation and smart machine is entered
Row unblock.
After unblock operation is by shielding, screen lock state is kept, the short message that can be sent by default non-native contact person
Mode be unlocked.The safety of data is so both ensure that significantly, can still can in the case where user forgets Password again
Enough unblocks, realize taking into account for security and flexibility.
As one preferred embodiment, the smart machine is smart mobile phone.
Smart mobile phone is provided with screen locking function substantially, and situation about being cracked often occurs.The present invention is in intelligent hand
Machine field will have broad application prospects.
In general, when user carries out screen locking setting to smart machine, can be automatically saved in for screen locking type by smart machine
In general storage area, for example, it is stored in smart machine with " setting " using in corresponding database.Due to smart machine
Can there are some leaks unavoidably in system, thus general storage area security do not ensure that data of the storage in it not by
Modification is deleted.Compared with general technology, data guard method of the present invention based on screen locking and the data protection based on screen locking are filled
Put, when user carries out screen locking setting, in addition to the general storage area that screen locking type is stored in into smart machine, also by user
The screen locking type of setting is individually preserved in default storage region.The screen locking type preserved in general storage area is identified as
The current screen locking type of smart machine, when there is unblock operation, the screen locking type with preservation in default storage region is compared
It is right, the unblock operation is shielded if both are inconsistent.
There are the access rights and safe level higher than general storage area in smart machine due to presetting storage region
Not, the screen locking type being stored therein cannot be deleted or change.When the file of preservation screen-lock password is by violence deletion or quilt
Alternative document is replaced, and when the screen locking type of smart machine is modified or deleted, corresponding unblock operation can be shielded, so that
Effectively prevent smart machine to be cracked, protect the safety of data.
Embodiment described above only expresses several embodiments of the invention, and its description is more specific and detailed, but simultaneously
Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Shield scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. a kind of data guard method based on screen locking, it is characterised in that comprise the following steps:
Obtaining user carries out selected screen locking type when screen locking is set to smart machine;
Default storage region of the screen locking type for obtaining in smart machine is preserved;Wherein, the default storage
Region has the access rights higher than general storage area in smart machine;
When there is unblock operation, the screen locking of the current screen locking type of smart machine and preservation in the default storage region is judged
Whether type is consistent;
If the current screen locking type of smart machine and the screen locking Type-Inconsistencies of preservation in the default storage region, shield
The unblock operation.
2. the data guard method based on screen locking according to claim 1, it is characterised in that the acquisition user is to intelligence
After the step of equipment carries out selected screen locking type when screen locking is set, comprise the following steps:
Acquisition user carries out the file status of the key files generated when screen locking is set to smart machine;Wherein, the key texts
Part is the file for preserving screen-lock password;
The file status of the key files for obtaining are preserved in the default storage region.
3. the data guard method based on screen locking according to claim 2, it is characterised in that the judgement smart machine is worked as
After the preceding screen locking type step whether consistent with the screen locking type preserved in the default storage region, including following step
Suddenly:
If the current screen locking type of smart machine is consistent with the screen locking type preserved in the default storage region, intelligence is obtained
The file status of the current key files of energy equipment;
Judge the file status of the current key files of smart machine and the text of the key files of preservation in the default storage region
Whether part state is consistent;
If it is inconsistent, the shielding unblock operation.
4. the data guard method based on screen locking according to claim 3, it is characterised in that the judgement smart machine is worked as
The file status of the preceding key files step whether consistent with the file status of the key files preserved in the default storage region
After rapid, comprise the following steps:
If the text of the key files preserved in the file status of the current key files of smart machine and the default storage region
Part state consistency, then obtain the be input into unlocking pin of unblock operation;
Judge whether the unlocking pin is consistent with the screen-lock password preserved in the key files;
If it is inconsistent, the shielding unblock operation.
5. the data guard method based on screen locking according to claim 4, it is characterised in that the judgement unblock is close
After the code step whether consistent with the screen-lock password preserved in the key files, comprise the following steps:
If the unlocking pin is consistent with the screen-lock password preserved in the key files, smart machine is unlocked.
6. according to the data guard method based on screen locking that one of claim 1 to 5 is described, it is characterised in that the acquisition is used
Family smart machine is carried out screen locking set when selected screen locking type the step of in, the screen locking type include pattern screen locking,
Password screen locking and mixing screen locking;Wherein, the screen-lock password of the pattern screen locking is pattern, and the screen-lock password of the password screen locking is
Numeral, the screen-lock password of the mixing screen locking is the combination of letter and number.
7. the data guard method based on screen locking according to claim 2, it is characterised in that the acquisition user is to intelligence
In the step of equipment carries out the file status of the key files generated when screen locking is set, the file status bag of the key files
Include:The key files whether there is, the timestamp of the file size of the key files and the key files.
8. the data guard method based on screen locking according to claim 4, it is characterised in that the shielding unblock behaviour
After the step of making, comprise the following steps:
Receive the short message that default non-native contact person sends;
If the content of the short message for receiving is consistent with the content of default unblock short message, release to the unblock operation
Shield and smart machine is unlocked.
9. according to the data guard method based on screen locking that one of claim 1 to 5 is described, it is characterised in that described presetting is deposited
Storage area domain is the nonvolatile random access memory in smart machine.
10. a kind of data protecting device based on screen locking, it is characterised in that including acquisition module, preserving module, judge module and
Shroud module;
The acquisition module, selected screen locking type when screen locking is set is carried out to smart machine for obtaining user;
The preserving module, is preserved for the default storage region by the screen locking type for obtaining in smart machine;
Wherein, the default storage region has the access rights higher than general storage area in smart machine;
The judge module, for when there is unblock operation, judging that the current screen locking type of smart machine is deposited with described presetting
Whether the screen locking type preserved in storage area domain is consistent;
If the judge module judges the screen locking of the current screen locking type of smart machine and preservation in the default storage region
Type-Inconsistencies, then the shroud module is for shielding the unblock operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410425084.3A CN104182667B (en) | 2014-08-26 | 2014-08-26 | Data guard method and device based on screen locking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410425084.3A CN104182667B (en) | 2014-08-26 | 2014-08-26 | Data guard method and device based on screen locking |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104182667A CN104182667A (en) | 2014-12-03 |
CN104182667B true CN104182667B (en) | 2017-06-16 |
Family
ID=51963700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410425084.3A Expired - Fee Related CN104182667B (en) | 2014-08-26 | 2014-08-26 | Data guard method and device based on screen locking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104182667B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100480A (en) * | 2015-07-29 | 2015-11-25 | 北京天宇朗通通信设备股份有限公司 | Unlocking method of terminal, and terminal |
CN107169328A (en) * | 2017-05-15 | 2017-09-15 | 青岛海信移动通信技术股份有限公司 | The method to set up and device of clean boot function |
CN110971741A (en) * | 2018-09-29 | 2020-04-07 | 深圳市诚壹科技有限公司 | Management method and management device for screen locking password and terminal |
CN110727940A (en) * | 2019-09-20 | 2020-01-24 | Oppo(重庆)智能科技有限公司 | Electronic equipment password management method, device, equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495741A (en) * | 2011-11-17 | 2012-06-13 | 深圳市中兴移动通信有限公司 | Touch screen equipment unlocking mode management device, system and management method |
CN103139353A (en) * | 2013-01-28 | 2013-06-05 | 广东欧珀移动通信有限公司 | Lock unlocking method and lock unlocking device of mobile terminal |
CN103761078A (en) * | 2013-11-02 | 2014-04-30 | 希姆通信息技术(上海)有限公司 | Unlocking method and system for intelligent terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9372978B2 (en) * | 2012-01-20 | 2016-06-21 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
-
2014
- 2014-08-26 CN CN201410425084.3A patent/CN104182667B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495741A (en) * | 2011-11-17 | 2012-06-13 | 深圳市中兴移动通信有限公司 | Touch screen equipment unlocking mode management device, system and management method |
CN103139353A (en) * | 2013-01-28 | 2013-06-05 | 广东欧珀移动通信有限公司 | Lock unlocking method and lock unlocking device of mobile terminal |
CN103761078A (en) * | 2013-11-02 | 2014-04-30 | 希姆通信息技术(上海)有限公司 | Unlocking method and system for intelligent terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104182667A (en) | 2014-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101079882B (en) | Posture-based data protection | |
CN101430752B (en) | Sensitive data switching control module and method for computer and movable memory device | |
CN102034052B (en) | Operation system architecture based on separation of permissions and implementation method thereof | |
CN104182667B (en) | Data guard method and device based on screen locking | |
CN101923678A (en) | Data security protection method of enterprise management software | |
CN105740725A (en) | File protection method and system | |
CN103065100A (en) | Container-based method of users to protect private data | |
CN103138927B (en) | A kind of for key controlling method in the encrypted memory device of finger print identifying | |
CN102799831B (en) | Information safety protection system of application system based on database and information safety protection method | |
CN104102595A (en) | High security removable storage device | |
US9292681B2 (en) | Password audit system | |
KR101414580B1 (en) | A Secured Linux Operationg System Using Multi-level Security | |
CN110995657A (en) | Data access method, server and system based on data label | |
CN106650355A (en) | Method and device for protecting function call | |
CN104091119A (en) | Mobile terminal as well as protection method and protection system of data in mobile terminal | |
CN102799539A (en) | Safe USB flash disk and data active protection method thereof | |
CN104778954B (en) | A kind of CD subregion encryption method and system | |
CN103268435A (en) | Intranet license generation method and system, and intranet license protection method and system | |
CN103970540B (en) | Key Functions secure calling method and device | |
CN103745166A (en) | Method and device for inspecting file attribute value | |
CN107563221A (en) | A kind of certification decoding security management system for encrypting database | |
CN104376270A (en) | File protection method and system | |
CN101308700A (en) | Divulging secret prevention U disk | |
CN104732160B (en) | A kind of control method for preventing from divulging a secret inside database information | |
CN116821928A (en) | Method and system for improving internal data security of power edge computing chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170616 |
|
CF01 | Termination of patent right due to non-payment of annual fee |