CN104539627B - Safety access method, device and terminal - Google Patents

Safety access method, device and terminal Download PDF

Info

Publication number
CN104539627B
CN104539627B CN201510023929.0A CN201510023929A CN104539627B CN 104539627 B CN104539627 B CN 104539627B CN 201510023929 A CN201510023929 A CN 201510023929A CN 104539627 B CN104539627 B CN 104539627B
Authority
CN
China
Prior art keywords
access
password
accessing
input interface
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510023929.0A
Other languages
Chinese (zh)
Other versions
CN104539627A (en
Inventor
艾朝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201510023929.0A priority Critical patent/CN104539627B/en
Publication of CN104539627A publication Critical patent/CN104539627A/en
Priority to PCT/CN2015/090614 priority patent/WO2016112712A1/en
Application granted granted Critical
Publication of CN104539627B publication Critical patent/CN104539627B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data

Abstract

The invention discloses a safety access method, device and terminal. The safety access method comprises the following steps: firstly, inputting an access password of an access object into a preset password input interface, judging whether the access password is accepted in the identity verification of the access object or not, finally, if the access password is accepted in the identity verification of the access object, skipping to the access object, and awarding the access right to the access object, and if the access password is not accepted in the identity verification of the access object, rejecting accessing the access object. Protection on selection of multiple input interface layers is achieved, and an encrypted object can be relatively well protected under special conditions. At the same time, the encryption logic of a conventional encrypted object is optimized, that is, an interface for inputting the password is found from the encrypted object, the password is input and the encrypted object is accessed. Therefore, the encryption protection measures on the encrypted object are wholly improved.

Description

A kind of safety access method, device and terminal
Technical field
The present invention relates to communication technical field, more particularly, to a kind of safety access method, device and terminal.
Background technology
In prior art, mobile device checks that the step of protected file is typically:
1st, log in protection module;
2nd, input modification logging;
3rd, check protected file.
The shortcoming that technique scheme is located is:
1st, for the periphery people being familiar with user, in daily borrow or browse user mobile device in, if knowing Road user security module modification logging, then have higher file to lose one's way risk;
2nd, after mobile device is lost, due to there being intuitively protection module log-in interface interface, for pry privacy of user People can be cracked using other password cracking modes, thus protected file is stolen.
Therefore, in prior art, there is encryption logic to the encryption measures of encrypted object not rigorous, there is encryption leakage Hole, easily causes the stolen technological deficiency of encrypted object.
Content of the invention
In view of this, the technical problem to be solved in the present invention is to provide a kind of safety access method, device and terminal, to solve Certainly in prior art, there is encryption logic to the encryption measures of encrypted object not rigorous, there is encryption leak, easily causes encryption The stolen technological deficiency of object.
The technical scheme that present invention solution above-mentioned technical problem is adopted is as follows:
Construct a kind of safety access method, the method includes:
By accessing the access password of object needed for default password input interface typing;
Judge whether to access password by accessing the authentication of object;
If accessing password to pass through to access the authentication of object, jumping to access object, and authorizing the visit accessing object Ask authority, if access password not passing through to access the authentication of object, denied access accesses object.
Preferably, include by before the access password of access object needed for default password input interface typing:
Setting and the access corresponding access entrance of object;
Preset application program corresponding with access entrance;
It is embedded in password input interface in the login interface of application program or interactive interface;
Access the access character of object by password input interface typing.
Preferably, specifically included by accessing the access password of object needed for default password input interface typing:
After password input interface typing accesses the access character of object, access in conjunction with the symbol analysis of default password identification Character;
According to analysis operation, extract the access password accessing object in accessing character.
Preferably, judge to access whether password specifically includes by accessing the authentication of object:
The access password of the access extracted object is transmitted to access object by encrypted tunnel;
Judge whether to access password by accessing the authentication of object.
Preferably, passing through to access the authentication of object if accessing password, jumping to access object, and it is right to authorize access The access rights of elephant, if access password not passing through to access the authentication of object, denied access accesses object and further includes:
If access password not passing through to access the authentication of object, and after denied access access object, normally accessing and visiting Ask entrance corresponding application program.
The invention allows for a kind of secure access device, this device includes:
Access password typing module, for close by accessing the access of object needed for default password input interface typing Code;
Access password authentication module, for judging whether to access password by accessing the authentication of object;
Secure access performing module, if passing through to access the authentication of object for accessing password, jumps to access right As, and authorize the access rights accessing object, if access password not passing through to access the authentication of object, denied access accesses Object.
Preferably, this device also includes input interface setup module, and input interface setup module includes access entrance setting Unit, application program arranging unit, input interface embedded unit and password typing unit, wherein,
Access entrance arranging unit is used for arranging access entrance corresponding with accessing object;
Application program arranging unit is used for presetting application program corresponding with access entrance;
Input interface embedded unit is used for being embedded in password input interface in the login interface of application program or interactive interface;
Password typing unit is used for accessing the access character of object by password input interface typing.
Preferably, access password typing module to include accessing character analytic unit and access code extraction unit, wherein,
Access character analytic unit and be used for after password input interface typing accesses the access character of object, in conjunction with default Password identification symbol analysis access character;
Access code extraction unit to be used for, according to analysis operation, extracting the access password accessing object in accessing character.
Preferably, access password authentication module to include accessing password transmission unit and identity authenticating unit, wherein,
Access password transmission unit to be used for transmitting to access the access password of the access extracted object by encrypted tunnel Object;
Identity authenticating unit is used for judging whether to access password by accessing the authentication of object;
Secure access performing module also includes denied access performance element, if denied access performance element is used for accessing password Do not pass through to access the authentication of object, and after denied access access object, normally access application journey corresponding with access entrance Sequence.
The invention allows for a kind of have secure access to terminal, this terminal includes above-mentioned secure access device.
Implement the present invention, first, by accessing the access password of object needed for default password input interface typing, so Afterwards, judge whether to access password by accessing the authentication of object, finally, if access password testing by the identity accessing object Card, then jump to access object, and authorize the access rights accessing object, if access password being tested by the identity accessing object Card, then denied access access object.The protection having achieved layer inputting interface many and selecting, in particular cases to encrypted object There is more preferable protection.Such as, if after user's loss password, even if the second people obtains or knows the password of user, if but not Know that interface for password input is also to have no way of accessing encrypted object.The safety making encrypted object is further lifted. Meanwhile, also optimize the encryption logic of existing encrypted object, that is, from encrypted object, the interface of finding typing password, typing close The encrypted encrypted object of code, access.Thus enhancing the encryption protection measure to encrypted object on the whole.
Brief description
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the flow chart of safety access method proposed by the present invention;
Fig. 2 is the flow chart of the safety access method that the present invention second preferred embodiment proposes;
Fig. 3 is the flow chart of the safety access method that the present invention the 3rd preferred embodiment proposes;
Fig. 4 is the flow chart of the safety access method that the present invention the 4th preferred embodiment proposes;
Fig. 5 is the flow chart of the safety access method that the present invention the 5th preferred embodiment proposes;
Fig. 6 is the structured flowchart of secure access device proposed by the present invention.
Specific embodiment
In order that the technical problem to be solved, technical scheme and beneficial effect are clearer, clear, below tie Close drawings and Examples, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only In order to explain the present invention, it is not intended to limit the present invention.
Embodiment one
Fig. 1 is the flow chart of safety access method proposed by the present invention.The method includes:
S1, by accessing the access password of object needed for default password input interface typing.It is appreciated that the present embodiment The safety access method being proposed has the smart machine of encryption function be applied to smart mobile phone, panel computer etc..
For example, embedded third party application is as password input interface, such as computer, note, input method, dialing interface Deng, specifically, for example, be arranged on dialing interface, then can be to the input character string capture of dialing interface.Setting simultaneously logs in close Code, wherein, modification logging is in order to the character string that the embedded program of setting is captured carries out checking coupling.
S2, judges whether to access password by accessing the authentication of object.
As above, described in example, by the setting of above-mentioned steps S1, checking coupling is carried out to capture character string.For example, embedded Program is password input interface, and the modification logging arranging is * #110#.So, when user is close in dialing interface input login Code is to judge whether this login password is identical with * #110#, if identical, passes through authentication, otherwise refusal is tested by identity Card.
S3, if access password passing through to access the authentication of object, jumping to access object, and authorizing access object Access rights, if access password not passing through to access the authentication of object, denied access accesses object.As above, described in example, lead to Cross the setting of above-mentioned steps S1, checking coupling is carried out to capture character string.For example, embedded program be password input interface, and And the modification logging arranging is * #110#.So, when user inputs * #110# and passes through authentication in password input interface, Program can automatic jump to password typing success interface or select to enter the interface checking encrypted object.If coupling does not become Work(, then be still trapped in dialing interface, and dial-up program normally runs.
The having the beneficial effects that of the present embodiment, first, by accessing object needed for default password input interface typing Access password, then, judge whether to access password by accessing the authentication of object, finally, if access password to pass through to access The authentication of object, then jump to access object, and authorize the access rights accessing object, if access password not passing through to access The authentication of object, then denied access access object.The protection having achieved layer inputting interface many and selecting, for special circumstances Under have more preferable protection to encrypted object.Such as, if after user's loss password, even if the second people obtains or knows user's Password, if but do not know that interface for password input is also to have no way of accessing encrypted object.The safety making encrypted object is more entered The lifting of one step.Meanwhile, also optimize the encryption logic of existing encrypted object, that is, from encrypted object, find typing password The encrypted encrypted object of interface, typing password, access.Thus enhance the encryption protection to encrypted object on the whole arranging Apply.
Embodiment two
Fig. 2 is the flow chart of the safety access method that the present invention second preferred embodiment proposes.Based on above-described embodiment one, Include by before the access password of access object needed for default password input interface typing:
S01, setting and the access corresponding access entrance of object.As above, described in example, during initialization, setting needs embedded monitoring The third-party application of incoming event.
S02, presets application program corresponding with access entrance.For example, to the event meeting setting condition, carry out redirecting setting Put.Specifically, when the third-party application opened is correct, and when the password that inputs is correct, encrypted object can be jumped to immediately Access interface.
S03, is embedded in password input interface in the login interface of application program or interactive interface.As above described in example, permissible It is embedded in password input interface in the login interface of third party application or interactive interface.
S04, accesses the access character of object by password input interface typing.By the capture input of password input interface Character string.
The having the beneficial effects that of the present embodiment, by setting with access the corresponding access entrance of object, preset with access into The corresponding application program of mouth, then, is embedded in password input interface in the login interface of application program or interactive interface, finally, Access the access character of object by password input interface typing.Achieve the accurate acquisition to the access character accessing object, Simultaneously it is ensured that to the secret protection accessing character acquisition interface accessing object, further strengthening and accessing object Access the security guarantee in character Input Process.
Embodiment three
Fig. 3 is the flow chart of the safety access method that the present invention the 3rd preferred embodiment proposes.Based on above-described embodiment one With embodiment two, specifically included by accessing the access password of object needed for default password input interface typing:
S11, after password input interface typing accesses the access character of object, accords with analysis in conjunction with default password identification Access character.
Further, pre-set password identification symbol, accord with the access character of analysis typing by password identification.In order to avoid The typing character of the access character and embedded program of typing itself occurs logic to conflict, therefore, setting password identification symbol, then permissible Any access character setting simultaneously typing is reversely analyzed.
S12, according to analysis operation, extracts the access password accessing object in accessing character.By above-mentioned analysis operation, Obtain the access password accessing object.
Further, above-mentioned default password identification accords with the key informations such as the private key that can be to be distributed by high in the clouds.
The having the beneficial effects that of the present embodiment, after password input interface typing accesses the access character of object, in conjunction with Default password identification symbol analysis accesses character, then, according to analysis operation, extracts the access accessing object in accessing character Password.Achieve the accurate acquisition to the access password accessing in character, be the identity of the access password in subsequent access character Verification operation provides accurate judgement basis.
Example IV
Fig. 4 is the flow chart of the safety access method that the present invention the 4th preferred embodiment proposes.Based on above-described embodiment one To embodiment three, judge to access whether password specifically includes by accessing the authentication of object:
S21, the access password of the access extracted object is transmitted to access object by encrypted tunnel.As above described in example, After completing embedded third-party application as password input interface, the encryption set up between encrypted object and third-party application is led to Road, is transmitted accessing password to access object by encrypted tunnel.
S22, execution judges whether to access password by accessing the authentication operation of object.Specifically judge process is as above Example is described, will not be described here.
The having the beneficial effects that of the present embodiment, by transmitting the access password of the access extracted object by encrypted tunnel To accessing object, then judge whether to access password by accessing the authentication of object.Thus ensure that access password is passing Will not be stolen during defeated and usurp, further strengthen the security reliability by accessing password authentification encrypted object.
Embodiment five
Fig. 5 is the flow chart of the safety access method that the present invention the 5th preferred embodiment proposes.Based on above-described embodiment one To example IV, if access password passing through to access the authentication of object, jumping to access object, and authorizing access object Access rights, if access password not passing through to access the authentication of object, denied access accesses object and further includes:
S31, if access password not passing through to access the authentication of object, and after denied access access object, normal access Application program corresponding with access entrance.As above described in example, if above-mentioned access password match is unsuccessful, it is by accessing object Authentication, then will be trapped in dialing interface, and dial-up program will normally run.
The having the beneficial effects that of the present embodiment, if by judging that accessing password does not pass through to access the authentication of object, and After denied access accesses object, normally access application program corresponding with access entrance.On the one hand, protect to work as and access password not By during the authentication that accesses object, to the protection accessing object accesses authorities, on the other hand, it is to avoid access the interior of object Hold leakage.
Implement the safety access method of the present invention, first, by accessing object needed for default password input interface typing Access password, then, judge to access password whether by accessing the authentication of object, finally, if access password to pass through to visit Ask the authentication of object, then jump to access object, and authorize the access rights accessing object, if access password not passing through to visit Ask the authentication of object, then denied access accesses object.The protection having achieved layer inputting interface many and selecting, for special feelings There is more preferable protection to encrypted object under condition.Such as, if after user's loss password, even if the second people obtains or knows user Password, if but do not know interface for password input be also have no way of access encrypted object.The safety making encrypted object is able to more Further lifting.Meanwhile, also optimize the encryption logic of existing encrypted object, that is, from encrypted object, find typing password Interface, typing password, access encrypted encrypted object.Thus enhance the encryption protection to encrypted object on the whole arranging Apply.
One of ordinary skill in the art will appreciate that it is permissible for realizing all or part of step in above-described embodiment method The hardware being controlled correlation by program is completed, described program can in being stored in a computer read/write memory medium, Described storage medium, such as ROM/RAM, disk, CD etc..
Embodiment six
Fig. 6 is the structured flowchart of secure access device proposed by the present invention.The invention allows for a kind of secure access dress Put, this device includes:
Access password typing module 10, for close by accessing the access of object needed for default password input interface typing Code;
Access password authentication module 20, for judging whether to access password by accessing the authentication of object;
Secure access performing module 30, if passing through to access the authentication of object for accessing password, jumps to access Object, and authorize the access rights accessing object, if access password not passing through to access the authentication of object, denied access is visited Ask object.
Further, this device also includes input interface setup module 40, input interface setup module 40 include accessing into Mouth arranging unit 41, application program arranging unit 42, input interface embedded unit 43 and password typing unit 44, wherein,
Access entrance arranging unit 41 is used for arranging access entrance corresponding with accessing object;
Application program arranging unit 42 is used for presetting application program corresponding with access entrance;
Input interface embedded unit 43 is used for being embedded in password typing circle in the login interface of application program or interactive interface Face;
Password typing unit 444 is used for accessing the access character of object by password input interface typing.
Further, access password typing module 10 to include accessing character analytic unit 11 and access code extraction unit 12, wherein,
Access character analytic unit 11 and be used for after password input interface typing accesses the access character of object, in conjunction with pre- If password identification symbol analysis access character;
Access code extraction unit 12 and be used for according to analysis operation, the access of extraction access object is close in accessing character Code.
Further, access password authentication module 20 to include accessing password transmission unit 21 and identity authenticating unit 22, Wherein,
Access password transmission unit 21 to be used for transmitting to visit the access password of the access extracted object by encrypted tunnel Ask object;
Identity authenticating unit 22 is used for judging whether to access password by accessing the authentication of object;
Secure access performing module 30 also includes denied access performance element 31, if denied access performance element 31 is used for visiting After asking that password does not pass through to access the authentication of object, and denied access accesses object, normal access is corresponding with access entrance Application program.
The invention allows for a kind of have secure access to terminal, this terminal includes above-mentioned secure access device.
This secure access device can be used for mobile phone, or has other intelligent communications ends of cryptographic authorization functions End, such as, in smart mobile phone etc., can be operate in software unit in these communication terminals it is also possible to as independent suspension member It is integrated in these communication terminals or runs in the application system of these mobile terminals.
It should be noted that the technical characteristic in said method embodiment is all corresponding applicable in this device, no longer heavy here State.
Implement secure access device and the terminal of the present invention, first, by visiting needed for default password input interface typing Asking the access password of object, then, judging whether to access password by accessing the authentication of object, finally, if accessing password By accessing the authentication of object, then jump to access object, and authorize the access rights accessing object, if accessing password not By accessing the authentication of object, then denied access accesses object.The protection having achieved layer inputting interface many and selecting, for In particular cases there is more preferable protection to encrypted object.Such as, if after user's loss password, even if the second people obtains or knows The password of road user, if but do not know that interface for password input is also to have no way of accessing encrypted object.Make the safety of encrypted object Further lifted.Meanwhile, also optimize the encryption logic of existing encrypted object, that is, from encrypted object, find record Enter the interface of password, typing password, access encrypted encrypted object.Thus enhancing the encryption to encrypted object on the whole Safeguard procedures.
The preferred embodiments of the present invention above by reference to brief description, not thereby limit to the interest field of the present invention.This Skilled person, without departing from the scope of the present invention and essence, can have multiple flexible programs to realize the present invention, for example as one The feature of individual embodiment can be used for another embodiment and obtains another embodiment.All institutes within the technology design with the present invention Any modification, equivalent and the improvement made, all should be within the interest field of the present invention.

Claims (10)

1. a kind of safety access method is it is characterised in that methods described includes:
By needed for default password input interface typing access object access password, wherein, default third-party should It is embedded in described password input interface with the login interface or interactive interface of program;
Judge the described password that accesses whether by the described authentication accessing object;
If the described password that accesses, by the described authentication accessing object, jumps to described access object, and authorizes described Access the access rights of object, if the described password that accesses, by the described authentication accessing object, is trapped in described close Object is accessed described in code input interface denied access.
2. safety access method according to claim 1 is it is characterised in that described recorded by default password input interface Include before the access password entering required access object:
Setting and the described access corresponding access entrance of object;
Preset application program corresponding with described access entrance;
It is embedded in described password input interface in the login interface of described application program or interactive interface;
By accessing the access character of object described in described password input interface typing.
3. safety access method according to claim 2 is it is characterised in that described recorded by default password input interface Enter the required access password accessing object to specifically include:
After the access character accessing object described in described password input interface typing, accord with analysis in conjunction with default password identification Described access character;
According to described analysis operation, extract the described access password accessing object in character in described access.
4. safety access method according to claim 3 is it is characterised in that described judge whether described access password passes through The described authentication accessing object specifically includes:
The access password of the described access object of described extraction is transmitted to described access object by encrypted tunnel;
Judge the described password that accesses whether by the described authentication accessing object.
If 5. safety access method according to claim 4 is it is characterised in that described access password is by described visit Ask the authentication of object, then jump to described access object, and authorize the described access rights accessing object, if described access Password by the described authentication accessing object, then accesses object and further includes described in denied access:
If the described password that accesses is by the described authentication accessing object, and after access object described in denied access, normally Access application program corresponding with described access entrance.
6. a kind of secure access device is it is characterised in that described device includes:
Access password typing module, for the access password by accessing object needed for default password input interface typing, its In, it is embedded in described password input interface in the login interface of default third-party application program or interactive interface;
Access password authentication module, for judging the described password that accesses whether by the described authentication accessing object;
Secure access performing module, if for the described password that accesses by the described authentication accessing object, jump to institute State access object, and authorize the described access rights accessing object, if the described password that accesses does not pass through the described body accessing object Part checking, then be trapped in access object described in described password input interface denied access.
7. secure access device according to claim 6 is it is characterised in that also including input interface setup module, described Input interface setup module includes access entrance arranging unit, application program arranging unit, input interface embedded unit and close Code typing unit, wherein,
Described access entrance arranging unit is used for setting and the described access corresponding access entrance of object;
Described application program arranging unit is used for presetting application program corresponding with described access entrance;
Described input interface embedded unit is used for being embedded in described password in the login interface of described application program or interactive interface Input interface;
Described password typing unit is used for the access character by accessing object described in described password input interface typing.
8. secure access device according to claim 7 is it is characterised in that described access password typing module includes accessing Character analytic unit and access code extraction unit, wherein,
The described character analytic unit that accesses is used for after the access character of access object described in described password input interface typing, Accord with conjunction with default password identification and analyze described access character;
Described access code extraction unit is used for, according to described analysis operation, extracting described access object in described access character Access password.
9. secure access device according to claim 8 is it is characterised in that described access password authentication module includes accessing Password transmission unit and identity authenticating unit, wherein,
Described access password transmission unit is used for passing the access password of the described access object of described extraction by encrypted tunnel Transport to described access object;
Whether described identity authenticating unit is used for judging the described password that accesses by the described authentication accessing object;
Described secure access performing module also includes denied access performance element, if described denied access performance element is for described Access password by the described authentication accessing object, and after accessing object described in denied access, normal access with described The corresponding application program of access entrance.
10. a kind of secure access terminal is it is characterised in that described terminal includes the secure access described in described claim 6-9 Device.
CN201510023929.0A 2015-01-16 2015-01-16 Safety access method, device and terminal Active CN104539627B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510023929.0A CN104539627B (en) 2015-01-16 2015-01-16 Safety access method, device and terminal
PCT/CN2015/090614 WO2016112712A1 (en) 2015-01-16 2015-09-24 Secure access method, apparatus, and terminal, storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510023929.0A CN104539627B (en) 2015-01-16 2015-01-16 Safety access method, device and terminal

Publications (2)

Publication Number Publication Date
CN104539627A CN104539627A (en) 2015-04-22
CN104539627B true CN104539627B (en) 2017-02-22

Family

ID=52855096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510023929.0A Active CN104539627B (en) 2015-01-16 2015-01-16 Safety access method, device and terminal

Country Status (2)

Country Link
CN (1) CN104539627B (en)
WO (1) WO2016112712A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539627B (en) * 2015-01-16 2017-02-22 努比亚技术有限公司 Safety access method, device and terminal
CN105787335B (en) * 2016-02-25 2019-06-18 东莞盛世科技电子实业有限公司 Interface for password input method for handover control and device
CN105704143A (en) * 2016-03-17 2016-06-22 珠海格力电器股份有限公司 Method and apparatus for processing playing resources
CN108932086A (en) 2017-05-23 2018-12-04 腾讯科技(深圳)有限公司 Display methods, device and the storage medium of application interface

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103313238A (en) * 2013-06-20 2013-09-18 天翼电信终端有限公司 Safety system and safety protection method for mobile terminal

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005661B (en) * 2006-11-15 2010-11-03 深圳凯虹移动通信有限公司 Mobile terminal with data and menu hidden function and its enciphering hiding method
US7941405B2 (en) * 2007-03-30 2011-05-10 Data Center Technologies Password protection for file backups
CN101350717B (en) * 2007-07-18 2011-04-27 中国移动通信集团公司 Method and system for logging on third party server through instant communication software
CN101478595A (en) * 2008-09-08 2009-07-08 广东南方信息安全产业基地有限公司 Mobile communication terminal data protection method
CN102045450A (en) * 2011-01-12 2011-05-04 深圳桑菲消费通信有限公司 Method for protecting mobile phone information security
CN104217172B (en) * 2013-06-03 2019-05-14 腾讯科技(深圳)有限公司 Privacy content inspection method and device
CN104008348B (en) * 2014-04-17 2017-03-29 小米科技有限责任公司 application control method, device and terminal
CN104252605B (en) * 2014-09-17 2017-03-15 南京信息工程大学 A kind of file transparent encrypting and deciphering system of Android platform and method
CN104539627B (en) * 2015-01-16 2017-02-22 努比亚技术有限公司 Safety access method, device and terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103313238A (en) * 2013-06-20 2013-09-18 天翼电信终端有限公司 Safety system and safety protection method for mobile terminal

Also Published As

Publication number Publication date
WO2016112712A1 (en) 2016-07-21
CN104539627A (en) 2015-04-22

Similar Documents

Publication Publication Date Title
CN105205370B (en) Mobile terminal safety means of defence and mobile terminal, security system and methods for using them
US9037851B2 (en) User authentication system, user authentication apparatus, smart card, and user authentication method for ubiquitous authentication management
CN104539627B (en) Safety access method, device and terminal
CN103377332B (en) The method of access application and device
CN105554035B (en) A kind of electronic lock system and its control method
CN104104673B (en) Method for realizing security payment through third party unified dynamic authorization code
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
US20060156395A1 (en) Security device and terminal and method for their communication
CN105959287A (en) Biological feature based safety certification method and device
US8839380B2 (en) Method for the temporary personalization of a communication device
CN105046122B (en) A kind of terminal system management method and terminal
CN106488452A (en) A kind of mobile terminal safety access authentication method of combination fingerprint
CN107733868A (en) Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
CN106778138A (en) The control method and device of software license limit
CN112905965B (en) Financial big data processing system based on block chain
CN107295024A (en) It is a kind of to realize the method that web front end is landed safely and accessed
CN103617005A (en) Access method, device and system for intelligent card
CN107733636A (en) Authentication method and Verification System
CN107180173A (en) unlocking method and device
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN105871840B (en) A kind of certificate management method and system
CN105069361A (en) Safety access method and system for privacy space
JP4303952B2 (en) Multiple authentication system, computer program, and multiple authentication method
CN106156573A (en) A kind of method controlling intelligent terminal and the device of control intelligent terminal
US20140359703A1 (en) Method for securing an action that an actuating device must carry out at the request of a user

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant after: Nubian Technologies Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant before: Shenzhen ZTE Mobile Tech Co., Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant