CN104182667B - Data guard method and device based on screen locking - Google Patents

Data guard method and device based on screen locking Download PDF

Info

Publication number
CN104182667B
CN104182667B CN201410425084.3A CN201410425084A CN104182667B CN 104182667 B CN104182667 B CN 104182667B CN 201410425084 A CN201410425084 A CN 201410425084A CN 104182667 B CN104182667 B CN 104182667B
Authority
CN
China
Prior art keywords
screen locking
smart machine
screen
locking type
key files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410425084.3A
Other languages
Chinese (zh)
Other versions
CN104182667A (en
Inventor
邵强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201410425084.3A priority Critical patent/CN104182667B/en
Publication of CN104182667A publication Critical patent/CN104182667A/en
Application granted granted Critical
Publication of CN104182667B publication Critical patent/CN104182667B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of data guard method based on screen locking, including:Obtaining user carries out selected screen locking type when screen locking is set to smart machine;Default storage region of the screen locking type for obtaining in smart machine is preserved;When there is unblock operation, judge whether the current screen locking type of smart machine is consistent with the screen locking type preserved in the default storage region;If the current screen locking type of smart machine and the screen locking Type-Inconsistencies of preservation in the default storage region, shield the unblock operation.Additionally, also disclosing a kind of data protecting device based on screen locking.Using data guard method and device of the present invention based on screen locking; when the file for preserving screen-lock password is deleted by violence or is replaced by alternative document; when the screen locking type of smart machine is modified or deleted; corresponding unblock operation can be shielded; it is cracked so as to effectively prevent smart machine, protects the safety of data.

Description

Data guard method and device based on screen locking
Technical field
The present invention relates to Data Protection Technologies field, more particularly to a kind of data guard method and a kind of base based on screen locking In the data protecting device of screen locking.
Background technology
For smart machine, its data is effectively protected extremely important.Current most of smart electronicses Equipment is provided with the function of screen locking, when user produces requirements for access, it is necessary to be first unlocked to smart machine, so as to one Determine to be realized in degree the information security function of smart machine.By taking the smart mobile phone of android system as an example, screen locking function is added Purpose be to protect the personal secrets of user.The screen locking of smart mobile phone is by being stored in intelligence after encryption by screen-lock password In certain file under certain catalogue of mobile phone, namely the file for preserving screen-lock password.In releasing process, the application of smart mobile phone The system password be input into unblock operation carries out same cryptographic calculation and is contrasted with the encryption information for being preserved, if Comparing result is unanimously then unlocked to smart mobile phone.
Although above-mentioned practices well meets the information security demand of smart mobile phone to a certain extent, but if preserving screen locking The file of password is deleted or be replaced by alternative document by violence, then screen-lock password is just eliminated or becomes known close Code, so that original password failure.Therefore, current smart machine still has very big leakage in terms of to its data protection Hole.
The content of the invention
Based on this, the invention provides a kind of data guard method based on screen locking.
A kind of data guard method based on screen locking, comprises the following steps:
Obtaining user carries out selected screen locking type when screen locking is set to smart machine;
Default storage region of the screen locking type for obtaining in smart machine is preserved;Wherein, it is described default Storage region has the access rights higher than general storage area in smart machine;
When there is unblock operation, judge the current screen locking type of smart machine with preservation in the default storage region Whether screen locking type is consistent;
If the screen locking Type-Inconsistencies preserved in the current screen locking type of smart machine and the default storage region, The shielding unblock operation.
A kind of data protecting device based on screen locking, including acquisition module, preserving module, judge module and shroud module;
The acquisition module, selected screen locking type when screen locking is set is carried out to smart machine for obtaining user;
The preserving module, is protected for the default storage region by the screen locking type for obtaining in smart machine Deposit;Wherein, the default storage region has the access rights higher than general storage area in smart machine;
The judge module, for when there is unblock operation, judging that the current screen locking type of smart machine is pre- with described If whether the screen locking type preserved in storage region is consistent;
If the judge module judges the current screen locking type of smart machine with preservation in the default storage region Screen locking Type-Inconsistencies, then the shroud module is for shielding the unblock operation.
In general, when user carries out screen locking setting to smart machine, can be automatically saved in for screen locking type by smart machine In general storage area, for example, it is stored in smart machine with " setting " using in corresponding database.Due to smart machine Can there are some leaks unavoidably in system, thus general storage area security do not ensure that data of the storage in it not by Modification is deleted.
Compared with general technology, the present invention is based on the data guard method and the data protecting device based on screen locking of screen locking, When user carries out screen locking setting, in addition to the general storage area that screen locking type is stored in into smart machine, also user is set The screen locking type put individually is preserved in default storage region.The screen locking type preserved in general storage area is identified as intelligence The current screen locking type of energy equipment, when there is unblock operation, the screen locking type with preservation in default storage region is compared, The unblock operation is shielded if both are inconsistent.
There are the access rights and safe level higher than general storage area in smart machine due to presetting storage region Not, the screen locking type being stored therein cannot be deleted or change.When the file of preservation screen-lock password is by violence deletion or quilt Alternative document is replaced, and when the screen locking type of smart machine is modified or deleted, corresponding unblock operation can be shielded, so that Effectively prevent smart machine to be cracked, protect the safety of data.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of data guard method of the present invention based on screen locking;
Fig. 2 is the structural representation of data protecting device of the present invention based on screen locking.
Specific embodiment
It is below in conjunction with the accompanying drawings and preferably real further to illustrate the effect of the technological means taken of the invention and acquirement Example is applied, to technical scheme, clear and complete description is carried out.
Fig. 1 is referred to, is the schematic flow sheet of data guard method of the present invention based on screen locking.
Data guard method of the present invention based on screen locking, comprises the following steps:
S101 obtains user and selected screen locking type when screen locking is set is carried out to smart machine;
Default storage regions of the S102 by the screen locking type for obtaining in smart machine is preserved;Wherein, it is described Default storage region has the access rights higher than general storage area in smart machine;
S103 judges to be protected in the current screen locking type of smart machine and the default storage region when there is unblock operation Whether the screen locking type deposited is consistent;
If the current screen locking type of S104 smart machines differs with the screen locking type of preservation in the default storage region Cause, then shield the unblock operation.
It refers to that the screen of smart machine is locked that the screen locking is set, and sets screen-lock password;When screen is locked Afterwards, it is necessary to being unlocked operation could return to the system application interface of smart machine.
The general storage area refers to the conventional storage region in smart machine, for example, correspond to the data of every application Storehouse, including database corresponding with the function such as " setting ", " calendar ", " photo ", " social software ".With the intelligence of android system As a example by energy mobile phone, when with ROOT authorities, general storage area is just may have access to, data therein are modified or deleted Operation.Wherein, ROOT is present in unix system (such as AIX, BSD) and class unix system (such as Debian, Redhat, Ubuntu Deng the linux system and android system of version) in, power user is generally designated as root, equivalent to Windows systems In Administrator.Root is unique power user in system, with all of authority in system, such as starts or stops Only a process, deletes or increases user, increases or disable hardware etc..
In step S101, when user carries out screen locking setting to smart machine, smart machine can automatically protect screen locking type Exist in general storage area, for example, be stored in smart machine with " setting " using in corresponding database.Into corresponding Database, can obtain user carries out selected screen locking type when screen locking is set to smart machine.
As one preferred embodiment, the acquisition user carries out selected lock when screen locking is set to smart machine In the step of screen type, the screen locking type includes pattern screen locking, password screen locking and mixing screen locking;Wherein, the pattern screen locking Screen-lock password be pattern, the screen-lock password of the password screen locking is numeral, the screen-lock password of the mixing screen locking for letter and Number combinatorics on words.
Above-mentioned three kinds of screen locking types are the most commonly used screen locking types, the present invention is had the maximum scope of application, and Beneficial to popularization, it is easy to accomplish.Pattern screen locking refers to draw specific pattern by gesture, and pattern is often by several points institute group Into.In password screen locking, the character for constituting screen-lock password is string number.In mixing screen locking, by the alphabetical sum of certain length Combinatorics on words constitutes screen-lock password.Because three kinds of screen locking types are more commonly used, no longer it is described in more detail.
As one preferred embodiment, the acquisition user carries out selected lock when screen locking is set to smart machine After the step of screen type, comprise the following steps:
Acquisition user carries out the file status of the key files generated when screen locking is set to smart machine;Wherein, it is described Key files are the file for preserving screen-lock password;
The file status of the key files for obtaining are preserved in the default storage region.
When user carries out screen locking setting to smart machine, smart machine can automatically generate key files, be set for preserving user Fixed screen-lock password.The data of screen-lock password are stored in key files after being encrypted according to certain AES.Key texts Part is automatically saved in the general storage area of smart machine, by taking the smart mobile phone of android system as an example, is weighed when with ROOT In limited time, general storage area is just may have access to, the data in key files are modified or deleted etc. operates.
The file status of key files are also carried out individually storage by screen locking setting up procedure in addition to recording screen locking type.It is logical Chang Di, smart machine can carry out routine preservation to key files, and the file status to key files are carried out again in default storage region Backup, has access rights and the level of security higher than general storage area in smart machine due to presetting storage region, The file status of the key files being stored therein cannot be deleted or change.
As one preferred embodiment, the acquisition user carries out what is generated when screen locking is set to smart machine In the step of file status of key files, the file status of the key files include:The key files whether there is, described The timestamp of the file size of key files and the key files.
According to the file status of key files, the storage state of key files can be grasped.If above-mentioned key files are by without authorization When being deleted or modified, the storage state of key files can change.For example, when key files be deleted when, can detect its No longer exist in general storage area;If be replaced, file size or timestamp can change such that it is able to know Whether key files are maliciously tampered.
In step s 102, the screen locking type for obtaining is preserved in default storage region.Described presetting is deposited Storage area domain has the access rights higher than general storage area in smart machine.
As one preferred embodiment, the default storage region is the based non-volatile random access in smart machine Memory.
NVRAM (Non-Volatile Random Access Memory, nonvolatile random access memory) is powered off Remain to keep a kind of RAM of data afterwards.If generically explaining nonvolatile memory, that is, refer to after power-off, stored The random access storage device do not lost of data.
NVRAM is transparent to user.User cannot see the data in the region, also cannot be to the data in the region Carry out the operation such as rewriting, on ordinary meaning, only manufacturer has the access rights of NVRAM, therefore level of security is at a relatively high.Will lock Screen type NVRAM ad hoc in smart machine be kept separately and be may insure to be changed.
In step s 103, when unblock operation generation has been detected, the current screen locking type of smart machine is obtained, and sentence Whether the current screen locking type of disconnected smart machine is consistent with the screen locking type preserved in the default storage region.
By taking smart mobile phone as an example, screen locking type is stored in the corresponding database of " setting " application, is grasped when there is unblock When making, screen locking type, namely the current screen locking type of smart machine are obtained in the corresponding database of " setting " application.
As one preferred embodiment, the screen locking type for judging that smart machine is current and the default memory block In domain after the whether consistent step of the screen locking type of preservation, comprise the following steps:
If the current screen locking type of smart machine is consistent with the screen locking type preserved in the default storage region, obtain Take the file status of the current key files of smart machine;
Judge the file status of the current key files of smart machine and the key files of preservation in the default storage region File status it is whether consistent;
If it is inconsistent, the shielding unblock operation.
If the current screen locking type of smart machine is consistent with the screen locking type preserved in the default storage region, anticipate Taste screen locking type and is not changed, and further obtains the file status of the current key files of smart machine, and judges intelligence The file status of the key files preserved in the file status of the current key files of equipment and the default storage region whether one Cause, if it is inconsistent, the shielding unblock operation.On the basis of being monitored to screen locking type, further to key files File status be monitored, can further prevent the screen locking function of smart machine to be cracked or invade, it is ensured that the peace of data Entirely.
As one preferred embodiment, the file status for judging the current key files of smart machine with it is described In default storage region after the whether consistent step of the file status of the key files of preservation, comprise the following steps:
If the key files preserved in the file status of the current key files of smart machine and the default storage region File status it is consistent, then obtain the be input into unlocking pin of unblock operation;
Judge whether the unlocking pin is consistent with the screen-lock password preserved in the key files;
If it is inconsistent, the shielding unblock operation.
If relative to the screen locking type and the file status of key files that are stored in default storage region, smart machine Current screen locking type and the file status of key files do not change, then mean that the file for preserving screen-lock password does not have Have and be deleted or be replaced by alternative document, i.e., smart machine is not cracked or invades, at this moment again by unblock operation institute The unlocking pin of input is compared with screen-lock password, if inconsistent, still not unlocks.
In step S104, if the screen locking preserved in the current screen locking type of smart machine and the default storage region Type-Inconsistencies, the then screen locking function of representing smart machine is possible to be cracked or is broken into, and now shields the unblock behaviour Make, it is ensured that the safety of data in smart machine.
As one preferred embodiment, the screen locking for judging the unlocking pin and preservation in the key files After the whether consistent step of password, comprise the following steps:
If the unlocking pin is consistent with the screen-lock password preserved in the key files, smart machine is unlocked.
If relative to the screen locking type and the file status of key files that are stored in default storage region, smart machine Current screen locking type and the file status of key files do not change, then mean that the file for preserving screen-lock password does not have Have and be deleted or be replaced by alternative document, i.e., smart machine is not cracked or invades, at this moment again by unblock operation institute The unlocking pin of input is compared with screen-lock password, if unanimously, be unlocked.The present invention is so enabled to be applied to Various smart machines, especially smart mobile phone, obtain wider application.
As one preferred embodiment, after the step of shielding unblock is operated, comprise the following steps:
Receive the short message that default non-native contact person sends;
If the content of the short message for receiving is consistent with the content of default unblock short message, release to the unblock behaviour The shielding of work is simultaneously unlocked to smart machine.
After unblock operation is by shielding, screen lock state is kept, the short message that can be sent by default non-native contact person Mode be unlocked.The safety of data is so both ensure that significantly, can still can in the case where user forgets Password again Enough unblocks, realize taking into account for security and flexibility.
As one preferred embodiment, the smart machine is smart mobile phone.
Smart mobile phone is provided with screen locking function substantially, and situation about being cracked often occurs.The present invention is in intelligent hand Machine field will have broad application prospects.
Data guard method of the present invention based on screen locking is described in detail with reference to a specific embodiment:
During screen-lock password and unblock are set, add and obtain and judge screen locking type, the function of key file status, Specific process description is as follows:
Screen-lock password flow is set:
Obtain the data and screen locking type of the password for setting;
Obtain the key file status of correspondence screen locking type;
Storage is encrypted to code data;
Individually stored after screen locking type is encoded with key file status;
Unblock flow:
1. the screen locking type and the current screen locking type of system of storage are obtained;
2. if judging, mobile phone is not provided with screen locking, goes to 9;If screen lock state changes, 10 are gone to;Otherwise then after It is continuous;
3. the key file status and the current key file status of system of storage are obtained;
4., if key file status change (no longer existing, file size is abnormal, timestamp changes), 10 are gone to;Otherwise Then continue;
5. the data of user's unlocking pin are obtained;
6. pair data are encrypted;
7. encrypted result is contrasted with the key files of storage in mobile phone;
8. unanimously then unlock, otherwise unblock failure;
9. unblock enters mobile phone desktop;
10. screen lock state, and shielding Password Input are kept, and the short message that can only be sent by default non-native contact person is entered Row unblock.
Setting screen-lock password and when encrypting storage, record screen locking type, key file status (whether there is, file it is long Degree, timestamp), during unblock, judge whether extremely (file does not exist corresponding key file status, file is long according to screen locking type Degree is abnormal, document time stamp is mismatched), screen lock state, and shielding Password Input are kept under abnormality, cannot thus pass through Delete or alternate file is cracked.
Screen locking setting up procedure record screen locking type, key file status, judge screen locking type, key file status during unblock, , it is necessary to the short message that the non-native contact person of acceptance presupposition sends is unlocked when released state is abnormal, personal secrets are strengthened.
Fig. 2 is referred to, is the structural representation of data protecting device of the present invention based on screen locking.
Data protecting device of the present invention based on screen locking, including acquisition module 201, preserving module 202, judge module 203 With shroud module 204;
The acquisition module 201, selected screen locking type when screen locking is set is carried out to smart machine for obtaining user;
The preserving module 202, enters for the default storage region by the screen locking type for obtaining in smart machine Row is preserved;Wherein, the default storage region has the access rights higher than general storage area in smart machine;
The judge module 203, for when occur unblock operation when, judge the current screen locking type of smart machine with it is described Whether the screen locking type preserved in default storage region is consistent;
If the judge module 203 judges to be preserved in the current screen locking type of smart machine and the default storage region Screen locking Type-Inconsistencies, then the shroud module 204 be used for shield it is described unblock operation.
As one preferred embodiment, the screen locking type includes pattern screen locking, password screen locking and mixing screen locking;Its In, the screen-lock password of the pattern screen locking is pattern, and the screen-lock password of the password screen locking is numeral, the lock of the mixing screen locking Screen password is the combination of letter and number.
Above-mentioned three kinds of screen locking types are the most commonly used screen locking types, the present invention is had the maximum scope of application, and Beneficial to popularization, it is easy to accomplish.Pattern screen locking refers to draw specific pattern by gesture, and pattern is often by several points institute group Into.In password screen locking, the character for constituting screen-lock password is string number.In mixing screen locking, by the alphabetical sum of certain length Combinatorics on words constitutes screen-lock password.Because three kinds of screen locking types are more commonly used, no longer it is described in more detail.
As one preferred embodiment, the acquisition module 201 be additionally operable to obtain user smart machine is locked The file status of the key files that screen is generated when setting;Wherein, the key files are the file for preserving screen-lock password;
The file status of the key files include:The key files whether there is, the file size of the key files and The timestamp of the key files.
According to the file status of key files, the storage state of key files can be grasped.If above-mentioned key files are by without authorization When being deleted or modified, the storage state of key files can change.For example, when key files be deleted when, can detect its No longer exist in general storage area;If be replaced, file size or timestamp can change such that it is able to know Whether key files are maliciously tampered.
The preserving module 202 is additionally operable to the file status of the key files that will be obtained in the default storage region Preserved.
When user carries out screen locking setting to smart machine, smart machine can automatically generate key files, be set for preserving user Fixed screen-lock password.The data of screen-lock password are stored in key files after being encrypted according to certain AES.Key texts Part is automatically saved in the general storage area of smart machine, by taking the smart mobile phone of android system as an example, is weighed when with ROOT In limited time, general storage area is just may have access to, the data in key files are modified or deleted etc. operates.
The file status of key files are also carried out individually storage by screen locking setting up procedure in addition to recording screen locking type.It is logical Chang Di, smart machine can carry out routine preservation to key files, and the file status to key files are carried out again in default storage region Backup, has access rights and the level of security higher than general storage area in smart machine due to presetting storage region, The file status of the key files being stored therein cannot be deleted or change.
As one preferred embodiment, the default storage region is the based non-volatile random access in smart machine Memory.
NVRAM (Non-Volatile Random Access Memory, nonvolatile random access memory) is powered off Remain to keep a kind of RAM of data afterwards.If generically explaining nonvolatile memory, that is, refer to after power-off, stored The random access storage device do not lost of data.
NVRAM is transparent to user.User cannot see the data in the region, also cannot be to the data in the region Carry out the operation such as rewriting, on ordinary meaning, only manufacturer has the access rights of NVRAM, therefore level of security is at a relatively high.Will lock Screen type NVRAM ad hoc in smart machine be kept separately and be may insure to be changed.
When unblock operation generation has been detected, the current screen locking type of smart machine is obtained, the judge module 203 is sentenced Whether the current screen locking type of disconnected smart machine is consistent with the screen locking type preserved in the default storage region.
By taking smart mobile phone as an example, screen locking type is stored in the corresponding database of " setting " application, is grasped when there is unblock When making, screen locking type, namely the current screen locking type of smart machine are obtained in the corresponding database of " setting " application.
As one preferred embodiment, if the judge module 203 judges the current screen locking type of smart machine Consistent with the screen locking type preserved in the default storage region, then the acquisition module 201 obtains the current key of smart machine The file status of file;The judge module 203 judges that the file status of the current key files of smart machine are deposited with described presetting Whether the file status of the key files preserved in storage area domain are consistent;If it is inconsistent, the shroud module 204 shield it is described Unblock operation.
On the basis of being monitored to screen locking type, further the file status to key files are monitored, Neng Goujin One step prevents the screen locking function of smart machine to be cracked or invade, it is ensured that the safety of data.
As one preferred embodiment, if the judge module 203 judges the current key files of smart machine File status are consistent with the file status of the key files preserved in the default storage region, then the acquisition module 201 is obtained The be input into unlocking pin of unblock operation;The judge module 203 judges the unlocking pin with preservation in the key files Whether screen-lock password is consistent;If it is inconsistent, the shroud module 204 shields the unblock operation.
If relative to the screen locking type and the file status of key files that are stored in default storage region, smart machine Current screen locking type and the file status of key files do not change, then mean that the file for preserving screen-lock password does not have Have and be deleted or be replaced by alternative document, i.e., smart machine is not cracked or invades, at this moment again by unblock operation institute The unlocking pin of input is compared with screen-lock password, if inconsistent, still not unlocks.
If the screen locking Type-Inconsistencies preserved in the current screen locking type of smart machine and the default storage region, The screen locking function of representing smart machine is possible to be cracked or is broken into, and now shields the unblock operation, it is ensured that intelligence sets The safety of standby middle data.
As one preferred embodiment, data protecting device of the present invention based on screen locking also includes unlocked state, such as Really described judge module 203 judges the file status of the current key files of smart machine and preservation in the default storage region Key files file status it is consistent, and the judge module 203 judges to be protected in the unlocking pin and the key files The screen-lock password deposited is consistent, then the unlocked state is used to unlock smart machine.
If relative to the screen locking type and the file status of key files that are stored in default storage region, smart machine Current screen locking type and the file status of key files do not change, then mean that the file for preserving screen-lock password does not have Have and be deleted or be replaced by alternative document, i.e., smart machine is not cracked or invades, at this moment again by unblock operation institute The unlocking pin of input is compared with screen-lock password, if unanimously, be unlocked.The present invention is so enabled to be applied to Various smart machines, especially smart mobile phone, obtain wider application.
As one preferred embodiment, data protecting device of the present invention based on screen locking also includes receiver module, institute Receiver module is stated for receiving the short message that default non-native contact person sends;If the content of the short message for receiving with it is default Unblock short message content it is consistent, then the unlocked state is used to release the shielding to the unblock operation and smart machine is entered Row unblock.
After unblock operation is by shielding, screen lock state is kept, the short message that can be sent by default non-native contact person Mode be unlocked.The safety of data is so both ensure that significantly, can still can in the case where user forgets Password again Enough unblocks, realize taking into account for security and flexibility.
As one preferred embodiment, the smart machine is smart mobile phone.
Smart mobile phone is provided with screen locking function substantially, and situation about being cracked often occurs.The present invention is in intelligent hand Machine field will have broad application prospects.
In general, when user carries out screen locking setting to smart machine, can be automatically saved in for screen locking type by smart machine In general storage area, for example, it is stored in smart machine with " setting " using in corresponding database.Due to smart machine Can there are some leaks unavoidably in system, thus general storage area security do not ensure that data of the storage in it not by Modification is deleted.Compared with general technology, data guard method of the present invention based on screen locking and the data protection based on screen locking are filled Put, when user carries out screen locking setting, in addition to the general storage area that screen locking type is stored in into smart machine, also by user The screen locking type of setting is individually preserved in default storage region.The screen locking type preserved in general storage area is identified as The current screen locking type of smart machine, when there is unblock operation, the screen locking type with preservation in default storage region is compared It is right, the unblock operation is shielded if both are inconsistent.
There are the access rights and safe level higher than general storage area in smart machine due to presetting storage region Not, the screen locking type being stored therein cannot be deleted or change.When the file of preservation screen-lock password is by violence deletion or quilt Alternative document is replaced, and when the screen locking type of smart machine is modified or deleted, corresponding unblock operation can be shielded, so that Effectively prevent smart machine to be cracked, protect the safety of data.
Embodiment described above only expresses several embodiments of the invention, and its description is more specific and detailed, but simultaneously Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Shield scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. a kind of data guard method based on screen locking, it is characterised in that comprise the following steps:
Obtaining user carries out selected screen locking type when screen locking is set to smart machine;
Default storage region of the screen locking type for obtaining in smart machine is preserved;Wherein, the default storage Region has the access rights higher than general storage area in smart machine;
When there is unblock operation, the screen locking of the current screen locking type of smart machine and preservation in the default storage region is judged Whether type is consistent;
If the current screen locking type of smart machine and the screen locking Type-Inconsistencies of preservation in the default storage region, shield The unblock operation.
2. the data guard method based on screen locking according to claim 1, it is characterised in that the acquisition user is to intelligence After the step of equipment carries out selected screen locking type when screen locking is set, comprise the following steps:
Acquisition user carries out the file status of the key files generated when screen locking is set to smart machine;Wherein, the key texts Part is the file for preserving screen-lock password;
The file status of the key files for obtaining are preserved in the default storage region.
3. the data guard method based on screen locking according to claim 2, it is characterised in that the judgement smart machine is worked as After the preceding screen locking type step whether consistent with the screen locking type preserved in the default storage region, including following step Suddenly:
If the current screen locking type of smart machine is consistent with the screen locking type preserved in the default storage region, intelligence is obtained The file status of the current key files of energy equipment;
Judge the file status of the current key files of smart machine and the text of the key files of preservation in the default storage region Whether part state is consistent;
If it is inconsistent, the shielding unblock operation.
4. the data guard method based on screen locking according to claim 3, it is characterised in that the judgement smart machine is worked as The file status of the preceding key files step whether consistent with the file status of the key files preserved in the default storage region After rapid, comprise the following steps:
If the text of the key files preserved in the file status of the current key files of smart machine and the default storage region Part state consistency, then obtain the be input into unlocking pin of unblock operation;
Judge whether the unlocking pin is consistent with the screen-lock password preserved in the key files;
If it is inconsistent, the shielding unblock operation.
5. the data guard method based on screen locking according to claim 4, it is characterised in that the judgement unblock is close After the code step whether consistent with the screen-lock password preserved in the key files, comprise the following steps:
If the unlocking pin is consistent with the screen-lock password preserved in the key files, smart machine is unlocked.
6. according to the data guard method based on screen locking that one of claim 1 to 5 is described, it is characterised in that the acquisition is used Family smart machine is carried out screen locking set when selected screen locking type the step of in, the screen locking type include pattern screen locking, Password screen locking and mixing screen locking;Wherein, the screen-lock password of the pattern screen locking is pattern, and the screen-lock password of the password screen locking is Numeral, the screen-lock password of the mixing screen locking is the combination of letter and number.
7. the data guard method based on screen locking according to claim 2, it is characterised in that the acquisition user is to intelligence In the step of equipment carries out the file status of the key files generated when screen locking is set, the file status bag of the key files Include:The key files whether there is, the timestamp of the file size of the key files and the key files.
8. the data guard method based on screen locking according to claim 4, it is characterised in that the shielding unblock behaviour After the step of making, comprise the following steps:
Receive the short message that default non-native contact person sends;
If the content of the short message for receiving is consistent with the content of default unblock short message, release to the unblock operation Shield and smart machine is unlocked.
9. according to the data guard method based on screen locking that one of claim 1 to 5 is described, it is characterised in that described presetting is deposited Storage area domain is the nonvolatile random access memory in smart machine.
10. a kind of data protecting device based on screen locking, it is characterised in that including acquisition module, preserving module, judge module and Shroud module;
The acquisition module, selected screen locking type when screen locking is set is carried out to smart machine for obtaining user;
The preserving module, is preserved for the default storage region by the screen locking type for obtaining in smart machine; Wherein, the default storage region has the access rights higher than general storage area in smart machine;
The judge module, for when there is unblock operation, judging that the current screen locking type of smart machine is deposited with described presetting Whether the screen locking type preserved in storage area domain is consistent;
If the judge module judges the screen locking of the current screen locking type of smart machine and preservation in the default storage region Type-Inconsistencies, then the shroud module is for shielding the unblock operation.
CN201410425084.3A 2014-08-26 2014-08-26 Data guard method and device based on screen locking Expired - Fee Related CN104182667B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410425084.3A CN104182667B (en) 2014-08-26 2014-08-26 Data guard method and device based on screen locking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410425084.3A CN104182667B (en) 2014-08-26 2014-08-26 Data guard method and device based on screen locking

Publications (2)

Publication Number Publication Date
CN104182667A CN104182667A (en) 2014-12-03
CN104182667B true CN104182667B (en) 2017-06-16

Family

ID=51963700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410425084.3A Expired - Fee Related CN104182667B (en) 2014-08-26 2014-08-26 Data guard method and device based on screen locking

Country Status (1)

Country Link
CN (1) CN104182667B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100480A (en) * 2015-07-29 2015-11-25 北京天宇朗通通信设备股份有限公司 Unlocking method of terminal, and terminal
CN107169328A (en) * 2017-05-15 2017-09-15 青岛海信移动通信技术股份有限公司 The method to set up and device of clean boot function
CN110971741A (en) * 2018-09-29 2020-04-07 深圳市诚壹科技有限公司 Management method and management device for screen locking password and terminal
CN110727940A (en) * 2019-09-20 2020-01-24 Oppo(重庆)智能科技有限公司 Electronic equipment password management method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495741A (en) * 2011-11-17 2012-06-13 深圳市中兴移动通信有限公司 Touch screen equipment unlocking mode management device, system and management method
CN103139353A (en) * 2013-01-28 2013-06-05 广东欧珀移动通信有限公司 Lock unlocking method and lock unlocking device of mobile terminal
CN103761078A (en) * 2013-11-02 2014-04-30 希姆通信息技术(上海)有限公司 Unlocking method and system for intelligent terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9372978B2 (en) * 2012-01-20 2016-06-21 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495741A (en) * 2011-11-17 2012-06-13 深圳市中兴移动通信有限公司 Touch screen equipment unlocking mode management device, system and management method
CN103139353A (en) * 2013-01-28 2013-06-05 广东欧珀移动通信有限公司 Lock unlocking method and lock unlocking device of mobile terminal
CN103761078A (en) * 2013-11-02 2014-04-30 希姆通信息技术(上海)有限公司 Unlocking method and system for intelligent terminal

Also Published As

Publication number Publication date
CN104182667A (en) 2014-12-03

Similar Documents

Publication Publication Date Title
CN101079882B (en) Posture-based data protection
CN101430752B (en) Sensitive data switching control module and method for computer and movable memory device
CN102034052B (en) Operation system architecture based on separation of permissions and implementation method thereof
CN104182667B (en) Data guard method and device based on screen locking
CN101923678A (en) Data security protection method of enterprise management software
CN105740725A (en) File protection method and system
CN103065100A (en) Container-based method of users to protect private data
CN103138927B (en) A kind of for key controlling method in the encrypted memory device of finger print identifying
CN102799831B (en) Information safety protection system of application system based on database and information safety protection method
CN104102595A (en) High security removable storage device
US9292681B2 (en) Password audit system
KR101414580B1 (en) A Secured Linux Operationg System Using Multi-level Security
CN110995657A (en) Data access method, server and system based on data label
CN106650355A (en) Method and device for protecting function call
CN104091119A (en) Mobile terminal as well as protection method and protection system of data in mobile terminal
CN102799539A (en) Safe USB flash disk and data active protection method thereof
CN104778954B (en) A kind of CD subregion encryption method and system
CN103268435A (en) Intranet license generation method and system, and intranet license protection method and system
CN103970540B (en) Key Functions secure calling method and device
CN103745166A (en) Method and device for inspecting file attribute value
CN107563221A (en) A kind of certification decoding security management system for encrypting database
CN104376270A (en) File protection method and system
CN101308700A (en) Divulging secret prevention U disk
CN104732160B (en) A kind of control method for preventing from divulging a secret inside database information
CN116821928A (en) Method and system for improving internal data security of power edge computing chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170616

CF01 Termination of patent right due to non-payment of annual fee