CN105787318A - User domain access method and device as well as mobile terminal - Google Patents

User domain access method and device as well as mobile terminal Download PDF

Info

Publication number
CN105787318A
CN105787318A CN201610182256.8A CN201610182256A CN105787318A CN 105787318 A CN105787318 A CN 105787318A CN 201610182256 A CN201610182256 A CN 201610182256A CN 105787318 A CN105787318 A CN 105787318A
Authority
CN
China
Prior art keywords
user
access
information
user domain
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610182256.8A
Other languages
Chinese (zh)
Other versions
CN105787318B (en
Inventor
崔宇
王晓菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610182256.8A priority Critical patent/CN105787318B/en
Priority to PCT/CN2016/080617 priority patent/WO2017166359A1/en
Publication of CN105787318A publication Critical patent/CN105787318A/en
Application granted granted Critical
Publication of CN105787318B publication Critical patent/CN105787318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention provides a user domain access method and device as well as a mobile terminal. The user domain access method comprises steps as follows: an access to a designated user domain is hidden; whether trigger information for triggering access to the designated user domain is acquired is detected; identity verification is performed on a user accessing the designated user domain when the trigger information is acquired; if the user passes the identity verification, the designated user domain is operated. According to the technical scheme, the access to the user domain is hidden, a dynamic access password is set for the user domain, accordingly, the problems of poor confidentiality, high secret disclosure and the like of access modes in related techniques are effectively solved, the safety of the user domain is greatly improved in the whole access process, and actual demands of a user are met.

Description

The access method of user domain, access device and mobile terminal
Technical field
The present invention relates to field of terminal technology, in particular to the access method of a kind of user domain, the access device of a kind of user domain and a kind of mobile terminal.
Background technology
Along with the development of mobile terminal, the function that intelligent terminal possesses gets more and more, and application scenarios emerges in an endless stream, and meanwhile, safety issue also increasingly receives publicity.In correlation technique; safety in order to ensure some application in mobile terminal and information; the level of security security domain higher than canonical domain can be separately built to store these application and information outside canonical domain; would generally arranging the icon of this security domain in canonical domain, using the access entrance as this security domain, user is when conducting interviews to this security domain; clickable icon can be passed through; and after inputting correct checking password, enter this security domain, but the access mode of this security domain is primarily present following shortcoming:
One, crypticity is poor: anyone, it can be seen that security domain icon, after click, all can attempt password authentification.
Two, divulging a secret property height: owing to there being the existence of the access entrances such as icon on interface, user is in the process of input password, it is possible to causes that password is revealed, there is very big potential safety hazard.
Therefore, how to realize the secure access of user domain is become technical problem urgently to be resolved hurrily.
Summary of the invention
The present invention be based on above-mentioned technical problem at least one, propose the access scheme of a kind of new user domain, efficiently avoid the problems such as access mode confidentiality in correlation technique is poor, divulging a secret property is high, substantially increase the safety of the whole access process of user domain, meet the actual demand of user.
In view of this, the present invention proposes the access method of a kind of user domain, including: hide the access entrance specifying user domain;Detect whether to get for triggering the trigger message that described appointment user domain is conducted interviews;Determine get described trigger message time, to access described appointment user domain user carry out authentication;If the authentication of described user is passed through, then run described appointment user domain.
nullIn this technical scheme,By the access entrance of hiding user domain, (user can be according to the actual requirements,Any user territory in terminal is hidden,Particularly storage has the user domain of user's private information or some payment application etc.),After hiding the access entrance of user domain,Any interface of terminal does not all show the icon etc. of this user domain,The all other men except user are made to be difficult to know the existence of this user domain,Efficiently solve the problem of confidentiality difference when user domain accesses in correlation technique,And when the appointment user domain hiding access entrance is had requirements for access by user,Terminal is passed through to detect whether to get for triggering the trigger message specifying user domain to conduct interviews,And determine get trigger message time,Authentication is carried out to accessing the user specifying user domain,Pass through with the authentication to user,Rerun appointment user domain,Owing to the access entrance of user domain is hiding,When user is carried out authentication,Checking information for user's input,Other people are difficult to be associated checking information and the user domain hidden,Reduce the probability of password leakage,Ensure that the safety of the whole access process of user domain,Meet secret and the demand for security of user to user domain browsing process.
In technique scheme, preferably, detect whether to get for triggering the step to the trigger message specifying user domain to conduct interviews, specifically include: obtain the character information of described user input, and judge whether described character information and preset characters information match, when judging described character information and described preset characters information match, it is determined that get described trigger message;Or obtain the information that described user's continuous several times inputs, and judge whether the information that described user inputs every time all matches with presupposed information, when the information judging that described user inputs all matches with described presupposed information every time, it is determined that get described trigger message.
In this technical scheme, after the access entrance of user domain is hidden, when user needs to access this user domain, can be realized by number of ways: preset characters information (preset characters information can be configured) can be inputted by user preset, for instance at urgent call interface inputing characters information " * * ## ";Continuous several times can also input same presupposed information (presupposed information can be pre-set) by user, as unlocked the presupposed information that on interface, continuous 2 inputs are same, when first time input presupposed information completes, informations such as " input errors; please retry " can be shown simultaneously, second time continues with same presupposed information, and other people are had certain fascination by whole process, therefore can improve safety.
In any of the above-described technical scheme, preferably, the step that the user accessing described appointment user domain is carried out authentication, specifically include: obtain at least one in predetermined interface and unlock element, and according at least one unblock element described, calculate the access password of described appointment user domain;Obtain the checking information of described user input;Judge whether described checking information and described access password match;If it is determined that described checking information and described access code matches, it is determined that the authentication of described user is passed through.
In this technical scheme, if considering, the access password of user domain is fixed, user accesses every time and can input same password, it is possible to can there is the potential safety hazard of password leakage, therefore unlocks element by least one acquisition in predetermined interface, and unlock element according at least one, calculate the access password specifying user domain so that the access password of user domain is in upset condition, is not fixedly installed, the input password that user will not fix when accessing, efficiently avoid password leakage.Wherein, unlocking element can be the time in predetermined interface, date, character information etc..
In any of the above-described technical scheme, preferably, according at least one unblock element described, calculate the step accessing password of described appointment user domain, specifically include: determine the preset password create-rule that each unblock element at least one unblock element described is corresponding;According to the preset password create-rule that at least one unblock element described is corresponding with described each unblock element, calculate described access password.
In this technical scheme, when calculating access password, can calculate especially by least one preset password create-rule unlocking element corresponding with each unblock element, wherein, unlocking element can be the time in predetermined interface, date, character information etc., such as, using the time (10:51) as unlocking element, using the method for falling row as corresponding preset password create-rule, so calculate current checking password for " 1501 ", to how to calculate, this example is only for verifying that password illustrates, do not do any restriction, user can set the quantity unlocking element according to the actual requirements, and the preset password create-rule corresponding with each unblock element, the preset password of each unblock element becomes the rule can be identical, can also be different.
In any of the above-described technical scheme, it is preferable that before judging the step whether described checking information and described access password match, also include: whether detection gets described checking information in the scheduled time after getting described trigger message;If it is determined that get described checking information within the described scheduled time, then perform the described step judging whether described checking information mates with described access password.
In this technical scheme, by detect get get checking information in the scheduled time after trigger message time, perform again further to mate checking, ageing when ensure that on the one hand checking, also avoid backstage to be constantly in state to be verified on the other hand, reduce system operating load.
According to the second aspect of the invention, it is proposed that the access device of a kind of user domain, including: hidden unit, for hiding the access entrance specifying user domain;First detection unit, for detecting whether get for triggering the trigger message that described appointment user domain is conducted interviews;Identity authenticating unit, for determine get described trigger message time, to access described appointment user domain user carry out authentication;Processing unit, for when the authentication of described user is passed through by described identity authenticating unit, running described appointment user domain.
nullIn this technical scheme,By the access entrance of hiding user domain, (user can be according to the actual requirements,Any user territory in terminal is hidden,Particularly storage has the user domain of user's private information or some payment application etc.),After hiding the access entrance of user domain,Any interface of terminal does not all show the icon etc. of this user domain,The all other men except user are made to be difficult to know the existence of this user domain,Efficiently solve the problem of confidentiality difference when user domain accesses in correlation technique,And when the appointment user domain hiding access entrance is had requirements for access by user,Terminal is passed through to detect whether to get for triggering the trigger message specifying user domain to conduct interviews,And determine get trigger message time,Authentication is carried out to accessing the user specifying user domain,Pass through with the authentication to user,Rerun appointment user domain,Owing to the access entrance of user domain is hiding,When user is carried out authentication,Checking information for user's input,Other people are difficult to be associated checking information and the user domain hidden,Reduce the probability of password leakage,Ensure that the safety of the whole access process of user domain,Meet secret and the demand for security of user to user domain browsing process.
In technique scheme, preferably, described first detection unit specifically for: obtain described user input character information, and judge whether described character information and preset characters information match, when judging described character information and described preset characters information match, it is determined that get described trigger message;Or obtain the information that described user's continuous several times inputs, and judge whether the information that described user inputs every time all matches with presupposed information, when the information judging that described user inputs all matches with described presupposed information every time, it is determined that get described trigger message.
In this technical scheme, after the access entrance of user domain is hidden, when user needs to access this user domain, can be realized by number of ways: preset characters information (preset characters information can be configured) can be inputted by user preset, for instance at urgent call interface inputing characters information " * * ## ";Continuous several times can also input same presupposed information (presupposed information can be pre-set) by user, as unlocked the presupposed information that on interface, continuous 2 inputs are same, when first time input presupposed information completes, informations such as " input errors; please retry " can be shown simultaneously, second time continues with same presupposed information, and other people are had certain fascination by whole process, therefore can improve safety.
In any of the above-described technical scheme, it is preferable that described identity authenticating unit includes: the first acquiring unit, unlock element at least one acquisition in predetermined interface;Computing unit, for according at least one unblock element described, calculating the access password of described appointment user domain;Second acquisition unit, for obtaining the checking information of described user input;Judging unit, is used for judging whether described checking information and described access password match;Determine unit, for when described judging unit judges described checking information and described access code matches, it is determined that the authentication of described user is passed through.
In this technical scheme, if considering, the access password of user domain is fixed, user accesses every time and can input same password, it is possible to can there is the potential safety hazard of password leakage, therefore unlocks element by least one acquisition in predetermined interface, and unlock element according at least one, calculate the access password specifying user domain so that the access password of user domain is in upset condition, is not fixedly installed, the input password that user will not fix when accessing, efficiently avoid password leakage.Wherein, unlocking element can be the time in predetermined interface, date, character information etc..
In any of the above-described technical scheme, it is preferable that described computing unit specifically for: determine described at least one unlock the preset password create-rule that each unblock element in element is corresponding;According to the preset password create-rule that at least one unblock element described is corresponding with described each unblock element, calculate described access password.
In this technical scheme, when calculating access password, can calculate especially by least one preset password create-rule unlocking element corresponding with each unblock element, wherein, unlocking element can be the time in predetermined interface, date, character information etc., such as, using the time (10:51) as unlocking element, using the method for falling row as corresponding preset password create-rule, so calculate current checking password for " 1501 ", to how to calculate, this example is only for verifying that password illustrates, do not do any restriction, user can set the quantity unlocking element according to the actual requirements, and the preset password create-rule corresponding with each unblock element, the preset password of each unblock element becomes the rule can be identical, can also be different.
In any of the above-described technical scheme, it is preferable that also include: the second detection unit, for detecting in the scheduled time after getting described trigger message whether get described checking information;Described judging unit, specifically for when described second detection unit is determined and is got described checking information within the described scheduled time, it is judged that whether described checking information mates with described access password.
In this technical scheme, by detect get get checking information in the scheduled time after trigger message time, perform again further to mate checking, ageing when ensure that on the one hand checking, also avoid backstage to be constantly in state to be verified on the other hand, reduce system operating load.
According to the third aspect of the invention we, it is also proposed that a kind of mobile terminal, including the access device of the user domain as according to any one of technique scheme.
By above technical scheme, hide the access entrance of user domain and arrange for user domain and access password dynamically, efficiently avoid the problems such as access mode confidentiality in correlation technique is poor, divulging a secret property is high, substantially increase the safety of the whole access process of user domain, meet the actual demand of user.
Accompanying drawing explanation
Fig. 1 illustrates the schematic flow diagram of the access method of user domain according to an embodiment of the invention;
Fig. 2 illustrates the schematic block diagram accessing device of user domain according to an embodiment of the invention;
Fig. 3 illustrates the schematic block diagram of mobile terminal according to an embodiment of the invention;
Fig. 4 A and Fig. 4 B illustrates the interface schematic diagram of mobile terminal according to an embodiment of the invention;
Fig. 5 illustrates the schematic flow diagram of the access method of user domain according to another embodiment of the invention.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that when not conflicting, embodiments herein and the feature in embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention; but; the present invention can also adopt other to be different from other modes described here to implement, and therefore, protection scope of the present invention is by the restriction of following public specific embodiment.
Fig. 1 illustrates the schematic flow diagram of the access method of user domain according to an embodiment of the invention.
As it is shown in figure 1, the access method of user domain according to an embodiment of the invention, including:
Step 102, hides the access entrance specifying user domain;
Step 104, detects whether to get for triggering the trigger message that described appointment user domain is conducted interviews;
Step 106, determine get described trigger message time, to access described appointment user domain user carry out authentication;
Step 108, if the authentication of described user is passed through, then runs described appointment user domain.
nullIn this technical scheme,By the access entrance of hiding user domain, (user can be according to the actual requirements,Any user territory in terminal is hidden,Particularly storage has the user domain of user's private information or some payment application etc.),After hiding the access entrance of user domain,Any interface of terminal does not all show the icon etc. of this user domain,The all other men except user are made to be difficult to know the existence of this user domain,Efficiently solve the problem of confidentiality difference when user domain accesses in correlation technique,And when the appointment user domain hiding access entrance is had requirements for access by user,Terminal is passed through to detect whether to get for triggering the trigger message specifying user domain to conduct interviews,And determine get trigger message time,Authentication is carried out to accessing the user specifying user domain,Pass through with the authentication to user,Rerun appointment user domain,Owing to the access entrance of user domain is hiding,When user is carried out authentication,Checking information for user's input,Other people are difficult to be associated checking information and the user domain hidden,Reduce the probability of password leakage,Ensure that the safety of the whole access process of user domain,Meet secret and the demand for security of user to user domain browsing process.
In technique scheme, preferably, detect whether to get for triggering the step to the trigger message specifying user domain to conduct interviews, specifically include: obtain the character information of described user input, and judge whether described character information and preset characters information match, when judging described character information and described preset characters information match, it is determined that got described trigger message;Or obtain the information of described user's continuous several times input, and judge whether the information that described user inputs every time all matches with presupposed information, when the information judging that described user inputs all matches with described presupposed information every time, it is determined that got described trigger message.
In this technical scheme, after the access entrance of user domain is hidden, when user needs to access this user domain, can be realized by number of ways: preset characters information (preset characters information can be configured) can be inputted by user preset, for instance at urgent call interface inputing characters information " * * ## ";Continuous several times can also input same presupposed information (presupposed information can be pre-set) by user, as unlocked the presupposed information that on interface, continuous 2 inputs are same, when first time input presupposed information completes, informations such as " input errors; please retry " can be shown simultaneously, second time continues with same presupposed information, and other people are had certain fascination by whole process, therefore can improve safety.
In any of the above-described technical scheme, preferably, the step that the user accessing described appointment user domain is carried out authentication, specifically include: obtain at least one in predetermined interface and unlock element, and according at least one unblock element described, calculate the access password of described appointment user domain;Obtain the checking information of described user input;Judge whether described checking information and described access password match;If it is determined that described checking information and described access code matches, it is determined that the authentication of described user is passed through.
In this technical scheme, if considering, the access password of user domain is fixed, user accesses every time and can input same password, it is possible to can there is the potential safety hazard of password leakage, therefore unlocks element by least one acquisition in predetermined interface, and unlock element according at least one, calculate the access password specifying user domain so that the access password of user domain is in upset condition, is not fixedly installed, the input password that user will not fix when accessing, efficiently avoid password leakage.Wherein, unlocking element can be the time in predetermined interface, date, character information etc..
In any of the above-described technical scheme, preferably, according at least one unblock element described, calculate the step accessing password of described appointment user domain, specifically include: determine the preset password create-rule that each unblock element at least one unblock element described is corresponding;According to the preset password create-rule that at least one unblock element described is corresponding with described each unblock element, calculate described access password.
In this technical scheme, when calculating access password, can calculate especially by least one preset password create-rule unlocking element corresponding with each unblock element, wherein, unlocking element can be the time in predetermined interface, date, character information etc., such as, using the time (10:51) as unlocking element, using the method for falling row as corresponding preset password create-rule, so calculate current checking password for " 1501 ", to how to calculate, this example is only for verifying that password illustrates, do not do any restriction, user can set the quantity unlocking element according to the actual requirements, and the preset password create-rule corresponding with each unblock element, the preset password of each unblock element becomes the rule can be identical, can also be different.
In any of the above-described technical scheme, it is preferable that before judging the step whether described checking information and described access password match, also include: whether detection gets described checking information in the scheduled time after getting described trigger message;If it is determined that get described checking information within the described scheduled time, then perform the described step judging whether described checking information mates with described access password.
In this technical scheme, by detect get get checking information in the scheduled time after trigger message time, perform again further to mate checking, ageing when ensure that on the one hand checking, also avoid backstage to be constantly in state to be verified on the other hand, reduce system operating load.
Fig. 2 illustrates the schematic block diagram accessing device of user domain according to an embodiment of the invention.
As in figure 2 it is shown, the access device 200 of user domain according to an embodiment of the invention, including: hidden unit 202, first detects unit 204, identity authenticating unit 206 and processing unit 208.
Wherein, hidden unit 202, for hiding the access entrance specifying user domain;First detection unit 204, for detecting whether get for triggering the trigger message that described appointment user domain is conducted interviews;Identity authenticating unit 206, for determine get described trigger message time, to access described appointment user domain user carry out authentication;Processing unit 208, for when the authentication of described user is passed through by described identity authenticating unit, running described appointment user domain.
nullIn this technical scheme,By the access entrance of hiding user domain, (user can be according to the actual requirements,Any user territory in terminal is hidden,Particularly storage has the user domain of user's private information or some payment application etc.),After hiding the access entrance of user domain,Any interface of terminal does not all show the icon etc. of this user domain,The all other men except user are made to be difficult to know the existence of this user domain,Efficiently solve the problem of confidentiality difference when user domain accesses in correlation technique,And when the appointment user domain hiding access entrance is had requirements for access by user,Terminal is passed through to detect whether to get for triggering the trigger message specifying user domain to conduct interviews,And determine get trigger message time,Authentication is carried out to accessing the user specifying user domain,Pass through with the authentication to user,Rerun appointment user domain,Owing to the access entrance of user domain is hiding,When user is carried out authentication,Checking information for user's input,Other people are difficult to be associated checking information and the user domain hidden,Reduce the probability of password leakage,Ensure that the safety of the whole access process of user domain,Meet secret and the demand for security of user to user domain browsing process.
In technique scheme, preferably, described first detection unit 204 specifically for: obtain described user input character information, and judge whether described character information and preset characters information match, when judging described character information and described preset characters information match, it is determined that got described trigger message;Or obtain the information of described user's continuous several times input, and judge whether the information that described user inputs every time all matches with presupposed information, when the information judging that described user inputs all matches with described presupposed information every time, it is determined that got described trigger message.
In this technical scheme, after the access entrance of user domain is hidden, when user needs to access this user domain, can be realized by number of ways: preset characters information (preset characters information can be configured) can be inputted by user preset, for instance at urgent call interface inputing characters information " * * ## ";Continuous several times can also input same presupposed information (presupposed information can be pre-set) by user, as unlocked the presupposed information that on interface, continuous 2 inputs are same, when first time input presupposed information completes, informations such as " input errors; please retry " can be shown simultaneously, second time continues with same presupposed information, and other people are had certain fascination by whole process, therefore can improve safety.
In any of the above-described technical scheme, it is preferable that described identity authenticating unit 206 includes: the first acquiring unit 206A, unlock element at least one acquisition in predetermined interface;Computing unit 206B, for according at least one unblock element described, calculating the access password of described appointment user domain;Second acquisition unit 206C, for obtaining the checking information of described user input;Judging unit 206D, is used for judging whether described checking information and described access password match;Determine unit 206E, for when described judging unit judges described checking information and described access code matches, it is determined that the authentication of described user is passed through.
In this technical scheme, if considering, the access password of user domain is fixed, user accesses every time and can input same password, it is possible to can there is the potential safety hazard of password leakage, therefore unlocks element by least one acquisition in predetermined interface, and unlock element according at least one, calculate the access password specifying user domain so that the access password of user domain is in upset condition, is not fixedly installed, the input password that user will not fix when accessing, efficiently avoid password leakage.Wherein, unlocking element can be the time in predetermined interface, date, character information etc..
In any of the above-described technical scheme, it is preferable that described computing unit 206B specifically for: determine described at least one unlock the preset password create-rule that each unblock element in element is corresponding;According to the preset password create-rule that at least one unblock element described is corresponding with described each unblock element, calculate described access password.
In this technical scheme, when calculating access password, can calculate especially by least one preset password create-rule unlocking element corresponding with each unblock element, wherein, unlocking element can be the time in predetermined interface, date, character information etc., such as, using the time (10:51) as unlocking element, using the method for falling row as corresponding preset password create-rule, so calculate current checking password for " 1501 ", to how to calculate, this example is only for verifying that password illustrates, do not do any restriction, user can set the quantity unlocking element according to the actual requirements, and the preset password create-rule corresponding with each unblock element, the preset password of each unblock element becomes the rule can be identical, can also be different.
In any of the above-described technical scheme, it is preferable that also include: the second detection unit 210, for detecting in the scheduled time after getting described trigger message whether get described checking information;Described judging unit 206D, specifically for when described second detection unit 210 is determined and is got described checking information within the described scheduled time, it is judged that whether described checking information mates with described access password.
In this technical scheme, by detect get get checking information in the scheduled time after trigger message time, perform again further to mate checking, ageing when ensure that on the one hand checking, also avoid backstage to be constantly in state to be verified on the other hand, reduce system operating load.
Fig. 3 illustrates the schematic block diagram of mobile terminal according to an embodiment of the invention.
As it is shown on figure 3, mobile terminal 300 according to an embodiment of the invention, including: the access device 200 of user domain as shown in Figure 2.
Below in conjunction with Fig. 4 A, Fig. 4 B and Fig. 5, technical scheme is described further.
In the present embodiment, initial phase: can in " setting-> screen locking " setting option in the terminal, increase " security domain unlatching " option of a special disposal security domain strategy, can be configured for security domain open operation, the mode specifically including " guide's password " selects, the setting of " guide's password ", the algorithm setting etc. of " security password ", it is hidden this security domain arranging simultaneously, namely any interface in the terminal does not all show the access entrance (identification information such as icon such as security domain) of this security domain, user can arrange the incidence relation between " guide's password " and security domain, so that mobile terminal is in subsequent processes, perform to trigger the access to security domain according to " guide's password ".
Wherein, the effect of " guide's password " is on " first waveguide mode ": trial is entered " security domain " by notice system user, this is carried out relevant preparation, as backstage pull-up related content, the algorithm set according to user and relevant information obtain currently " security password ", prepare to verify the input password etc. of user.
" guide's password " is divided into two kinds:
I: " prefix type guide's password "
As shown in Figure 4 A, locking screen interface all exists " urgent call " function 402, after clicking 402, " urgent call " interface can be entered, it can be used as hidden close security domain to unlock interface, not only there is significantly high disguise, further increase the operable space that password is arranged.
As shown in Figure 4 B, at " urgent call " interface, " the prefix password " that input is arranged, such as " * * ## ", opening " first waveguide mode ", system can calculate now " security password " automatically, and user can directly be verified in " prefix password " input validation information afterwards, if " security password " that the checking password of user's input and system-computed go out the match is successful, then can enter security domain.
II: " confusing type guide's password "
Arranging of " confusing type guide's password " can based on normal locking screen interface, as figure unlocks interface, numeral unlocks interface etc., it is identical that it arranges regular with general unlocking pin, it is distinctive in that: first during input " confusing type guide's password ", meeting prompt cipher input error, after need to again inputting same " confusing type guide's password ", " first waveguide mode " can be opened, the backstage carrying out security domain prepares, after being typically in startup " first waveguide mode ", " urgent call " interface can be jumped to, the checking password of user's input is received by " urgent call " interface, further verify.
Starting the scheduled duration of " first waveguide mode " (namely from the scheduled duration after input " guiding password ", this scheduled duration can be arranged by User Defined or system default) in judge whether to receive the checking password of user's input, if exceeding this scheduled duration be not verified the input operation of password, will move out " first waveguide mode ", even if hereafter inputting correct checking password, also can not get the checking of system.
" security password " that system-computed goes out is after entering " first waveguide mode ", checking password for security domain, it does not adopt fixed pattern password, algorithmic form password setting is carried out in combinations with the appointment information (appointment information can be arranged by User Defined, as being date on screen, time and screen locking information etc.) on Keyguard (keypad lock) interface.
As illustrated designating the information as the current date and time on locking screen interface, as current time of day is: 2016.01.2912:31:
Algorithm (i.e. preset password create-rule) is illustrated:
Arrange method: fall to arrange by current time of day (2016.01.2912:31), it is set to " security password ", then obtaining " security password " is " 132192106102 ", user is when practical operation, the checking password simply entered is " 132192106102 ", namely may have access to security domain, operate relatively simple.
Counter-point: user can in the Initialize installation stage, according to self operating habit and demand, contrapositive rule is arbitrarily set, the present embodiment illustrates with following contrapositive rule: from left to right, taking 4 respectively is that a unit is (if " 2016 " are one group, " 0129 " is one group, " 1231 " are one group), it is classified as 2 pairs of 2 figure places again, carry out the computing of ten and a position respectively, it is example with additive: 20, 16 corresponding addition (2+1, 0+6), month is added (0+2 with day part para-position, 1+9), Shi Weiyu divides bit-by-bit to be added (1+3, 2+1), obtaining " security password " is " 3621043 ".
Pinyin method: based on self-defining screen locking information, taking numeral corresponding to its phonetic is password.Such as " welcoming you " (HuanYingNi), then obtaining " security password " is " 4826946464 ", it is of course also possible to arranging letter " HuanYingNi " is " security password ".
The specifically processing procedure when implementing, as it is shown in figure 5, include:
Step 502, it may be judged whether be in locking screen interface, if so, performs step 504;Otherwise, step 516 is performed.
Step 504, it may be judged whether have " prefix type guide's password " or " confusing type guide's password " to be verified, if so, performs step 506;Otherwise, step 516 is performed.
Step 506, opens " first waveguide mode ", and calculates current " security password " by set algorithm and the information of appointment.
Step 508, it is judged that in the scheduled duration starting " first waveguide mode ", if receive the checking password of user's input, if so, perform step 510;Otherwise, step 512 is performed.
Step 510, it is judged that whether the checking password of current " security password " and user's input mates, if so, performs step 514;Otherwise, step 516 is performed.
Step 512, exits " first waveguide mode ".
Step 514, runs and enters security domain.
Step 516, forbids accessing or entering security domain.
Pass through above-described embodiment, Keyguard (keypad lock) application can be made full use of, retaining on the basis of user's use habit, achieve hiding and encryption of security domain well, there is significantly high safety and practicality, can above promote the experience of user largely.
Technical scheme is described in detail above in association with accompanying drawing, technical scheme proposes the access scheme of a kind of new user domain, by the access entrance of hiding user domain and arrange for user domain and access password dynamically, efficiently avoid the problems such as access mode confidentiality in correlation technique is poor, divulging a secret property is high, substantially increase the safety of the whole access process of user domain, meet the actual demand of user.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (11)

1. the access method of a user domain, it is characterised in that including:
Hide the access entrance specifying user domain;
Detect whether to get for triggering the trigger message that described appointment user domain is conducted interviews;
Determine get described trigger message time, to access described appointment user domain user carry out authentication;
If the authentication of described user is passed through, then run described appointment user domain.
2. the access method of user domain according to claim 1, it is characterised in that detect whether to get for triggering the step to the trigger message that described appointment user domain conducts interviews, specifically include:
Obtain the character information of described user input, and judge whether described character information and preset characters information match, when judging described character information with described preset characters information match, it is determined that get described trigger message;Or
Obtain the information of described user's continuous several times input, and judge whether the information that described user inputs every time all matches with presupposed information, when the information judging that described user inputs all matches with described presupposed information every time, it is determined that get described trigger message.
3. the access method of user domain according to claim 1, it is characterised in that the step that the user accessing described appointment user domain is carried out authentication, specifically includes:
Obtain at least one in predetermined interface and unlock element, and according at least one unblock element described, calculate the access password of described appointment user domain;
Obtain the checking information of described user input;
Judge whether described checking information and described access password match;
If it is determined that described checking information and described access code matches, it is determined that the authentication of described user is passed through.
4. the access method of user domain according to claim 3, it is characterised in that according at least one unblock element described, calculate the step accessing password of described appointment user domain, specifically include:
Determine the preset password create-rule that each unblock element at least one unblock element described is corresponding;
According to the preset password create-rule that at least one unblock element described is corresponding with described each unblock element, calculate described access password.
5. the access method of the user domain according to claim 3 or 4, it is characterised in that before judging the step whether described checking information and described access password match, also include:
Whether detection gets described checking information in the scheduled time after getting described trigger message;
If it is determined that get described checking information within the described scheduled time, then perform the described step judging whether described checking information mates with described access password.
6. the access device of a user domain, it is characterised in that including:
Hidden unit, for hiding the access entrance specifying user domain;
First detection unit, for detecting whether get for triggering the trigger message that described appointment user domain is conducted interviews;
Identity authenticating unit, for determine get described trigger message time, to access described appointment user domain user carry out authentication;
Processing unit, for when the authentication of described user is passed through by described identity authenticating unit, running described appointment user domain.
7. the access device of user domain according to claim 6, it is characterised in that described first detection unit specifically for:
Obtain the character information of described user input, and judge whether described character information and preset characters information match, when judging described character information with described preset characters information match, it is determined that get described trigger message;Or
Obtain the information of described user's continuous several times input, and judge whether the information that described user inputs every time all matches with presupposed information, when the information judging that described user inputs all matches with described presupposed information every time, it is determined that get described trigger message.
8. the access device of user domain according to claim 6, it is characterised in that described identity authenticating unit includes:
First acquiring unit, unlocks element at least one acquisition in predetermined interface;
Computing unit, for according at least one unblock element described, calculating the access password of described appointment user domain;
Second acquisition unit, for obtaining the checking information of described user input;
Judging unit, is used for judging whether described checking information and described access password match;
Determine unit, for when described judging unit judges described checking information and described access code matches, it is determined that the authentication of described user is passed through.
9. the access device of user domain according to claim 8, it is characterised in that described computing unit specifically for:
Determine the preset password create-rule that each unblock element at least one unblock element described is corresponding;
According to the preset password create-rule that at least one unblock element described is corresponding with described each unblock element, calculate described access password.
10. the access device of user domain according to claim 8 or claim 9, it is characterised in that also include:
Second detection unit, for detecting in the scheduled time after getting described trigger message whether get described checking information;
Described judging unit, specifically for when described second detection unit is determined and is got described checking information within the described scheduled time, it is judged that whether described checking information mates with described access password.
11. a mobile terminal, it is characterised in that including:
The access device of the user domain as according to any one of claim 6 to 10.
CN201610182256.8A 2016-03-28 2016-03-28 Access method, access mechanism and the mobile terminal of user domain Active CN105787318B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610182256.8A CN105787318B (en) 2016-03-28 2016-03-28 Access method, access mechanism and the mobile terminal of user domain
PCT/CN2016/080617 WO2017166359A1 (en) 2016-03-28 2016-04-29 User domain access method, access device, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610182256.8A CN105787318B (en) 2016-03-28 2016-03-28 Access method, access mechanism and the mobile terminal of user domain

Publications (2)

Publication Number Publication Date
CN105787318A true CN105787318A (en) 2016-07-20
CN105787318B CN105787318B (en) 2018-09-14

Family

ID=56391872

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610182256.8A Active CN105787318B (en) 2016-03-28 2016-03-28 Access method, access mechanism and the mobile terminal of user domain

Country Status (2)

Country Link
CN (1) CN105787318B (en)
WO (1) WO2017166359A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503583A (en) * 2016-10-26 2017-03-15 北京小米移动软件有限公司 Method of operating and device that terminal is attended to anything else
CN106548051A (en) * 2016-10-31 2017-03-29 宇龙计算机通信科技(深圳)有限公司 The management method of private visit pattern, managing device and terminal
CN112784245A (en) * 2020-06-05 2021-05-11 环鸿电子(昆山)有限公司 Screen unlocking method of mobile equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1523809A (en) * 2003-09-08 2004-08-25 赵忠华 Password variable identification verification technique
CN103377352A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Sliding password unlocking method
CN103809897A (en) * 2012-11-15 2014-05-21 展讯通信(上海)有限公司 Terminal equipment and control method thereof
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294941B (en) * 2012-02-22 2016-04-20 腾讯科技(深圳)有限公司 The method of access private space and mobile device
CN103297408B (en) * 2012-03-02 2016-04-06 腾讯科技(深圳)有限公司 Login method and device and terminal, the webserver
CN104732125B (en) * 2015-01-30 2017-12-22 努比亚技术有限公司 The display methods and terminal of encryption information
CN105160274B (en) * 2015-09-24 2017-10-27 宇龙计算机通信科技(深圳)有限公司 A kind of guard method of user data and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1523809A (en) * 2003-09-08 2004-08-25 赵忠华 Password variable identification verification technique
CN1281025C (en) * 2003-09-08 2006-10-18 赵忠华 Password variable identification verification technique
CN103377352A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Sliding password unlocking method
CN103809897A (en) * 2012-11-15 2014-05-21 展讯通信(上海)有限公司 Terminal equipment and control method thereof
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503583A (en) * 2016-10-26 2017-03-15 北京小米移动软件有限公司 Method of operating and device that terminal is attended to anything else
CN106503583B (en) * 2016-10-26 2019-06-14 北京小米移动软件有限公司 The operating method and device that terminal is attended to anything else
CN106548051A (en) * 2016-10-31 2017-03-29 宇龙计算机通信科技(深圳)有限公司 The management method of private visit pattern, managing device and terminal
CN112784245A (en) * 2020-06-05 2021-05-11 环鸿电子(昆山)有限公司 Screen unlocking method of mobile equipment

Also Published As

Publication number Publication date
CN105787318B (en) 2018-09-14
WO2017166359A1 (en) 2017-10-05

Similar Documents

Publication Publication Date Title
TWI543012B (en) Identity verification method for mobile communication device and apparatus thereof
CN105335641B (en) A kind of auth method and device based on fingerprint recognition
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
CN104392157B (en) Method and device for locking screen by using passwords
CN103813334A (en) Right control method and right control device
CN104615927A (en) Multisystem safe verification method, multisystem safe verification device and terminal
CN105069333A (en) User domain access method, access system and terminal
CN107633573A (en) The method for unlocking and intelligent door lock of a kind of intelligent door lock
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
CN106529269A (en) Security verification method and system
CN108108147A (en) The unlocking method and terminal of a kind of terminal
CN105787318A (en) User domain access method and device as well as mobile terminal
CN108154017A (en) A kind of method of password authentication and password validation system based on intelligent terminal
CN111131202A (en) Identity authentication method and system based on multiple information authentication
CN105989269A (en) Unlocking method and device and multi-system terminal
CN105160274B (en) A kind of guard method of user data and terminal
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
CN106936672A (en) The control method and terminal of gas-fired equipment
CN106529264B (en) Using locking and unlocking method and device
CN110388138A (en) A kind of method, door-locking system and the door lock of automatically prompting user replacement unlocking pin
CN104598785B (en) A kind of method and device for entering different mode based on unlocking pin
CN106407761A (en) An unlocking method and unlocking device
CN110194123A (en) Vehicle starting method and system, vehicle under a kind of no key status
US20070266240A1 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
CN105631291B (en) A kind of fingerprint authentication method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant