CN104539627B - Safety access method, device and terminal - Google Patents
Safety access method, device and terminal Download PDFInfo
- Publication number
- CN104539627B CN104539627B CN201510023929.0A CN201510023929A CN104539627B CN 104539627 B CN104539627 B CN 104539627B CN 201510023929 A CN201510023929 A CN 201510023929A CN 104539627 B CN104539627 B CN 104539627B
- Authority
- CN
- China
- Prior art keywords
- access
- password
- accessing
- input interface
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
Abstract
The invention discloses a safety access method, device and terminal. The safety access method comprises the following steps: firstly, inputting an access password of an access object into a preset password input interface, judging whether the access password is accepted in the identity verification of the access object or not, finally, if the access password is accepted in the identity verification of the access object, skipping to the access object, and awarding the access right to the access object, and if the access password is not accepted in the identity verification of the access object, rejecting accessing the access object. Protection on selection of multiple input interface layers is achieved, and an encrypted object can be relatively well protected under special conditions. At the same time, the encryption logic of a conventional encrypted object is optimized, that is, an interface for inputting the password is found from the encrypted object, the password is input and the encrypted object is accessed. Therefore, the encryption protection measures on the encrypted object are wholly improved.
Description
Technical field
The present invention relates to communication technical field, more particularly, to a kind of safety access method, device and terminal.
Background technology
In prior art, mobile device checks that the step of protected file is typically:
1st, log in protection module;
2nd, input modification logging;
3rd, check protected file.
The shortcoming that technique scheme is located is:
1st, for the periphery people being familiar with user, in daily borrow or browse user mobile device in, if knowing
Road user security module modification logging, then have higher file to lose one's way risk;
2nd, after mobile device is lost, due to there being intuitively protection module log-in interface interface, for pry privacy of user
People can be cracked using other password cracking modes, thus protected file is stolen.
Therefore, in prior art, there is encryption logic to the encryption measures of encrypted object not rigorous, there is encryption leakage
Hole, easily causes the stolen technological deficiency of encrypted object.
Content of the invention
In view of this, the technical problem to be solved in the present invention is to provide a kind of safety access method, device and terminal, to solve
Certainly in prior art, there is encryption logic to the encryption measures of encrypted object not rigorous, there is encryption leak, easily causes encryption
The stolen technological deficiency of object.
The technical scheme that present invention solution above-mentioned technical problem is adopted is as follows:
Construct a kind of safety access method, the method includes:
By accessing the access password of object needed for default password input interface typing;
Judge whether to access password by accessing the authentication of object;
If accessing password to pass through to access the authentication of object, jumping to access object, and authorizing the visit accessing object
Ask authority, if access password not passing through to access the authentication of object, denied access accesses object.
Preferably, include by before the access password of access object needed for default password input interface typing:
Setting and the access corresponding access entrance of object;
Preset application program corresponding with access entrance;
It is embedded in password input interface in the login interface of application program or interactive interface;
Access the access character of object by password input interface typing.
Preferably, specifically included by accessing the access password of object needed for default password input interface typing:
After password input interface typing accesses the access character of object, access in conjunction with the symbol analysis of default password identification
Character;
According to analysis operation, extract the access password accessing object in accessing character.
Preferably, judge to access whether password specifically includes by accessing the authentication of object:
The access password of the access extracted object is transmitted to access object by encrypted tunnel;
Judge whether to access password by accessing the authentication of object.
Preferably, passing through to access the authentication of object if accessing password, jumping to access object, and it is right to authorize access
The access rights of elephant, if access password not passing through to access the authentication of object, denied access accesses object and further includes:
If access password not passing through to access the authentication of object, and after denied access access object, normally accessing and visiting
Ask entrance corresponding application program.
The invention allows for a kind of secure access device, this device includes:
Access password typing module, for close by accessing the access of object needed for default password input interface typing
Code;
Access password authentication module, for judging whether to access password by accessing the authentication of object;
Secure access performing module, if passing through to access the authentication of object for accessing password, jumps to access right
As, and authorize the access rights accessing object, if access password not passing through to access the authentication of object, denied access accesses
Object.
Preferably, this device also includes input interface setup module, and input interface setup module includes access entrance setting
Unit, application program arranging unit, input interface embedded unit and password typing unit, wherein,
Access entrance arranging unit is used for arranging access entrance corresponding with accessing object;
Application program arranging unit is used for presetting application program corresponding with access entrance;
Input interface embedded unit is used for being embedded in password input interface in the login interface of application program or interactive interface;
Password typing unit is used for accessing the access character of object by password input interface typing.
Preferably, access password typing module to include accessing character analytic unit and access code extraction unit, wherein,
Access character analytic unit and be used for after password input interface typing accesses the access character of object, in conjunction with default
Password identification symbol analysis access character;
Access code extraction unit to be used for, according to analysis operation, extracting the access password accessing object in accessing character.
Preferably, access password authentication module to include accessing password transmission unit and identity authenticating unit, wherein,
Access password transmission unit to be used for transmitting to access the access password of the access extracted object by encrypted tunnel
Object;
Identity authenticating unit is used for judging whether to access password by accessing the authentication of object;
Secure access performing module also includes denied access performance element, if denied access performance element is used for accessing password
Do not pass through to access the authentication of object, and after denied access access object, normally access application journey corresponding with access entrance
Sequence.
The invention allows for a kind of have secure access to terminal, this terminal includes above-mentioned secure access device.
Implement the present invention, first, by accessing the access password of object needed for default password input interface typing, so
Afterwards, judge whether to access password by accessing the authentication of object, finally, if access password testing by the identity accessing object
Card, then jump to access object, and authorize the access rights accessing object, if access password being tested by the identity accessing object
Card, then denied access access object.The protection having achieved layer inputting interface many and selecting, in particular cases to encrypted object
There is more preferable protection.Such as, if after user's loss password, even if the second people obtains or knows the password of user, if but not
Know that interface for password input is also to have no way of accessing encrypted object.The safety making encrypted object is further lifted.
Meanwhile, also optimize the encryption logic of existing encrypted object, that is, from encrypted object, the interface of finding typing password, typing close
The encrypted encrypted object of code, access.Thus enhancing the encryption protection measure to encrypted object on the whole.
Brief description
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the flow chart of safety access method proposed by the present invention;
Fig. 2 is the flow chart of the safety access method that the present invention second preferred embodiment proposes;
Fig. 3 is the flow chart of the safety access method that the present invention the 3rd preferred embodiment proposes;
Fig. 4 is the flow chart of the safety access method that the present invention the 4th preferred embodiment proposes;
Fig. 5 is the flow chart of the safety access method that the present invention the 5th preferred embodiment proposes;
Fig. 6 is the structured flowchart of secure access device proposed by the present invention.
Specific embodiment
In order that the technical problem to be solved, technical scheme and beneficial effect are clearer, clear, below tie
Close drawings and Examples, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only
In order to explain the present invention, it is not intended to limit the present invention.
Embodiment one
Fig. 1 is the flow chart of safety access method proposed by the present invention.The method includes:
S1, by accessing the access password of object needed for default password input interface typing.It is appreciated that the present embodiment
The safety access method being proposed has the smart machine of encryption function be applied to smart mobile phone, panel computer etc..
For example, embedded third party application is as password input interface, such as computer, note, input method, dialing interface
Deng, specifically, for example, be arranged on dialing interface, then can be to the input character string capture of dialing interface.Setting simultaneously logs in close
Code, wherein, modification logging is in order to the character string that the embedded program of setting is captured carries out checking coupling.
S2, judges whether to access password by accessing the authentication of object.
As above, described in example, by the setting of above-mentioned steps S1, checking coupling is carried out to capture character string.For example, embedded
Program is password input interface, and the modification logging arranging is * #110#.So, when user is close in dialing interface input login
Code is to judge whether this login password is identical with * #110#, if identical, passes through authentication, otherwise refusal is tested by identity
Card.
S3, if access password passing through to access the authentication of object, jumping to access object, and authorizing access object
Access rights, if access password not passing through to access the authentication of object, denied access accesses object.As above, described in example, lead to
Cross the setting of above-mentioned steps S1, checking coupling is carried out to capture character string.For example, embedded program be password input interface, and
And the modification logging arranging is * #110#.So, when user inputs * #110# and passes through authentication in password input interface,
Program can automatic jump to password typing success interface or select to enter the interface checking encrypted object.If coupling does not become
Work(, then be still trapped in dialing interface, and dial-up program normally runs.
The having the beneficial effects that of the present embodiment, first, by accessing object needed for default password input interface typing
Access password, then, judge whether to access password by accessing the authentication of object, finally, if access password to pass through to access
The authentication of object, then jump to access object, and authorize the access rights accessing object, if access password not passing through to access
The authentication of object, then denied access access object.The protection having achieved layer inputting interface many and selecting, for special circumstances
Under have more preferable protection to encrypted object.Such as, if after user's loss password, even if the second people obtains or knows user's
Password, if but do not know that interface for password input is also to have no way of accessing encrypted object.The safety making encrypted object is more entered
The lifting of one step.Meanwhile, also optimize the encryption logic of existing encrypted object, that is, from encrypted object, find typing password
The encrypted encrypted object of interface, typing password, access.Thus enhance the encryption protection to encrypted object on the whole arranging
Apply.
Embodiment two
Fig. 2 is the flow chart of the safety access method that the present invention second preferred embodiment proposes.Based on above-described embodiment one,
Include by before the access password of access object needed for default password input interface typing:
S01, setting and the access corresponding access entrance of object.As above, described in example, during initialization, setting needs embedded monitoring
The third-party application of incoming event.
S02, presets application program corresponding with access entrance.For example, to the event meeting setting condition, carry out redirecting setting
Put.Specifically, when the third-party application opened is correct, and when the password that inputs is correct, encrypted object can be jumped to immediately
Access interface.
S03, is embedded in password input interface in the login interface of application program or interactive interface.As above described in example, permissible
It is embedded in password input interface in the login interface of third party application or interactive interface.
S04, accesses the access character of object by password input interface typing.By the capture input of password input interface
Character string.
The having the beneficial effects that of the present embodiment, by setting with access the corresponding access entrance of object, preset with access into
The corresponding application program of mouth, then, is embedded in password input interface in the login interface of application program or interactive interface, finally,
Access the access character of object by password input interface typing.Achieve the accurate acquisition to the access character accessing object,
Simultaneously it is ensured that to the secret protection accessing character acquisition interface accessing object, further strengthening and accessing object
Access the security guarantee in character Input Process.
Embodiment three
Fig. 3 is the flow chart of the safety access method that the present invention the 3rd preferred embodiment proposes.Based on above-described embodiment one
With embodiment two, specifically included by accessing the access password of object needed for default password input interface typing:
S11, after password input interface typing accesses the access character of object, accords with analysis in conjunction with default password identification
Access character.
Further, pre-set password identification symbol, accord with the access character of analysis typing by password identification.In order to avoid
The typing character of the access character and embedded program of typing itself occurs logic to conflict, therefore, setting password identification symbol, then permissible
Any access character setting simultaneously typing is reversely analyzed.
S12, according to analysis operation, extracts the access password accessing object in accessing character.By above-mentioned analysis operation,
Obtain the access password accessing object.
Further, above-mentioned default password identification accords with the key informations such as the private key that can be to be distributed by high in the clouds.
The having the beneficial effects that of the present embodiment, after password input interface typing accesses the access character of object, in conjunction with
Default password identification symbol analysis accesses character, then, according to analysis operation, extracts the access accessing object in accessing character
Password.Achieve the accurate acquisition to the access password accessing in character, be the identity of the access password in subsequent access character
Verification operation provides accurate judgement basis.
Example IV
Fig. 4 is the flow chart of the safety access method that the present invention the 4th preferred embodiment proposes.Based on above-described embodiment one
To embodiment three, judge to access whether password specifically includes by accessing the authentication of object:
S21, the access password of the access extracted object is transmitted to access object by encrypted tunnel.As above described in example,
After completing embedded third-party application as password input interface, the encryption set up between encrypted object and third-party application is led to
Road, is transmitted accessing password to access object by encrypted tunnel.
S22, execution judges whether to access password by accessing the authentication operation of object.Specifically judge process is as above
Example is described, will not be described here.
The having the beneficial effects that of the present embodiment, by transmitting the access password of the access extracted object by encrypted tunnel
To accessing object, then judge whether to access password by accessing the authentication of object.Thus ensure that access password is passing
Will not be stolen during defeated and usurp, further strengthen the security reliability by accessing password authentification encrypted object.
Embodiment five
Fig. 5 is the flow chart of the safety access method that the present invention the 5th preferred embodiment proposes.Based on above-described embodiment one
To example IV, if access password passing through to access the authentication of object, jumping to access object, and authorizing access object
Access rights, if access password not passing through to access the authentication of object, denied access accesses object and further includes:
S31, if access password not passing through to access the authentication of object, and after denied access access object, normal access
Application program corresponding with access entrance.As above described in example, if above-mentioned access password match is unsuccessful, it is by accessing object
Authentication, then will be trapped in dialing interface, and dial-up program will normally run.
The having the beneficial effects that of the present embodiment, if by judging that accessing password does not pass through to access the authentication of object, and
After denied access accesses object, normally access application program corresponding with access entrance.On the one hand, protect to work as and access password not
By during the authentication that accesses object, to the protection accessing object accesses authorities, on the other hand, it is to avoid access the interior of object
Hold leakage.
Implement the safety access method of the present invention, first, by accessing object needed for default password input interface typing
Access password, then, judge to access password whether by accessing the authentication of object, finally, if access password to pass through to visit
Ask the authentication of object, then jump to access object, and authorize the access rights accessing object, if access password not passing through to visit
Ask the authentication of object, then denied access accesses object.The protection having achieved layer inputting interface many and selecting, for special feelings
There is more preferable protection to encrypted object under condition.Such as, if after user's loss password, even if the second people obtains or knows user
Password, if but do not know interface for password input be also have no way of access encrypted object.The safety making encrypted object is able to more
Further lifting.Meanwhile, also optimize the encryption logic of existing encrypted object, that is, from encrypted object, find typing password
Interface, typing password, access encrypted encrypted object.Thus enhance the encryption protection to encrypted object on the whole arranging
Apply.
One of ordinary skill in the art will appreciate that it is permissible for realizing all or part of step in above-described embodiment method
The hardware being controlled correlation by program is completed, described program can in being stored in a computer read/write memory medium,
Described storage medium, such as ROM/RAM, disk, CD etc..
Embodiment six
Fig. 6 is the structured flowchart of secure access device proposed by the present invention.The invention allows for a kind of secure access dress
Put, this device includes:
Access password typing module 10, for close by accessing the access of object needed for default password input interface typing
Code;
Access password authentication module 20, for judging whether to access password by accessing the authentication of object;
Secure access performing module 30, if passing through to access the authentication of object for accessing password, jumps to access
Object, and authorize the access rights accessing object, if access password not passing through to access the authentication of object, denied access is visited
Ask object.
Further, this device also includes input interface setup module 40, input interface setup module 40 include accessing into
Mouth arranging unit 41, application program arranging unit 42, input interface embedded unit 43 and password typing unit 44, wherein,
Access entrance arranging unit 41 is used for arranging access entrance corresponding with accessing object;
Application program arranging unit 42 is used for presetting application program corresponding with access entrance;
Input interface embedded unit 43 is used for being embedded in password typing circle in the login interface of application program or interactive interface
Face;
Password typing unit 444 is used for accessing the access character of object by password input interface typing.
Further, access password typing module 10 to include accessing character analytic unit 11 and access code extraction unit
12, wherein,
Access character analytic unit 11 and be used for after password input interface typing accesses the access character of object, in conjunction with pre-
If password identification symbol analysis access character;
Access code extraction unit 12 and be used for according to analysis operation, the access of extraction access object is close in accessing character
Code.
Further, access password authentication module 20 to include accessing password transmission unit 21 and identity authenticating unit 22,
Wherein,
Access password transmission unit 21 to be used for transmitting to visit the access password of the access extracted object by encrypted tunnel
Ask object;
Identity authenticating unit 22 is used for judging whether to access password by accessing the authentication of object;
Secure access performing module 30 also includes denied access performance element 31, if denied access performance element 31 is used for visiting
After asking that password does not pass through to access the authentication of object, and denied access accesses object, normal access is corresponding with access entrance
Application program.
The invention allows for a kind of have secure access to terminal, this terminal includes above-mentioned secure access device.
This secure access device can be used for mobile phone, or has other intelligent communications ends of cryptographic authorization functions
End, such as, in smart mobile phone etc., can be operate in software unit in these communication terminals it is also possible to as independent suspension member
It is integrated in these communication terminals or runs in the application system of these mobile terminals.
It should be noted that the technical characteristic in said method embodiment is all corresponding applicable in this device, no longer heavy here
State.
Implement secure access device and the terminal of the present invention, first, by visiting needed for default password input interface typing
Asking the access password of object, then, judging whether to access password by accessing the authentication of object, finally, if accessing password
By accessing the authentication of object, then jump to access object, and authorize the access rights accessing object, if accessing password not
By accessing the authentication of object, then denied access accesses object.The protection having achieved layer inputting interface many and selecting, for
In particular cases there is more preferable protection to encrypted object.Such as, if after user's loss password, even if the second people obtains or knows
The password of road user, if but do not know that interface for password input is also to have no way of accessing encrypted object.Make the safety of encrypted object
Further lifted.Meanwhile, also optimize the encryption logic of existing encrypted object, that is, from encrypted object, find record
Enter the interface of password, typing password, access encrypted encrypted object.Thus enhancing the encryption to encrypted object on the whole
Safeguard procedures.
The preferred embodiments of the present invention above by reference to brief description, not thereby limit to the interest field of the present invention.This
Skilled person, without departing from the scope of the present invention and essence, can have multiple flexible programs to realize the present invention, for example as one
The feature of individual embodiment can be used for another embodiment and obtains another embodiment.All institutes within the technology design with the present invention
Any modification, equivalent and the improvement made, all should be within the interest field of the present invention.
Claims (10)
1. a kind of safety access method is it is characterised in that methods described includes:
By needed for default password input interface typing access object access password, wherein, default third-party should
It is embedded in described password input interface with the login interface or interactive interface of program;
Judge the described password that accesses whether by the described authentication accessing object;
If the described password that accesses, by the described authentication accessing object, jumps to described access object, and authorizes described
Access the access rights of object, if the described password that accesses, by the described authentication accessing object, is trapped in described close
Object is accessed described in code input interface denied access.
2. safety access method according to claim 1 is it is characterised in that described recorded by default password input interface
Include before the access password entering required access object:
Setting and the described access corresponding access entrance of object;
Preset application program corresponding with described access entrance;
It is embedded in described password input interface in the login interface of described application program or interactive interface;
By accessing the access character of object described in described password input interface typing.
3. safety access method according to claim 2 is it is characterised in that described recorded by default password input interface
Enter the required access password accessing object to specifically include:
After the access character accessing object described in described password input interface typing, accord with analysis in conjunction with default password identification
Described access character;
According to described analysis operation, extract the described access password accessing object in character in described access.
4. safety access method according to claim 3 is it is characterised in that described judge whether described access password passes through
The described authentication accessing object specifically includes:
The access password of the described access object of described extraction is transmitted to described access object by encrypted tunnel;
Judge the described password that accesses whether by the described authentication accessing object.
If 5. safety access method according to claim 4 is it is characterised in that described access password is by described visit
Ask the authentication of object, then jump to described access object, and authorize the described access rights accessing object, if described access
Password by the described authentication accessing object, then accesses object and further includes described in denied access:
If the described password that accesses is by the described authentication accessing object, and after access object described in denied access, normally
Access application program corresponding with described access entrance.
6. a kind of secure access device is it is characterised in that described device includes:
Access password typing module, for the access password by accessing object needed for default password input interface typing, its
In, it is embedded in described password input interface in the login interface of default third-party application program or interactive interface;
Access password authentication module, for judging the described password that accesses whether by the described authentication accessing object;
Secure access performing module, if for the described password that accesses by the described authentication accessing object, jump to institute
State access object, and authorize the described access rights accessing object, if the described password that accesses does not pass through the described body accessing object
Part checking, then be trapped in access object described in described password input interface denied access.
7. secure access device according to claim 6 is it is characterised in that also including input interface setup module, described
Input interface setup module includes access entrance arranging unit, application program arranging unit, input interface embedded unit and close
Code typing unit, wherein,
Described access entrance arranging unit is used for setting and the described access corresponding access entrance of object;
Described application program arranging unit is used for presetting application program corresponding with described access entrance;
Described input interface embedded unit is used for being embedded in described password in the login interface of described application program or interactive interface
Input interface;
Described password typing unit is used for the access character by accessing object described in described password input interface typing.
8. secure access device according to claim 7 is it is characterised in that described access password typing module includes accessing
Character analytic unit and access code extraction unit, wherein,
The described character analytic unit that accesses is used for after the access character of access object described in described password input interface typing,
Accord with conjunction with default password identification and analyze described access character;
Described access code extraction unit is used for, according to described analysis operation, extracting described access object in described access character
Access password.
9. secure access device according to claim 8 is it is characterised in that described access password authentication module includes accessing
Password transmission unit and identity authenticating unit, wherein,
Described access password transmission unit is used for passing the access password of the described access object of described extraction by encrypted tunnel
Transport to described access object;
Whether described identity authenticating unit is used for judging the described password that accesses by the described authentication accessing object;
Described secure access performing module also includes denied access performance element, if described denied access performance element is for described
Access password by the described authentication accessing object, and after accessing object described in denied access, normal access with described
The corresponding application program of access entrance.
10. a kind of secure access terminal is it is characterised in that described terminal includes the secure access described in described claim 6-9
Device.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510023929.0A CN104539627B (en) | 2015-01-16 | 2015-01-16 | Safety access method, device and terminal |
PCT/CN2015/090614 WO2016112712A1 (en) | 2015-01-16 | 2015-09-24 | Secure access method, apparatus, and terminal, storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510023929.0A CN104539627B (en) | 2015-01-16 | 2015-01-16 | Safety access method, device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104539627A CN104539627A (en) | 2015-04-22 |
CN104539627B true CN104539627B (en) | 2017-02-22 |
Family
ID=52855096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510023929.0A Active CN104539627B (en) | 2015-01-16 | 2015-01-16 | Safety access method, device and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104539627B (en) |
WO (1) | WO2016112712A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104539627B (en) * | 2015-01-16 | 2017-02-22 | 努比亚技术有限公司 | Safety access method, device and terminal |
CN105787335B (en) * | 2016-02-25 | 2019-06-18 | 东莞盛世科技电子实业有限公司 | Interface for password input method for handover control and device |
CN105704143A (en) * | 2016-03-17 | 2016-06-22 | 珠海格力电器股份有限公司 | Method and apparatus for processing playing resources |
CN108932086A (en) | 2017-05-23 | 2018-12-04 | 腾讯科技(深圳)有限公司 | Display methods, device and the storage medium of application interface |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103313238A (en) * | 2013-06-20 | 2013-09-18 | 天翼电信终端有限公司 | Safety system and safety protection method for mobile terminal |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005661B (en) * | 2006-11-15 | 2010-11-03 | 深圳凯虹移动通信有限公司 | Mobile terminal with data and menu hidden function and its enciphering hiding method |
US7941405B2 (en) * | 2007-03-30 | 2011-05-10 | Data Center Technologies | Password protection for file backups |
CN101350717B (en) * | 2007-07-18 | 2011-04-27 | 中国移动通信集团公司 | Method and system for logging on third party server through instant communication software |
CN101478595A (en) * | 2008-09-08 | 2009-07-08 | 广东南方信息安全产业基地有限公司 | Mobile communication terminal data protection method |
CN102045450A (en) * | 2011-01-12 | 2011-05-04 | 深圳桑菲消费通信有限公司 | Method for protecting mobile phone information security |
CN104217172B (en) * | 2013-06-03 | 2019-05-14 | 腾讯科技(深圳)有限公司 | Privacy content inspection method and device |
CN104008348B (en) * | 2014-04-17 | 2017-03-29 | 小米科技有限责任公司 | application control method, device and terminal |
CN104252605B (en) * | 2014-09-17 | 2017-03-15 | 南京信息工程大学 | A kind of file transparent encrypting and deciphering system of Android platform and method |
CN104539627B (en) * | 2015-01-16 | 2017-02-22 | 努比亚技术有限公司 | Safety access method, device and terminal |
-
2015
- 2015-01-16 CN CN201510023929.0A patent/CN104539627B/en active Active
- 2015-09-24 WO PCT/CN2015/090614 patent/WO2016112712A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103313238A (en) * | 2013-06-20 | 2013-09-18 | 天翼电信终端有限公司 | Safety system and safety protection method for mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
WO2016112712A1 (en) | 2016-07-21 |
CN104539627A (en) | 2015-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105205370B (en) | Mobile terminal safety means of defence and mobile terminal, security system and methods for using them | |
US9037851B2 (en) | User authentication system, user authentication apparatus, smart card, and user authentication method for ubiquitous authentication management | |
CN104539627B (en) | Safety access method, device and terminal | |
CN103377332B (en) | The method of access application and device | |
CN105554035B (en) | A kind of electronic lock system and its control method | |
CN104104673B (en) | Method for realizing security payment through third party unified dynamic authorization code | |
US10219154B1 (en) | Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network | |
US20060156395A1 (en) | Security device and terminal and method for their communication | |
CN105959287A (en) | Biological feature based safety certification method and device | |
US8839380B2 (en) | Method for the temporary personalization of a communication device | |
CN105046122B (en) | A kind of terminal system management method and terminal | |
CN106488452A (en) | A kind of mobile terminal safety access authentication method of combination fingerprint | |
CN107733868A (en) | Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium | |
CN106778138A (en) | The control method and device of software license limit | |
CN112905965B (en) | Financial big data processing system based on block chain | |
CN107295024A (en) | It is a kind of to realize the method that web front end is landed safely and accessed | |
CN103617005A (en) | Access method, device and system for intelligent card | |
CN107733636A (en) | Authentication method and Verification System | |
CN107180173A (en) | unlocking method and device | |
CN105787319A (en) | Iris recognition-based portable terminal and method for same | |
CN105871840B (en) | A kind of certificate management method and system | |
CN105069361A (en) | Safety access method and system for privacy space | |
JP4303952B2 (en) | Multiple authentication system, computer program, and multiple authentication method | |
CN106156573A (en) | A kind of method controlling intelligent terminal and the device of control intelligent terminal | |
US20140359703A1 (en) | Method for securing an action that an actuating device must carry out at the request of a user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10 Applicant after: Nubian Technologies Ltd. Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10 Applicant before: Shenzhen ZTE Mobile Tech Co., Ltd. |
|
COR | Change of bibliographic data | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |