CN105635090B - System access method, system access mechanism and terminal - Google Patents

System access method, system access mechanism and terminal Download PDF

Info

Publication number
CN105635090B
CN105635090B CN201510040758.2A CN201510040758A CN105635090B CN 105635090 B CN105635090 B CN 105635090B CN 201510040758 A CN201510040758 A CN 201510040758A CN 105635090 B CN105635090 B CN 105635090B
Authority
CN
China
Prior art keywords
terminal
goal systems
identifier information
terminals
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510040758.2A
Other languages
Chinese (zh)
Other versions
CN105635090A (en
Inventor
谭杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510040758.2A priority Critical patent/CN105635090B/en
Publication of CN105635090A publication Critical patent/CN105635090A/en
Application granted granted Critical
Publication of CN105635090B publication Critical patent/CN105635090B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention proposes a kind of system access method, a kind of system access mechanism and a kind of terminals, wherein, the described method includes: receiving the first identifier information from other any terminals after the terminal and other any terminals that operate in current system establish connection;Receive the second identifier information inputted in the terminal;Judge whether the first identifier information matches with the second identifier information, and when the judgment result is yes, the terminal is allowed to switch to goal systems by the current system;Otherwise, the terminal is forbidden to switch to the goal systems by the current system;Wherein, the goal systems is the system for the security level that security level is higher than the current system in the multiple system.According to the technical solution of the present invention, during the security level that remote authorization enters terminal higher system, it is ensured that into the safety of this process of the higher system of security level, so that the data in the system be avoided illegally to be stolen.

Description

System access method, system access mechanism and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of system access method, a kind of system access mechanism With a kind of terminal.
Background technique
It, can be by identification informations such as finger print informations currently, be equipped with the different multiple systems of security level in terminal Enter into the higher system of security level, for example, dual system is installed on mobile phone, the lower conventional system of security level and safety Higher ranked security system, due to being stored with the private data of user in security system, so passing through the finger in security system The certification of line information, user's just accessible and safe operation system.
But when terminal not user at one's side, and when terminal operating is in the lower system of security level, but user Want to get data in the higher system of security level in time, at this point, in the related art, can by two ways into Enter into the higher system of security level, one is local authorization, another kind is remote authorization.It is remote about remote authorization Journey input in the terminal enter the higher system of security level in security key, hence into arrive the higher system of security level In, but the mode for inputting security key has following a few strip defects:
1) it is easy to be seen by other users when the security key of input fixation, so that other users be made to enter peace In the congruent higher system of grade, increase the risk of data leak in the system.
2) security key may be intercepted during user communication, and illegal user is made to steal security level in mobile phone Information in higher system.
3) enter login interface, it may appear that the problems such as accessing the network attack or logon attempt of connection increases security level The risk that data in higher system are leaked.
Therefore, during the security level that remote authorization enters terminal higher system, how to ensure safely etc. The Information Security of the higher system of grade, avoids illegal user from entering the number stolen in the system in the higher system of security level According to becoming urgent problem to be solved.
Summary of the invention
The present invention is based on the above problems, proposes a kind of new technical solution, enters terminal in remote authorization During the higher system of security level, it can be ensured that the Information Security of the higher system of security level, it is ensured that enter peace The safety of this process of the congruent higher system of grade is effectively prevented from illegal user and enters the higher system of security level In, so that the data in the higher system of security level be avoided illegally to be stolen, improve the safety of the security system of terminal Energy.
In view of this, an aspect of of the present present invention proposes a kind of system access method, for being equipped with the end of multiple systems End, comprising: after the terminal and other any terminals that operate in current system establish connection, receive from it is described other The first identifier information of one terminal;Receive the second identifier information inputted in the terminal;Judge the first identifier information with Whether the second identifier information matches, and when the judgment result is yes, the terminal is allowed to be switched to by the current system Goal systems;Otherwise, the terminal is forbidden to switch to the goal systems by the current system;Wherein, the goal systems It is higher than the system of the security level of the current system for security level in the multiple system, other described any terminals are institute State any terminal except terminal.
In the technical scheme, when the specified data in remote acquisition terminal in the higher goal systems of security level, And terminal operating, at this point, terminal and other any terminals are established connection first, makes in the lower current system of security level The user of other any terminals can send first identifier information to terminal by other any terminals, and make the user of terminal Second identifier information can be inputted to terminal, when first identifier information and second identifier information matches, this illustrates the use of terminal Be between family and the user of other any terminals it is trusty, then allow terminal to be switched in goal systems by current system, make The user of terminal can temporarily enter in goal systems, and when first identifier information and second identifier information mismatch, this is said The user of bright terminal is not other any terminals user trusty or logs on to goal systems there may be remote authorization is upset In situation, for example, the case where hacker is to malicious attack or the logon attempt of network, then forbid terminal to be switched to by current system In goal systems, so that it is guaranteed that remote authorization trusted user enters the safety in the higher system of security level, in addition, by It can further avoid what use was fixed in the related technology in first identifier information and second identifier information with real-time change Security key carrys out remote authorization and enters in goal systems, has thereby further ensured that the data peace of the higher system of security level Quan Xing, it is ensured that into the safety of this process of the higher system of security level, when security key being avoided illegally to be stolen Specified data in goal systems are leaked, and are entered in the higher system of security level to finally improve remote authorization Safety, certainly, in the present invention, it will be appreciated by those skilled in the art that terminal is first terminal, other any terminals are For second terminal.
In the above-mentioned technical solutions, it is preferable that the terminal is being allowed to switch to the target system by the current system After system, the terminal is controlled by the current system and switches to the goal systems, so that the user of the terminal will be described Specified data in goal systems are sent to other described any terminals.
In the technical scheme, after allowing terminal to switch to goal systems by current system, then illustrate other any ends The user of the user at end successfully Remote authorization terminal temporarily enters in goal systems, and then terminal is switched to by current system In goal systems, the specified data in goal systems can be sent to other any terminals by the user of terminal, keep other any The available specified data of the user of terminal avoid specified data and illegally steal by illegal user.
In the above-mentioned technical solutions, it is preferable that the terminal is being allowed to switch to the target system by the current system Before system, further includes: return to the first identifier information to other described any terminals and match with the second identifier information Matching result so that other described any terminals again to the terminal send third identification information;Receiving described After three identification informations, judge whether the third identification information matches with pre-stored matching identification information, and in judging result When to be, determining allows the terminal to switch to the goal systems by the current system, otherwise, forbids the terminal by institute It states current system and switches to the goal systems.
In the technical scheme, before allowing terminal to switch to the higher goal systems of security level, further includes: if First identifier information and the success of second identifier information matches, then return to the information of successful match, to other any terminals for logical The user's first identifier information and the success of second identifier information matches for knowing other any terminals, to notify other any terminals User can send third identification information to terminal again by other any terminals, when terminal receives third identification information Afterwards, if third identification information and pre-stored matching identification information matches, illustrate that the user of other any terminals is and end The user for holding binding, is not illegal user, terminal is allowed for be switched in goal systems by current system, to make terminal User can temporarily enter in goal systems, if third identification information and pre-stored matching identification information mismatch, Illustrate that the user of other any terminals may be illegal user, just terminal is forbidden to be switched in goal systems by current system, from And illegal operation of the illegal user to terminal is avoided, and the Dual Matching of identification information, then it can be further improved remote authorization The safety in goal systems is entered, to further increase the security performance of the goal systems of terminal.
In the above-mentioned technical solutions, it is preferable that further include: when there are multiple goal systems, if first mark Know information to match with the second identifier information, then according to the use of the goal systems each in multiple goal systems Frequency and/or system banner from other any terminals, determine final goal systems.
In the technical scheme, by the cooperation of terminal and other any terminals, the user of other any terminals can be remote The user of journey authorization terminal enters in the goal systems of terminal, can be according to multiple when the quantity of goal systems is multiple The frequency of use of each goal systems and/or the system banner from other any terminals in goal systems, in multiple target systems Final goal systems is determined in system, and the user of terminal is avoided to manually select final goal systems in multiple goal systems, To keep terminal more intelligent.
In the above-mentioned technical solutions, it is preferable that the first identifier information, the second identifier information, the third mark Know information and the pre-stored matching identification information includes: system access key, random code, finger print information, facial characteristics letter At least one information in breath, voice identification information.
In the technical scheme, first identifier information, second identifier information, third identification information and pre-stored matching mark Knowing information includes but is not limited to: system access key, random code, finger print information, face feature information, in voice identification information At least one information, due to first identifier information, second identifier information, third identification information and pre-stored matching identification information It is in real time or periodically constantly to change, avoids first identifier information, second identifier information, third identification information and be pre-stored Matching identification information leaked, avoid illegal user from entering in the higher system of security level of terminal, so improve The security performance that terminal remote logs in.
Another aspect of the present invention proposes a kind of system access mechanism, for being equipped with the terminal of multiple systems, comprising: First receiving unit receives after the terminal and other any terminals that operate in current system establish connection from described The first identifier information of other any terminals;Second receiving unit receives the second identifier information inputted in the terminal;Judgement Unit, judges whether the first identifier information matches with the second identifier information;Processing unit is yes in judging result When, allow the terminal to switch to goal systems by the current system;Otherwise, the terminal is forbidden to be cut by the current system Shift to the goal systems;Wherein, the goal systems is that security level is higher than the current system in the multiple system The system of security level, other described any terminals are any terminal except the terminal.
In the technical scheme, when the specified data in remote acquisition terminal in the higher goal systems of security level, And terminal operating, at this point, terminal and other any terminals are established connection first, makes in the lower current system of security level The user of other any terminals can send first identifier information to terminal by other any terminals, and make the user of terminal Second identifier information can be inputted to terminal, when first identifier information and second identifier information matches, this illustrates the use of terminal Be between family and the user of other any terminals it is trusty, then allow terminal to be switched in goal systems by current system, make The user of terminal can temporarily enter in goal systems, and when first identifier information and second identifier information mismatch, this is said The user of bright terminal is not other any terminals user trusty or logs on to goal systems there may be remote authorization is upset In situation, for example, the case where hacker is to malicious attack or the logon attempt of network, then forbid terminal to be switched to by current system In goal systems, so that it is guaranteed that remote authorization trusted user enters the safety in the higher system of security level, in addition, by It can further avoid what use was fixed in the related technology in first identifier information and second identifier information with real-time change Security key carrys out remote authorization and enters in goal systems, has thereby further ensured that the data peace of the higher system of security level Quan Xing, it is ensured that into the safety of this process of the higher system of security level, when security key being avoided illegally to be stolen Specified data in goal systems are leaked, and are entered in the higher system of security level to finally improve remote authorization Safety, certainly, in the present invention, it will be appreciated by those skilled in the art that terminal is first terminal, other any terminals are For second terminal.
In the above-mentioned technical solutions, it is preferable that further include: control unit, in the permission terminal by the current system It switches to after the goal systems, controls the terminal by the current system and switch to the goal systems, so that described Specified data in the goal systems are sent to other described any terminals by the user of terminal.
In the technical scheme, after allowing terminal to switch to goal systems by current system, then illustrate other any ends The user of the user at end successfully Remote authorization terminal temporarily enters in goal systems, and then terminal is switched to by current system In goal systems, the specified data in goal systems can be sent to other any terminals by the user of terminal, keep other any The available specified data of the user of terminal avoid specified data and illegally steal by illegal user.
In the above-mentioned technical solutions, it is preferable that further include: transmission unit, in the permission terminal by the current system It switches to before the goal systems, returns to the first identifier information to other described any terminals and the second identifier is believed The matched matching result of manner of breathing, so that other described any terminals send third identification information to the terminal again;It is described to sentence Disconnected unit is also used to: after receiving the third identification information, judging the third identification information and pre-stored matching mark Know whether information matches;The processing unit is also used to: when the judgment result is yes, determining allows the terminal by described current System switches to the goal systems, otherwise, the terminal is forbidden to switch to the goal systems by the current system.
In the technical scheme, before allowing terminal to switch to the higher goal systems of security level, further includes: if First identifier information and the success of second identifier information matches, then return to the information of successful match, to other any terminals for logical The user's first identifier information and the success of second identifier information matches for knowing other any terminals, to notify other any terminals User can send third identification information to terminal again by other any terminals, when terminal receives third identification information Afterwards, if third identification information and pre-stored matching identification information matches, illustrate that the user of other any terminals is and end The user for holding binding, is not illegal user, terminal is allowed for be switched in goal systems by current system, make the user of terminal It can temporarily enter in goal systems, if third identification information and pre-stored matching identification information mismatch, illustrate The user of other any terminals may be illegal user, just terminal be forbidden to be switched in goal systems by current system, to keep away Exempt from illegal operation of the illegal user to terminal, and the Dual Matching of identification information, then it can be further improved remote authorization entrance Safety into goal systems, to further increase the security performance of the goal systems of terminal.
In the above-mentioned technical solutions, it is preferable that further include: the processing unit is also used to: when there are multiple targets When system, if the first identifier information matches with the second identifier information, according to every in multiple goal systems The frequency of use of a goal systems and/or system banner from other any terminals, determine final target system System.
In the technical scheme, by the cooperation of terminal and other any terminals, the user of other any terminals can be remote The user of journey authorization terminal enters in the goal systems of terminal, can be according to multiple when the quantity of goal systems is multiple The frequency of use of each goal systems and/or the system banner from other any terminals in goal systems, in multiple target systems Final goal systems is determined in system, and the user of terminal is avoided to manually select final goal systems in multiple goal systems, To keep terminal more intelligent.
In the above-mentioned technical solutions, it is preferable that the first identifier information, the second identifier information, the third mark Know information and the pre-stored matching identification information includes: system access key, random code, finger print information, facial characteristics letter At least one information in breath, voice identification information.
In the technical scheme, first identifier information, second identifier information, third identification information and pre-stored matching mark Knowing information includes but is not limited to: system access key, random code, finger print information, face feature information, in voice identification information At least one information, due to first identifier information, second identifier information, third identification information and pre-stored matching identification information It is in real time or periodically constantly to change, avoids first identifier information, second identifier information, third identification information and be pre-stored Matching identification information leaked, avoid illegal user from entering in the higher system of security level of terminal, so improve The security performance that terminal remote logs in.
Another aspect of the present invention proposes a kind of terminal, accesses including system described in any one of above-mentioned technical proposal Device.
In the technical scheme, when the specified data in remote acquisition terminal in the higher goal systems of security level, And terminal operating, at this point, terminal and other any terminals are established connection first, makes in the lower current system of security level The user of other any terminals can send first identifier information to terminal by other any terminals, and make the user of terminal Second identifier information can be inputted to terminal, when first identifier information and second identifier information matches, this illustrates the use of terminal Be between family and the user of other any terminals it is trusty, then allow terminal to be switched in goal systems by current system, make The user of terminal can temporarily enter in goal systems, and when first identifier information and second identifier information mismatch, this is said Bright there may be upset remote authorizations to log on to the situation in goal systems, for example, malicious attack or trial of the hacker to network The case where login, then forbids terminal to be switched in goal systems by current system, in addition, due to first identifier information and the second mark Knowing information can avoid carrying out remote authorization using security key fixed in the related technology entering target system with real-time change In system, so that specified data when security key being avoided illegally to be stolen in goal systems are leaked, remotely awarded to improve Power enters the safety in the higher system of security level.
According to the technical solution of the present invention, the process for the higher system of security level for entering terminal in remote authorization In, it can be ensured that the Information Security of the higher system of security level, it is ensured that into this mistake of the higher system of security level The safety of journey is effectively prevented from illegal user and enters in the higher system of security level, to avoid security level higher Data in system are illegally stolen, and the security performance of the security system of terminal is improved.
Detailed description of the invention
Fig. 1 shows the flow diagram of system access method according to an embodiment of the invention;
Fig. 2 shows the method streams that remote terminal according to an embodiment of the invention is communicated with dual system termi-nal Journey schematic diagram;
Fig. 3 shows the method stream that dual system termi-nal according to an embodiment of the invention is communicated with remote terminal Journey schematic diagram;
Fig. 4 shows the structural schematic diagram of system access mechanism according to an embodiment of the invention;
Fig. 5 shows the structural schematic diagram of terminal according to an embodiment of the invention;
Fig. 6 shows the original that remote terminal authorization terminal according to an embodiment of the invention carries out secure system access Manage structural schematic diagram.
Specific embodiment
It is with reference to the accompanying drawing and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the flow diagram of system access method according to an embodiment of the invention.
As shown in Figure 1, system access method according to an embodiment of the invention, comprising: step 102, when operating in After the terminal and other any terminals of current system establish connection, the first identifier from other any terminals is received Information;Step 104, the second identifier information inputted in the terminal is received;Step 106, judge the first identifier information with Whether the second identifier information matches, and when the judgment result is yes, the terminal is allowed to be switched to by the current system Goal systems;Otherwise, the terminal is forbidden to switch to the goal systems by the current system;Wherein, the goal systems It is higher than the system of the security level of the current system for security level in the multiple system.
In the technical scheme, when the specified data in remote acquisition terminal in the higher goal systems of security level, And terminal operating, at this point, terminal and other any terminals are established connection first, makes in the lower current system of security level The user of other any terminals can send first identifier information to terminal by other any terminals, and make the user of terminal Second identifier information can be inputted to terminal, when first identifier information and second identifier information matches, this illustrates the use of terminal Be between family and the user of other any terminals it is trusty, then allow terminal to be switched in goal systems by current system, make The user of terminal can temporarily enter in goal systems, and when first identifier information and second identifier information mismatch, this is said The user of bright terminal is not other any terminals user trusty or logs on to goal systems there may be remote authorization is upset In situation, for example, the case where hacker is to malicious attack or the logon attempt of network, then forbid terminal to be switched to by current system In goal systems, so that it is guaranteed that remote authorization trusted user enters the safety in the higher system of security level, in addition, by It can further avoid what use was fixed in the related technology in first identifier information and second identifier information with real-time change Security key carrys out remote authorization and enters in goal systems, has thereby further ensured that the data peace of the higher system of security level Quan Xing, it is ensured that into the safety of this process of the higher system of security level, when security key being avoided illegally to be stolen Specified data in goal systems are leaked, and are entered in the higher system of security level to finally improve remote authorization Safety.
In the above-mentioned technical solutions, it is preferable that the terminal is being allowed to switch to the target system by the current system After system, the terminal is controlled by the current system and switches to the goal systems, so that the user of the terminal will be described Specified data in goal systems are sent to other described any terminals.
In the technical scheme, after allowing terminal to switch to goal systems by current system, then illustrate other any ends The user of the user at end successfully Remote authorization terminal temporarily enters in goal systems, and then terminal is switched to by current system In goal systems, the specified data in goal systems can be sent to other any terminals by the user of terminal, keep other any The available specified data of the user of terminal avoid specified data and illegally steal by illegal user.
In the above-mentioned technical solutions, it is preferable that the terminal is being allowed to switch to the target system by the current system Before system, further includes: return to the first identifier information to other described any terminals and match with the second identifier information Matching result so that other described any terminals again to the terminal send third identification information;Receiving described After three identification informations, judge whether the third identification information matches with pre-stored matching identification information, and in judging result When to be, determining allows the terminal to switch to the goal systems by the current system, otherwise, forbids the terminal by institute It states current system and switches to the goal systems.
In the technical scheme, before allowing terminal to switch to the higher goal systems of security level, further includes: if First identifier information and the success of second identifier information matches, then return to the information of successful match, to other any terminals for logical The user's first identifier information and the success of second identifier information matches for knowing other any terminals, to notify other any terminals User can send third identification information to terminal again by other any terminals, when terminal receives third identification information Afterwards, if third identification information and pre-stored matching identification information matches, illustrate that the user of other any terminals is and end The user for holding binding, is not illegal user, terminal is allowed for be switched in goal systems by current system, to make terminal User can temporarily enter in goal systems, if third identification information and pre-stored matching identification information mismatch, Illustrate that the user of other any terminals may be illegal user, just terminal is forbidden to be switched in goal systems by current system, from And illegal operation of the illegal user to terminal is avoided, and the Dual Matching of identification information, then it can be further improved remote authorization The safety in goal systems is entered, to further increase the security performance of the goal systems of terminal.
In the above-mentioned technical solutions, it is preferable that further include: when there are multiple goal systems, if first mark Know information to match with the second identifier information, then according to the use of the goal systems each in multiple goal systems Frequency and/or system banner from other any terminals, determine final goal systems.
In the technical scheme, by the cooperation of terminal and other any terminals, the user of other any terminals can be remote The user of journey authorization terminal enters in the goal systems of terminal, can be according to multiple when the quantity of goal systems is multiple The frequency of use of each goal systems and/or the system banner from other any terminals in goal systems, in multiple target systems Final goal systems is determined in system, and the user of terminal is avoided to manually select final goal systems in multiple goal systems, To keep terminal more intelligent.
In the above-mentioned technical solutions, it is preferable that the first identifier information, the second identifier information, the third mark Know information and the pre-stored matching identification information includes: system access key, random code, finger print information, facial characteristics letter At least one information in breath, voice identification information.
In the technical scheme, first identifier information, second identifier information, third identification information and pre-stored matching mark Knowing information includes but is not limited to: system access key, random code, finger print information, face feature information, in voice identification information At least one information, due to first identifier information, second identifier information, third identification information and pre-stored matching identification information It is in real time or periodically constantly to change, avoids first identifier information, second identifier information, third identification information and be pre-stored Matching identification information leaked, avoid illegal user from entering in the higher system of security level of terminal, so improve The security performance that terminal remote logs in.
Fig. 2 shows the method streams that remote terminal according to an embodiment of the invention is communicated with dual system termi-nal Journey schematic diagram.
As shown in Fig. 2, remote terminal according to an embodiment of the invention and dual system termi-nal carry out communication means ( In the embodiment, terminal is mobile phone, is equipped with dual system on mobile phone, i.e., the lower conventional system of security level and security level compared with The current system of high security system, mobile phone is conventional system, and mobile phone can carry out digital service, in addition, remote terminal has Have the function of fingerprint recognition), comprising:
Step 202, APK (Android Package, android system are logged in remote terminal (other any terminals) Installation kit).
Step 204, by APK, remote terminal and mobile phone are established into connection.
Step 206, judge whether that the information for receiving mobile phone feedback can then notify terminal when the judgment result is yes User's remote terminal and mobile phone successful connection, enter step 208, when the judgment result is no, may be due to network Reason leads to feedback time-out, terminates remote terminal and carries out system access.
Step 208, the passwords (first identifier information) of user's input of remote terminal are received.
Step 210, judge passwords (second identifier information) in the passwords and mobile phone of remote terminal whether Match, when the judgment result is yes, allows mobile phone to switch to security system by conventional system, 212 are entered step, when judging result is When no, mobile phone is forbidden to switch to security system by conventional system, then proceed to the passwords of input remote terminal, step will be entered Rapid 208, then the passwords of remote terminal are matched with the passwords in mobile phone.
Step 212, the fingerprint log-on message (third identification information) of user's input of remote terminal is received.
Step 214, judge whether successful match is then said when the judgment result is yes for the fingerprint log-on message of remote terminal The user of bright remote terminal carries out system by remote terminal and accesses successfully, when the judgment result is no, enters step 212.
Fig. 3 shows the method stream that dual system termi-nal according to an embodiment of the invention is communicated with remote terminal Journey schematic diagram.
As shown in figure 3, the method that dual system termi-nal according to an embodiment of the invention is communicated with remote terminal (in this embodiment, terminal is mobile phone, and dual system, the i.e. lower conventional system of security level and safety etc. are equipped on mobile phone The current system of the higher security system of grade, mobile phone is conventional system, and mobile phone can carry out digital service, in addition, long-range whole End has the function of fingerprint recognition), comprising:
Step 302, the logging request of remote terminal (other any terminals) is received.
Step 304, agree to the logging request of remote terminal, and receive the feedback information from remote terminal, illustrate remote Journey terminal and mobile phone successful connection.
Step 306, the passwords (second identifier information) of the mobile phone of user's input are received.
Step 308, whether the passwords (first identifier information) of the passwords and remote terminal that judge mobile phone match Success, when the judgment result is yes, enters step 310, when the judgment result is no, mobile phone is forbidden to switch to peace by conventional system Total system can continue to the passwords of mobile phone, enter step 306.
Step 310, the notice of input finger print information (third identification information) is sent to remote terminal, and waits remote terminal The finger print information of transmission.
Step 312, judge whether the finger print information of remote terminal input matches with the matching identification information being pre-stored, when sentencing Disconnected result is when being, determining allows mobile phone to switch to security system by conventional system, 314 is entered step, when judging result is no When, forbid mobile phone to switch to security system by conventional system, notice remote terminal continues to send new finger print information, enter step 310。
Step 314, mobile phone switches in security system, makes the user (user of terminal) of mobile phone can be by the safety of mobile phone Specified data in system are sent in remote terminal.
Fig. 4 shows the structural schematic diagram of system access mechanism according to an embodiment of the invention.
As shown in figure 4, system access mechanism 400 according to an embodiment of the invention, comprising: the first receiving unit 402, after the terminal and other any terminals that operate in current system establish connection, receive from other described any ends The first identifier information at end;Second receiving unit 404 receives the second identifier information inputted in the terminal;Judging unit 406, judge whether the first identifier information matches with the second identifier information;Processing unit 408 is yes in judging result When, allow the terminal to switch to goal systems by the current system;Otherwise, the terminal is forbidden to be cut by the current system Shift to the goal systems;Wherein, the goal systems is that security level is higher than the current system in the multiple system The system of security level.
In the technical scheme, when the specified data in remote acquisition terminal in the higher goal systems of security level, And terminal operating, at this point, terminal and other any terminals are established connection first, makes in the lower current system of security level The user of other any terminals can send first identifier information to terminal by other any terminals, and make the user of terminal Second identifier information can be inputted to terminal, when first identifier information and second identifier information matches, this illustrates the use of terminal Be between family and the user of other any terminals it is trusty, then allow terminal to be switched in goal systems by current system, make The user of terminal can temporarily enter in goal systems, and when first identifier information and second identifier information mismatch, this is said The user of bright terminal is not other any terminals user trusty or logs on to goal systems there may be remote authorization is upset In situation, for example, the case where hacker is to malicious attack or the logon attempt of network, then forbid terminal to be switched to by current system In goal systems, so that it is guaranteed that remote authorization trusted user enters the safety in the higher system of security level, in addition, by It can further avoid what use was fixed in the related technology in first identifier information and second identifier information with real-time change Security key carrys out remote authorization and enters in goal systems, has thereby further ensured that the data peace of the higher system of security level Quan Xing, it is ensured that into the safety of this process of the higher system of security level, when security key being avoided illegally to be stolen Specified data in goal systems are leaked, and are entered in the higher system of security level to finally improve remote authorization Safety.In the above-mentioned technical solutions, it is preferable that further include: control unit 410, in the permission terminal by the current system System switches to after the goal systems, controls the terminal by the current system and switches to the goal systems, so that institute Specified data in the goal systems are sent to other described any terminals by the user for stating terminal.
In the technical scheme, after allowing terminal to switch to goal systems by current system, then illustrate other any ends The user of the user at end successfully Remote authorization terminal temporarily enters in goal systems, and then terminal is switched to by current system In goal systems, the specified data in goal systems can be sent to other any terminals by the user of terminal, keep other any The available specified data of the user of terminal avoid specified data and illegally steal by illegal user.
In the above-mentioned technical solutions, it is preferable that further include: transmission unit 412, in the permission terminal by the current system System switches to before the goal systems, returns to the first identifier information and the second identifier to other described any terminals The matching result that information matches, so that other described any terminals send third identification information to the terminal again;It is described Judging unit 406 is also used to: after receiving the third identification information, judging the third identification information and pre-stored Whether matched with identification information;The processing unit 408 is also used to: when the judgment result is yes, determine allow the terminal by The current system switches to the goal systems, otherwise, the terminal is forbidden to switch to the target by the current system System.
In the technical scheme, before allowing terminal to switch to the higher goal systems of security level, further includes: if First identifier information and the success of second identifier information matches, then return to the information of successful match, to other any terminals for logical The user's first identifier information and the success of second identifier information matches for knowing other any terminals, to notify other any terminals User can send third identification information to terminal again by other any terminals, when terminal receives third identification information Afterwards, if third identification information and pre-stored matching identification information matches, illustrate that the user of other any terminals is and end The user for holding binding, is not illegal user, terminal is allowed for be switched in goal systems by current system, make the user of terminal It can temporarily enter in goal systems, if third identification information and pre-stored matching identification information mismatch, illustrate The user of other any terminals may be illegal user, just terminal be forbidden to be switched in goal systems by current system, to keep away Exempt from illegal operation of the illegal user to terminal, and the Dual Matching of identification information, then it can be further improved remote authorization entrance Safety into goal systems, to further increase the security performance of the goal systems of terminal.
In the above-mentioned technical solutions, it is preferable that further include: the processing unit 408 is also used to: when there are multiple mesh When mark system, if the first identifier information matches with the second identifier information, according in multiple goal systems The frequency of use of each goal systems and/or system banner from other any terminals, determine final target System.
In the technical scheme, by the cooperation of terminal and other any terminals, the user of other any terminals can be remote The user of journey authorization terminal enters in the goal systems of terminal, can be according to multiple when the quantity of goal systems is multiple The frequency of use of each goal systems and/or the system banner from other any terminals in goal systems, in multiple target systems Final goal systems is determined in system, and the user of terminal is avoided to manually select final goal systems in multiple goal systems, To keep terminal more intelligent.
In the above-mentioned technical solutions, it is preferable that the first identifier information, the second identifier information, the third mark Know information and the pre-stored matching identification information includes: system access key, random code, finger print information, facial characteristics letter At least one information in breath, voice identification information.
In the technical scheme, first identifier information, second identifier information, third identification information and pre-stored matching mark Knowing information includes but is not limited to: system access key, random code, finger print information, face feature information, in voice identification information At least one information, due to first identifier information, second identifier information, third identification information and pre-stored matching identification information It is in real time or periodically constantly to change, avoids first identifier information, second identifier information, third identification information and be pre-stored Matching identification information leaked, avoid illegal user from entering in the higher system of security level of terminal, so improve The security performance that terminal remote logs in.
Fig. 5 shows the structural schematic diagram of terminal according to an embodiment of the invention.
As shown in figure 5, terminal 500 according to an embodiment of the invention, including any one of above-mentioned technical proposal institute The system access mechanism 400 stated.
In the technical scheme, when the specified data in remote acquisition terminal 500 in the higher goal systems of security level When, and terminal 500 operates in the lower current system of security level, at this point, terminal 500 and other any terminals are built first Vertical connection allows the user of other any terminals to send first identifier information to terminal 500 by other any terminals, and The user of terminal 500 is set to input second identifier information to terminal 500, when first identifier information and second identifier information matches When, this illustrate be between the user of terminal 500 and the user of other any terminals it is trusty, then allow terminal 500 by current System switches in goal systems, enters the user of terminal 500 temporarily in goal systems, when first identifier information with When second identifier information mismatches, this explanation logs on to the situation in goal systems there may be remote authorization is upset, for example, black The case where visitor is to malicious attack or the logon attempt of network, then forbid terminal 500 to be switched in goal systems by current system, separately Outside, since first identifier information and second identifier information can be avoided with real-time change using peace fixed in the related technology Full key carrys out remote authorization and enters in goal systems, thus specified in goal systems when security key being avoided illegally to be stolen Data are leaked, to improve the safety that remote authorization enters in the higher system of security level.
Fig. 6 shows the original that remote terminal authorization terminal according to an embodiment of the invention carries out secure system access Manage structural schematic diagram.
As shown in fig. 6, remote terminal according to an embodiment of the invention and terminal carry out system access (in the implementation In example, terminal is mobile phone, and dual system, the i.e. lower conventional system of security level and the higher peace of security level are equipped on mobile phone The current system of total system, mobile phone is conventional system, and mobile phone can carry out digital service, in addition, remote terminal has fingerprint The function of identification), comprising:
1. logging in APK by remote terminal, mobile phone and remote terminal is made to establish connection, it is specified for can establish one Access end to end.
2. illustrating mobile phone and remote terminal successful connection, mobile phone and long-range end by sending feedback information to remote terminal End enters the interface of input passwords, then the user of mobile phone and the user of remote terminal can negotiate one match it is close Code.
3. mobile phone receives the passwords (second identifier information) of user (user of the terminal) input of mobile phone, long-range whole Termination receives the passwords (first identifier information) of user (users of other any terminals) input of remote terminal, by the two Passwords matched.
If allowing remote terminal to enter the interface of input finger print information (third identification information) 4. successful match, for example, The relevant informations such as display " waiting in finger print information certification ... " on mobile phone, if re-entering mobile phone without successful match Passwords and remote terminal passwords, re-start matching.
5. inputting finger print information in the interface of input finger print information.
6. if the user of Successful authorization mobile phone can the finger print information of input and pre-stored matching identification information matches Temporarily to enter in security system, mobile phone is switched in security system by conventional system, and the user of mobile phone can temporarily pacify It is operated in total system.If the finger print information of input and pre-stored matching identification information mismatch, authorization failure, The related announcement that finger print information mistake is shown on remote terminal makes the user of remote terminal re-enter another finger print information, So as to which another finger print information is matched with pre-stored matching identification information again.
Carry out the technical solution that the present invention will be described in detail below with reference to one embodiment, for example, after user A working to company It was found that mobile phone is forgotten to be in, wherein the mobile phone is equipped with dual system, the i.e. lower conventional system of security level and security level Higher security system needs to report several significant datas to leader at this time, and data exist in the security system of mobile phone, hand Machine operates in conventional system, needs the finger print information of user A, and mobile phone could be switched in security system from conventional system, Just user B can touch mobile phone, and user B is not the rival of user's company A, will not make to the data of user A At any threat, so being trusty between user A and user B.That should can just allow this user B trusty to help The security system of interim operating handset, to provide data from security system.It is combined by passwords and finger print information Mode, allows user B to succeed and reliably into security system, because inputting the mode of fixed password in the related technology It is easy to be seen by other users, so that unauthorized access of the illegal user to security system is caused, in addition, passing through single fingerprint The problems such as information enters security system to carry out remote authorization, can be potentially encountered the network attack or logon attempt of access connection, To cause to cannot connect to mobile phone with the user of handset binding or connection delay is serious.
According to the technical solution of the present invention, passwords are inputted by the user of the user of mobile phone and remote terminal respectively, When the matching of the passwords of the two, it can establish one-to-one and access end to end, other upsets can be effectively avoided The case where login, substantially increases the safety of remote authorization in addition, identifying this bio-identification mode using finger print information.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, enters the security level of terminal in remote authorization During higher system, it can be ensured that the Information Security of the higher system of security level, it is ensured that enter security level compared with The safety of this process of high system is effectively prevented from illegal user and enters in the higher system of security level, to keep away The data exempted from the higher system of security level are illegally stolen, and the security performance of the security system of terminal is improved.
In the present invention, term " first ", " second " are only used for the purpose described, are not understood to indicate or imply phase To importance;Term " multiple " indicates two or more;Term " connection " etc. shall be understood in a broad sense, for example, it may be It is fixedly connected, may be a detachable connection, or be integrally connected.For the ordinary skill in the art, Ke Yigen The concrete meaning of above-mentioned term in the present invention is understood according to concrete condition.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (7)

1. a kind of system access method, for being equipped with the terminal of multiple systems characterized by comprising
After the terminal and other any terminals that operate in current system establish connection, receive from other described any ends The first identifier information at end;
Receive the second identifier information inputted in the terminal;
Judge whether the first identifier information matches with the second identifier information, and when the judgment result is yes, allows institute It states terminal and goal systems is switched to by the current system;Otherwise, the terminal is forbidden to be switched to by the current system described Goal systems;Wherein, the goal systems is the security level that security level is higher than the current system in the multiple system System, other described any terminals be the terminal except any terminal;
After allowing the terminal to switch to the goal systems by the current system, the terminal is controlled by described current System switches to the goal systems so that the user of the terminal the specified data in the goal systems are sent to it is described Other any terminals;
Before allowing the terminal to switch to the goal systems by the current system, further includes:
The matching result that the first identifier information and the second identifier information match is returned to other described any terminals, So that other described any terminals send third identification information to the terminal again;
After receiving the third identification information, judge whether are the third identification information and pre-stored matching identification information Matching, and when the judgment result is yes, determining allows the terminal to switch to the goal systems by the current system, no Then, the terminal is forbidden to switch to the goal systems by the current system.
2. system according to claim 1 access method, which is characterized in that further include:
When there are multiple goal systems, if the first identifier information matches with the second identifier information, root According to the frequency of use of each goal systems in multiple goal systems and/or the system from other any terminals Mark, determines final goal systems.
3. system access method according to claim 1 or 2, which is characterized in that
The first identifier information, the second identifier information, the third identification information and the pre-stored matching identification Information include: system access key, random code, finger print information, face feature information, in voice identification information at least one of letter Breath.
4. a kind of system access mechanism, for being equipped with the terminal of multiple systems characterized by comprising
First receiving unit, after the terminal and other any terminals that operate in current system establish connection, reception is come from The first identifier information of other any terminals;
Second receiving unit receives the second identifier information inputted in the terminal;
Judging unit, judges whether the first identifier information matches with the second identifier information;
Processing unit allows the terminal to switch to goal systems by the current system when the judgment result is yes;Otherwise, The terminal is forbidden to switch to the goal systems by the current system;Wherein, the goal systems is the multiple system The system that middle security level is higher than the security level of the current system, other described any terminals are appointing except the terminal One terminal;
Further include:
Control unit controls the terminal after allowing the terminal to switch to the goal systems by the current system The goal systems is switched to by the current system, so that the user of the terminal is by the specified data in the goal systems It is sent to other described any terminals;
Transmission unit, before allowing the terminal to switch to the goal systems by the current system, to it is described other The matching result that one terminal returns to the first identifier information and the second identifier information matches, so that described, other are any Terminal sends third identification information to the terminal again;
The judging unit is also used to: after receiving the third identification information, being judged the third identification information and is prestored Whether the matching identification information of storage matches;
The processing unit is also used to: when the judgment result is yes, determining allows the terminal to be switched to by the current system Otherwise the goal systems forbids the terminal to switch to the goal systems by the current system.
5. system access mechanism according to claim 4, which is characterized in that further include:
The processing unit is also used to: when there are multiple goal systems, if the first identifier information and described second Identification information matches, then according to the frequency of use of the goal systems each in multiple goal systems and/or from institute The system banner for stating other any terminals determines final goal systems.
6. system access mechanism according to claim 4 or 5, which is characterized in that
The first identifier information, the second identifier information, the third identification information and the pre-stored matching identification Information include: system access key, random code, finger print information, face feature information, in voice identification information at least one of letter Breath.
7. a kind of terminal characterized by comprising the system access mechanism as described in any one of claim 4 to 6.
CN201510040758.2A 2015-01-27 2015-01-27 System access method, system access mechanism and terminal Active CN105635090B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510040758.2A CN105635090B (en) 2015-01-27 2015-01-27 System access method, system access mechanism and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510040758.2A CN105635090B (en) 2015-01-27 2015-01-27 System access method, system access mechanism and terminal

Publications (2)

Publication Number Publication Date
CN105635090A CN105635090A (en) 2016-06-01
CN105635090B true CN105635090B (en) 2019-04-12

Family

ID=56049586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510040758.2A Active CN105635090B (en) 2015-01-27 2015-01-27 System access method, system access mechanism and terminal

Country Status (1)

Country Link
CN (1) CN105635090B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566322A (en) * 2016-06-30 2018-01-09 惠州华阳通用电子有限公司 A kind of onboard system multi-user access method and device
CN106357606A (en) * 2016-08-19 2017-01-25 宇龙计算机通信科技(深圳)有限公司 Authentication method, authentication device and terminal
WO2019037084A1 (en) * 2017-08-25 2019-02-28 深圳传音通讯有限公司 Dual-system switching method, motile terminal, and computer-readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237064A (en) * 2013-04-11 2013-08-07 百度在线网络技术(北京)有限公司 Terminals, and method, system and cloud server for remote locking of terminals
CN103955638A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Method and device for privacy protection
CN104243716A (en) * 2014-09-28 2014-12-24 酷派软件技术(深圳)有限公司 Information acquiring method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237064A (en) * 2013-04-11 2013-08-07 百度在线网络技术(北京)有限公司 Terminals, and method, system and cloud server for remote locking of terminals
CN103955638A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Method and device for privacy protection
CN104243716A (en) * 2014-09-28 2014-12-24 酷派软件技术(深圳)有限公司 Information acquiring method and device

Also Published As

Publication number Publication date
CN105635090A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
CN104639624B (en) A kind of method and apparatus for realizing mobile terminal remote access control
EP2857947B1 (en) Terminal device and unlocking method thereof
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN104156657B (en) The data inputting method of terminal, the message input device of terminal and terminal
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
CN108173822A (en) Intelligent door lock management-control method, intelligent door lock and computer readable storage medium
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
CN107067516A (en) Method for unlocking and system and door-locking system
CN102215221A (en) Methods and systems for secure remote wake, boot, and login to a computer from a mobile device
CN105530356A (en) Mobile communication terminal and data protection method and apparatus thereof
CN103728894A (en) Remote control method and system of terminal device
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
CN104009844A (en) Multilevel password processing method based on safety management
CN104794402A (en) System switching method, system switching device and terminal
CN112528257A (en) Security debugging method and device, electronic equipment and storage medium
CN103283268A (en) Wireless terminal and method for managing connection of network using same
CN105635090B (en) System access method, system access mechanism and terminal
CN109035515A (en) The control method and door-locking system of smart lock
US20140337951A1 (en) Security management system including multiple relay servers and security management method
CN113674455B (en) Remote control method, device, system, equipment and storage medium for intelligent door lock
CN106027467B (en) A kind of identity card reading response system
CN102333068B (en) SSH and SFTP (Secure Shell and Ssh File Transfer Protocol)-based tunnel intelligent management and control system and method
EP2436164B1 (en) Method and equipment for establishing secure connection on a communication network
CN106506491B (en) Network safety system
CN111946163A (en) Method and system for remotely opening door by visual intelligent lock

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant