Summary of the invention
In view of this, the invention provides a kind of mobile phone data protection method based on hardware encryption and
Device, it is intended to overcome the defect of prior art, thus real in the case of not relying on remote lock
Existing data protection, simplifies the operation of user, and is not easy to be cracked.
Mobile phone data protection method based on hardware encryption provided by the present invention comprises the following steps:
Step a, in detection mobile phone, the interface relevant to private data the most changes;Step b,
When the described interface relevant to private data changes, send to mobile phone screen and treat for input
Test the interface of password;Step c, it is judged that stored in the password to be tested of user's input and mobile phone hardware
Initial password is the most consistent;Step d, if the password to be tested that user inputs in predetermined number of times is all with just
Beginning password is inconsistent, then send the instruction starting data protection to mobile phone.
Mobile phone data protection method based on hardware encryption as above, it is preferable that in step c
In, if the password to be tested of user's input is consistent with initial password, then return step a.
Mobile phone data protection method based on hardware encryption as above, it is preferable that in step a
, also include: step e before, when mobile phone starts first, send to mobile phone screen at the beginning of being used for inputting
The interface of beginning password;Step f, receives the initial password that inputted of user and is stored in mobile phone hardware.
Mobile phone data protection method based on hardware encryption as above, it is preferable that in described step
In rapid a, the described interface relevant to private data includes following any one or more: SIM connects
Mouthful;USB interface;Blue tooth interface;Network interface.
Mobile phone data protection method based on hardware encryption as above, it is preferable that in described step
In rapid d, the instruction of described startup data protection includes following any one or more: start locking
The instruction of mobile phone;Start erasing data in mobile phone instruction;Start the instruction of self-destruction cell phone lines;Start
The instruction of self-destruction mobile phone memory.
Mobile phone data protection device based on hardware encryption provided by the present invention includes: interface detects
Module, the most changes for detecting interface relevant to private data in mobile phone;To be tested
Interface for password input sending module, is used for when the described interface relevant to private data changes,
The interface for inputting password to be tested is sent to mobile phone screen;Password judge module, it is judged that user is defeated
The password to be tested entered is the most consistent with the initial password stored in mobile phone hardware;Instruction sending module,
If the password to be tested that user inputs in predetermined number of times is all inconsistent with initial password, then send out to mobile phone
Send the instruction starting data protection.
Mobile phone data protection device based on hardware encryption as above, it is preferable that if password is sentenced
Disconnected module judges that the password to be tested that user inputs is consistent with initial password, then interface detection module continues
In detection mobile phone, the interface relevant to private data the most changes.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described mobile phone
Data protecting device also includes: initial password inputting interface sending module, when mobile phone starts first,
The interface for inputting initial password is sent to mobile phone screen;Initial password receiver module, receives and uses
Initial password that family is inputted also is stored in mobile phone hardware.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described interface
Interface relevant to private data in the mobile phone that detection module is detected include following any one or many
Kind: SIM interface;USB interface;Blue tooth interface;Network interface.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described instruction
The instruction that sending module is sent includes following any one or more: start the instruction of locking mobile phone;
Start erasing data in mobile phone instruction;Start the instruction of self-destruction cell phone lines;Start the storage of self-destruction mobile phone
The instruction of device.
Use mobile phone data protection method and apparatus based on hardware encryption provided by the present invention, one
Aspect, the only just startup authentication when the hardware interface relevant to privacy changes, and not
Need user all to input password when using every time, simplify operating procedure, optimize user and embody.
On the other hand, by hardware protection system protection data in mobile phone and privacy so that the side that software cracks
Formula is at one's wit's end, the problem thoroughly solving privacy and leaking data from source, it is possible to ensure number
According to safety.
Detailed description of the invention
Below in conjunction with embodiment, the present invention is described in detail.
Fig. 1 is the preferred embodiment of the mobile phone data protection method based on hardware encryption of the present invention.
As it is shown in figure 1, mobile phone data protection method based on hardware encryption provided by the present invention can be led to
Cross following steps to realize.
Step S100, when mobile phone starts first, sends to mobile phone screen and is used for inputting initial password
Interface.Specifically, after mobile phone dispatches from the factory, when user starts mobile phone for the first time, hand can be passed through
Related interfaces input initial password on machine screen, described initial password can pass through following arbitrary shape
The password of formula realizes: character string password, graphical passwords, gesture password, finger-print cipher etc..
Step S200, receives the initial password that inputted of user and is stored in mobile phone hardware.Preferably
Ground, can be stored in the initial password that user is inputted in the inherent storage of mobile phone or mobile phone core
In sheet, it is also possible to special chip is set on mobile phone to realize the storage of initial password.Preferably,
Described initial password one is set, and does not the most allow amendment.Such as: can receive user institute defeated
After the initial password entered storage, the cell phone password stored is set to " read-only " form, no
Allow again to revise.
In actual use, the generation of described initial password not only can pass through above-mentioned steps
Realize, it is also possible to be configured by manufacturer when mobile phone dispatches from the factory initialization, it is also possible to stochastic generation
After be stored in mobile phone hardware with " read-only " form, and this " read-only " form does not allow hand
Machine screen calls, and i.e. cannot show in mobile phone screen, can only be read by password validation system
With call.
Step S300, in detection mobile phone, the interface relevant to private data the most changes.
Wherein it is preferred to, the described interface relevant to private data includes following any one or more:
SIM interface;USB interface;Blue tooth interface;Network interface etc..The most changing permissible
It is interpreted as: the interface relevant to private data the most inserts, extracts, accesses, starts,
Closedowns etc. change the action of original attribute.Such as: whether pull out the action of SIM, if
There is to insert the action of SIM, if the action of blue tooth interface occurs to start or close, if having
Other USB device access mobile phone USB interface, the equipment on mobile phone USB interface the most by
Extracting, whether network interface is interrupted by force, etc..As long as it is understood that relate to
The action that in mobile phone, the hardware interface of private data changes, can serve as detecting object, this
The object detected in step S300 of invention is not limited to foregoing.
In actual application, which hardware port user self-defined can also arrange belongs to hidden
The port that private data are relevant, or which hardware port is set is not belonging to the end relevant to private data
Mouthful.Preferably, as long as there being one of them hardware interface relevant to private data to change, i.e.
Trigger following step.
Step S400, when the described interface relevant to private data changes, to mobile phone screen
Send the interface for inputting password to be tested.It is relevant to private data when step S300 detects
Hardware interface changes, and in order to realize the protection of private data, can carry out suitable safety and test
Card.Specifically, can send the interface for inputting password to be tested to mobile phone screen, user is permissible
In this interface, input password to be tested to carry out authentication, thus ensure the safety of user data.
Preferably, the interface being used for inputting password to be verified can be character string inputting interface, IMAQ
Interface, fingerprint acquisition interface, hand gesture recognition interface etc..
Step S500, it is judged that stored in password to be tested and the mobile phone hardware of user's input is the closeest
Code is the most consistent.In step S500, when, after the password to be verified receiving user's input, needing
From mobile phone hardware, obtain default initial password, and the password to be verified user inputted is with initial
Password verifies, and determines whether to start data protection action finally according to check results.
Preferably, the situation causing mobile phone locked because of erroneous input password in order to avoid user occurs,
Suitable Password Input number of times can be set, for example, it is possible to Password Input number of times is set to 3 times,
If during the password of user's input error, system can eject new interface for password input again, only when
When user's continuous input error password is more than 3 times, just can trigger following data protection action.
In a preferred embodiment, if the password to be tested that inputted in the number of times specified of user is with initial
Password is consistent, then return step S300, i.e. mobile phone and enter normal operating system, and continue detection
Interface relevant to private data in mobile phone the most changes.The hardware relevant to privacy connects
There is not one-shot change in mouth, system just starts a password authentification, after password authentification is passed through, then should
Change is considered the normal operating of cellphone subscriber, and the change of this hardware interface is left in the basket.
Step S600, if the password to be tested that user inputs in predetermined number of times all differs with initial password
Cause, then send the instruction starting data protection to mobile phone.If step S500 determines what user inputted
Password to be tested is inconsistent with initial password, and errors number is beyond default predetermined number of times, then
The instruction starting data protection is sent to mobile phone, thus to the data in mobile phone, especially privacy number
According to protecting.
Preferably, the instruction of described startup data protection includes following any one or more: start
The instruction of locking mobile phone;Start erasing data in mobile phone instruction;Start the instruction of self-destruction cell phone lines;
Start the instruction of self-destruction mobile phone memory.Mobile phone can be locked by mobile phone according to above-mentioned dependent instruction
Fixed, or data are wiped, it might even be possible to thoroughly burn cell phone lines, mobile phone memory, core
Sheet, thus ensure in the hand that data will not fall into lawless person, it is ensured that the safety of data.
Such as, when the mobile phone having lawless person to take user, it is intended to extract SIM to interrupt user
When remotely operating, mobile phone screen can show input password interface, if repeatedly input is close
Code is inconsistent with the initial password preset, and can be protected data in mobile phone by dependent instruction.
In specific implementation process, it is preferable that a hardware cryptographic system can be integrated into mobile phone
Chip in, carried out checking and the protection of data of password by hardware micro-system, in password authentification
Phone lock in the case of failure, all operations associated with the data all cannot be normally carried out.Additionally,
At hardware encryption initial phase, when user uses mobile phone for the first time, hardware encryption initializes system
System requires initialized cryptographic, and after user inputs password, this password becomes the protection password of mobile phone (i.e.
Initial password), and cannot again change, in order to ensure safety, hardware micro-system can only initialize one
Secondary.Hardware cryptographic system interface associated with the data has binding relationship, once with privacy and data phase
The hardware interface closed changes, and will trigger hardware encryption verification tip.The following is several frequently seen
Occasion: pull out SIM/insertion SIM, the insertion of USB interface connecting line, bluetooth unlatching etc..
After hardware verification system starts, it is impossible to close, it is necessary to correctly enter password and could normally use mobile phone,
Otherwise mobile phone is locked, if checking password input error exceedes n times, data in mobile phone will be wiped free of,
Can be burnt by cell phone lines, mobile phone thoroughly cannot use simultaneously.
The present invention passes through hardware protection system protection data in mobile phone and privacy so that the side that software cracks
Formula is at one's wit's end, the problem thoroughly solving privacy and leaking data from source, it is possible to accomplish
Safe and reliable.For the use that data and secret protection demand are strong, it is very effective data
Protection scheme.
Correspondingly, present invention also offers a kind of mobile phone data protection device based on hardware encryption,
To be correspondingly used for the correlation step realizing in said method.Fig. 2 is the close based on hardware of the present invention
The preferred embodiment of the mobile phone data protection device of code.As in figure 2 it is shown, base provided by the present invention
Mobile phone data protection device in hardware encryption includes: interface detection module 30, Password Input to be tested
Interface sending module 40, password judge module 50 and instruction sending module 60.
Described interface detection module 30 is for the most just detecting interface relevant to private data in mobile phone
Changing.Described interface for password input sending module to be tested 40 is for when described and private data
When relevant interface changes, send the interface for inputting password to be tested to mobile phone screen.Institute
State and password to be tested that password judge module 50 inputs for judging user and mobile phone hardware stored
Initial password is the most consistent.If the password to be tested that user inputs in predetermined number of times is equal and initial password
Inconsistent, described instruction sending module 60 then sends the instruction starting data protection to mobile phone.
Mobile phone data protection device based on hardware encryption as above, it is preferable that if password is sentenced
Disconnected module 50 judges that the password to be tested that user inputs is consistent with initial password, then interface detection module 30
Continue the interface relevant to private data in detection mobile phone the most to change.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described mobile phone
Data protecting device also includes: initial password inputting interface sending module 10 and initial password receive mould
Block 20.Wherein, described initial password inputting interface sending module 10 is used for when mobile phone starts first,
The interface for inputting initial password is sent to mobile phone screen;Described initial password receiver module 20 is used
In receiving the initial password that inputted of user and being stored in mobile phone hardware.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described interface
Interface relevant to private data in the mobile phone that detection module 30 is detected include following any one or
Multiple: SIM interface;USB interface;Blue tooth interface;Network interface.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described instruction
The instruction that sending module 60 is sent includes following any one or more: start the finger of locking mobile phone
Order;Start erasing data in mobile phone instruction;Start the instruction of self-destruction cell phone lines;Start self-destruction mobile phone
The instruction of memory.
Use mobile phone data protection method and apparatus based on hardware encryption provided by the present invention, one
Aspect, the only just startup authentication when the hardware interface relevant to privacy changes, and not
Need user all to input password when using every time, simplify operating procedure, optimize user and embody.
On the other hand, by hardware protection system protection data in mobile phone and privacy so that the side that software cracks
Formula is at one's wit's end, the problem thoroughly solving privacy and leaking data from source, it is possible to ensure number
According to safety.
Last it is noted that above example is only in order to illustrate technical scheme, rather than
It is limited;Although the present invention being described in detail with reference to previous embodiment, this area
Those of ordinary skill is it is understood that it still can be to the technical scheme described in foregoing embodiments
Modify, or wherein portion of techniques feature is carried out equivalent;And these are revised or replace
Change, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.