CN106503511A - A kind of method and device for improving mobile phone removal of home cryptographic check security - Google Patents
A kind of method and device for improving mobile phone removal of home cryptographic check security Download PDFInfo
- Publication number
- CN106503511A CN106503511A CN201610824830.5A CN201610824830A CN106503511A CN 106503511 A CN106503511 A CN 106503511A CN 201610824830 A CN201610824830 A CN 201610824830A CN 106503511 A CN106503511 A CN 106503511A
- Authority
- CN
- China
- Prior art keywords
- terminal
- password
- biological characteristic
- removal
- home
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to the communications field, there is provided a kind of method of raising mobile phone removal of home cryptographic check security, its methods described comprise the steps:The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;First terminal receives second terminal and sends communication response;First terminal receive user arranges the first biological characteristic password of page input in password, and first terminal sends Password Input prompting to second terminal;First terminal receives the second biological characteristic password that second terminal sends, and first terminal compares the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then sends the removal of home file to second terminal.The technical scheme that the present invention is provided has the advantages that user experience is good.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of method for improving mobile phone removal of home cryptographic check security and dress
Put.
Background technology
The equipment such as the terminal of the communications field, such as mobile phone, panel computer is belonging to the equipment that user commonly uses, due at present should
Equipment is respectively provided with the operating system of itself, so terminal is referred to as intelligent terminal or smart mobile phone, smart mobile phone (English also:
Smartphone) be the mobile phone more higher than traditional function mobile phone for those operational capabilities and function collectivity appellation.Intelligence
Mobile phone is had using most operating system:Windows Phone, Android, IOS and BlackBerry OS, but between them
Application software incompatible.Smart mobile phone because third party software can be installed as PC, their functions
Abundant, and constantly can expand.
Existing terminal is respectively provided with the function of file storage, and this document is for example:Photo, text, video, address list etc.,
With the style of current smart mobile phone more and more, mobile phone change frequency more and more higher, the application mobile phone is changed after number
" mobile phone removal of home " is commonly called as according to transfer, for the removal of home of existing mobile phone, how the file of old mobile phone is transferred in new cell-phone
It is a problem for allowing very much people to have a headache, by taking address list as an example, currently existing scheme is realized by third party software, existing hand
Machine cannot ensure the security for connecting in removal of home, so in mobile phone removal of home the data in mobile phone may be caused to reveal, user
Experience Degree is low.
Content of the invention
An object of the present invention is to provide a kind of method for improving mobile phone removal of home cryptographic check security, and which mainly solves
The low shortcoming of existing Experience Degree.
First aspect, there is provided a kind of method of raising mobile phone removal of home cryptographic check security, methods described include following step
Suddenly:
The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;
First terminal receives second terminal and sends communication response;
First terminal receive user arranges the first biological characteristic password of page input in password, and first terminal is whole to second
End sends Password Input prompting;
First terminal receives the second biological characteristic password that second terminal sends, and it is close that first terminal compares the first biological characteristic
Code and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then send out to second terminal
Give the removal of home file.
Optionally, methods described also includes:
As the first biological characteristic password and the second biological characteristic password are mismatched, then first terminal is not to second terminal
Send the removal of home file.
Optionally, the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
Optionally, methods described can also include after first terminal does not send the removal of home file to second terminal:
The second biological characteristic password is sent to server, and is sent a warning message to server.
Optionally, methods described can also include after first terminal does not send the removal of home file to second terminal:
First terminal is sent to second hides Location Request, receives the location response that second terminal sends, and the positioning is rung
Should include:The coordinate of second terminal.
Second aspect, there is provided a kind of device of raising mobile phone removal of home cryptographic check security, described device include following step
Suddenly:
Transmitting element, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, sends communication response for receiving second terminal;Receive user arranges the of page input in password
One biological characteristic password;
The transmitting element, is additionally operable to send Password Input prompting to second terminal;
The receiving unit, is additionally operable to receive the second biological characteristic password that second terminal sends;
Processing unit, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic is close
Code and the second biological characteristic password match, then send the removal of home file to second terminal.
Optionally, the processing unit, is additionally operable to such as the first biological characteristic password and the second biological characteristic password not
Coupling, then do not send the removal of home file to second terminal.
Optionally, the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
Optionally, the processing unit, is additionally operable to send the second biological characteristic password to server, and to service
Device sends a warning message.
Optionally, the transmitting element, is additionally operable to send to second and hides Location Request;
The receiving unit, is additionally operable to receive the location response that second terminal sends, and the location response includes:Second eventually
The coordinate at end.
A kind of third aspect, there is provided terminal, the terminal include above-mentioned raising mobile phone removal of home cryptographic check security
Device.
Those of ordinary skill in the art will be appreciated that although referenced in schematic embodiment, accompanying drawing are carried out by detailed description below,
But the present invention is not limited in these embodiments.But, the scope of the present invention is extensive, and is intended to be bound only by appended right
Require to limit the scope of the present invention.
Description of the drawings
By reading the detailed description made by non-limiting example that is made with reference to the following drawings, other of the invention
Feature, objects and advantages will become more apparent upon:
Fig. 1 is the method for improving mobile phone removal of home cryptographic check security that provided according to a preferred embodiment of the invention
Flow chart.
The method of raising mobile phone removal of home cryptographic check securities of the Fig. 2 for being provided according to another preferred embodiment of the present invention
Flow chart.
Fig. 3 is the device for improving mobile phone removal of home cryptographic check security that provided according to next preferred embodiment of the invention
Structure chart.
The hardware architecture diagram of the terminal that Fig. 4 is provided for the present invention.
Specific embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The process that describes as flow chart or method.Although operations to be described as flow chart the process of order, therein permitted
Multioperation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be rearranged.When which
Process when operation is completed can be terminated, it is also possible to have the additional step being not included in accompanying drawing.The process
Can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", refer to and by running preset program or can refer to
Make executing the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with
Memory, the survival instruction for being prestored by computing device in memory executing predetermined process process, or by ASIC,
The hardware such as FPGA, DSP execute predetermined process process, or are combined to realize by said two devices.Computer equipment includes but does not limit
In server, PC, notebook computer, panel computer, smart mobile phone etc..
Method (some of them are illustrated by flow process) discussed hereafter can pass through hardware, software, firmware, centre
Part, microcode, hardware description language or its be combined implementing.When being implemented with software, firmware, middleware or microcode
When, in order to implement, the program code or code segment of necessary task can be stored in machine or computer-readable medium (is such as deposited
Storage media) in.(one or more) processor can implement necessary task.
Concrete structure disclosed herein and function detail are only representational, and be for describe the present invention show
The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and is not interpreted as
It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. here to describe unit,
But these units should not be limited by these terms.It is used for the purpose of a unit and another unit using these terms
Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second
Unit, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or
Any and all combination of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless
Context clearly refers else, and singulative " one " otherwise used herein above, " one " also attempt to include plural number.Should also
When being understood by, term " including " used herein above and/or "comprising" specify stated feature, integer, step, operation,
Unit and/or the presence of component, and do not preclude the presence or addition of other features one or more, integer, step, operation, unit,
Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be attached according to being different from
The order indicated in figure occurs.For example, depending on involved function/action, the two width figures for illustrating in succession actually may be used
Substantially simultaneously to execute or can execute in a reverse order sometimes.
Below in conjunction with the accompanying drawings the present invention is described in further detail.
According to an aspect of the invention, there is provided a kind of method for improving mobile phone removal of home cryptographic check security.Wherein,
In the terminal, the terminal is included but is not limited to for the method application:Server, computer, panel computer, smart mobile phone etc., certainly
In actual applications, the equipment such as such as intelligent watch or Intelligent bracelet can also be increased.
In one embodiment, the method for above-mentioned raising mobile phone removal of home cryptographic check security can be used in terminal, need
It is noted that the terminal is only for example, if other existing or network equipments for being likely to occur from now on and user equipment
It is applied to the present invention, within also should being included in the scope of the present invention, and is incorporated herein by reference.
Fig. 1 is refer to, Fig. 1 is the raising mobile phone removal of home cryptographic check peace of the offer according to a preferred embodiment of the invention
The method of full property, the method are completed by terminal, and the method is as shown in figure 1, comprise the steps:
The communication request that step S101, first terminal are sent to second terminal, the communication request include:The finger of removal of home
Show;
First terminal in above-mentioned steps S101 can be multiple communication requests to the communication request that second terminal sends, example
Such as in a concrete scheme of a preferred embodiment of the invention, the communication request that above-mentioned first terminal is sent to second terminal
Can be that first terminal is by Wireless Fidelity (English:Wireless Fidelity, WIFI) communication request sending, should
The structure of communication request and definition may refer to being specifically defined in IEEE802.1, repeat no more here, certainly in invention one
In another concrete scheme of individual preferred embodiment, above-mentioned first terminal to the communication request that second terminal sends can be,
The communication request that one terminal is sent by bluetooth, certainly in actual applications, can also adopt other communication modes to send out
The communication request is given, for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) send logical
Letter request, can also be that first terminal is by CDMA (English certainly:Code Division Multiple Access,
CDMA the communication request for) sending.The specific embodiment of the invention is not limited to the concrete manifestation form of the communication request, does not also limit
The specific standard agreement that observes in the communication request.
The value of the instruction of above-mentioned removal of home is specifically as follows:Whether removal of home or not, and which can pass through to extend word in communication request
In section, bit for example, sets 1 for removal of home, sets 0 for not moving embodying, certainly in actual applications, above-mentioned setting
0 can also for example be set for removal of home, 1 is set for not moving in turn, the specific embodiment of the invention does not limit above-mentioned instruction
Value concrete meaning.Certainly in actual applications, one can also for example be carried in other way as the instruction that moves
The special field of individual preseting length, such as 10 1,10 0,11 1 or 12 0 etc. mode, it is only necessary to first terminal and second
Terminal is capable of identify that mutually.
Step S102, first terminal receive second terminal and send communication response;
The communication response that the second terminal that first terminal in above-mentioned steps S102 is received sends can be that multiple communications ring
Should, such as in a concrete scheme of a preferred embodiment of the invention, the second terminal that above-mentioned first terminal is received sends
Communication response can be, second terminal by Wireless Fidelity (English:Wireless Fidelity, WIFI) send one
Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, repeat no more here,
It is logical that certain second terminal that in another concrete scheme for inventing a preferred embodiment, above-mentioned first terminal is received sends
Letter response can be that the communication response that second terminal is sent by bluetooth certainly in actual applications, can also adopt which
His communication mode sends the communication response, and for example, first terminal is by Long Term Evolution (English:Long Term
Evolution, LTE) communication response that sends can also be that second terminal is by CDMA (English certainly:Code
Division Multiple Access, CDMA) communication response that sends.The specific embodiment of the invention is not limited to the communication
The concrete manifestation form of request, is also not necessarily limited to the specific standard agreement that observes of the communication request.
Step S103, first terminal receive user arrange the first biological characteristic password of page input in password, and first eventually
Hold to second terminal and send Password Input prompting.
Password Input prompting in above-mentioned steps is specifically as follows:One specific message, such as short message, certainly in reality
In the application of border, or the page of a reality, can also be the prompting of other modes, the specific embodiment of the invention certainly
It is not intended to limit the concrete manifestation form of above-mentioned prompting.
Above-mentioned biological characteristic password is included but is not limited to:Finger-print cipher, palmmprint password, vein password, facial password, pupil
One or more in password.
Step S104, first terminal receive the second biological characteristic password that second terminal sends, and first terminal compares first
Biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then to
Second terminal sends the removal of home file.
Optionally, said method can also include after step s 104:
As the first biological characteristic password and the second biological characteristic password are mismatched, stop sending removal of home text to second terminal
Part.
After communication connection is set up, first terminal displays to the user that the Password Input page to the technical scheme that the present invention is provided
The first biological characteristic password of user input is obtained, then Password Input prompting is sent to second terminal, receive second terminal and return
Return the second biological characteristic password, the first biological characteristic password and the second biological characteristic password are compared with determine whether as
The user mobile phone removal of home, because for mobile phone removal of home, its new and old mobile phone is generally same user, then same user is random
One password of input, the password is not also by network transmission, so its security is very high, so which has raising network
The advantage of security.
Fig. 2 is refer to, Fig. 2 is the raising mobile phone removal of home cryptographic check of the offer according to another preferred embodiment of the present invention
The method of security, the method are completed by terminal, and the method is as shown in Fig. 2 comprise the steps:
The communication request that step S201, first terminal are sent to second terminal, the communication request include:The finger of removal of home
Show;
First terminal in above-mentioned steps S201 can be multiple communication requests to the communication request that second terminal sends, example
Such as in a concrete scheme of a preferred embodiment of the invention, the communication request that above-mentioned first terminal is sent to second terminal
Can be that first terminal is by Wireless Fidelity (English:Wireless Fidelity, WIFI) communication request sending, should
The structure of communication request and definition may refer to being specifically defined in IEEE802.1, repeat no more here, certainly in invention one
In another concrete scheme of individual preferred embodiment, above-mentioned first terminal to the communication request that second terminal sends can be,
The communication request that one terminal is sent by bluetooth, certainly in actual applications, can also adopt other communication modes to send out
The communication request is given, for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) send logical
Letter request, can also be that first terminal is by CDMA (English certainly:Code Division Multiple Access,
CDMA the communication request for) sending.The specific embodiment of the invention is not limited to the concrete manifestation form of the communication request, does not also limit
The specific standard agreement that observes in the communication request.
The value of the instruction of above-mentioned removal of home is specifically as follows:Whether removal of home or not, and which can pass through to extend word in communication request
In section, bit for example, sets 1 for removal of home, sets 0 for not moving embodying, certainly in actual applications, above-mentioned setting
0 can also for example be set for removal of home, 1 is set for not moving in turn, the specific embodiment of the invention does not limit above-mentioned instruction
Value concrete meaning.Certainly in actual applications, one can also for example be carried in other way as the instruction that moves
The special field of individual preseting length, such as 10 1,10 0,11 1 or 12 0 etc. mode, it is only necessary to first terminal and second
Terminal is capable of identify that mutually.
Step S202, first terminal receive second terminal and send communication response;
The communication response that the second terminal that first terminal in above-mentioned steps S202 is received sends can be that multiple communications ring
Should, such as in a concrete scheme of a preferred embodiment of the invention, the second terminal that above-mentioned first terminal is received sends
Communication response can be, second terminal by Wireless Fidelity (English:Wireless Fidelity, WIFI) send one
Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, repeat no more here,
It is logical that certain second terminal that in another concrete scheme for inventing a preferred embodiment, above-mentioned first terminal is received sends
Letter response can be that the communication response that second terminal is sent by bluetooth certainly in actual applications, can also adopt which
His communication mode sends the communication response, and for example, first terminal is by Long Term Evolution (English:Long Term
Evolution, LTE) communication response that sends can also be that second terminal is by CDMA (English certainly:Code
Division Multiple Access, CDMA) communication response that sends.The specific embodiment of the invention is not limited to the communication
The concrete manifestation form of request, is also not necessarily limited to the specific standard agreement that observes of the communication request.
Step S203, first terminal receive user password arrange the page input biological characteristic password, first terminal to
Second terminal sends Password Input prompting;.
Password Input prompting in above-mentioned steps is specifically as follows:One specific message, such as short message, certainly in reality
In the application of border, or the page of a reality, can also be the prompting of other modes, the specific embodiment of the invention certainly
It is not intended to limit the concrete manifestation form of above-mentioned prompting.
Step S204, first terminal receive the second biological characteristic password that second terminal sends, and first terminal compares first
Biological characteristic password and the second biological characteristic password, such as the second biological characteristic password and the first biological characteristic password are mismatched, the
One terminal does not send removal of home file to second terminal.
Optionally, said method can also include after step s 204:
The second biological characteristic password is sent to server, and is sent a warning message to server.
For biological characteristic password, as which belongs to the inherent feature of owner, so there is no input error in which
Problem, if out two biological characteristic passwords are mismatched, then be not belonging to certainly same owner, then be accomplished by second
Second biological characteristic password of terminal input is sent to server, and carries out alarming processing, it is more likely that second terminal there occurs
Lose or others surprisingly ask situation.
Optionally, said method can also include after step s 204:
First terminal is sent to second terminal hides Location Request, receives the location response that second terminal sends, described fixed
Position response includes:The coordinate of second terminal.
Above-mentioned Location Request is hiding Location Request, and which can not be known by second terminal, if known by second terminal,
Very possible positioning failure.
After communication connection is set up, first terminal displays to the user that the Password Input page to the technical scheme that the present invention is provided
The first biological characteristic password of user input is obtained, then Password Input prompting is sent to second terminal, receive second terminal and return
Return the second biological characteristic password, the first biological characteristic password and the second biological characteristic password are compared with determine whether as
The user mobile phone removal of home, because for mobile phone removal of home, its new and old mobile phone is generally same user, then same user is random
One password of input, the password is not also by network transmission, so its security is very high, so which has raising network
The advantage of security.
Refer to Fig. 3, Fig. 3 is that a kind of mobile phone that improves is moved the device 300 of cryptographic check security, and described device is arranged at the
In one terminal, described device includes:
Transmitting element 301, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, 32, communication response is sent for receiving second terminal;Receive user arranges page input in password
First biological characteristic password;
Transmitting element 301, is additionally operable to send Password Input prompting to second terminal;
Receiving unit 302, is additionally operable to receive the second biological characteristic password that second terminal sends;
Processing unit 303, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic
Password and the second biological characteristic password match, then send the removal of home file to second terminal.
Optionally, the processing unit, is additionally operable to such as the first biological characteristic password and the second biological characteristic password not
Coupling, then do not send the removal of home file to second terminal.
Optionally, the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
Optionally, the processing unit, is additionally operable to send the second biological characteristic password to server, and to service
Device sends a warning message.
Optionally, the transmitting element, is additionally operable to send to second terminal and hides Location Request;
The receiving unit, is additionally operable to receive the location response that second terminal sends, and the location response includes:Second eventually
The coordinate at end.
The present invention also provides a kind of terminal, and the terminal includes the device of above-mentioned raising mobile phone removal of home cryptographic check security
300.
The details for specifically applying example of the invention, and without departing from the spirit or essential characteristics of the present invention, can
The present invention is realized in other specific forms.Therefore, no matter from the point of view of which point, embodiment all should be regarded as exemplary,
And be nonrestrictive, the scope of the present invention is by claims rather than described above is limited, it is intended that will fall
All changes in the implication and scope of the equivalency of claim are included in the present invention.Should not be by appointing in claim
What reference is considered as limits involved claim.Furthermore, it is to be understood that " an including " word is not excluded for other units or step, single
Number is not excluded for plural number.The multiple units that states in system claims or device can also pass through software by a unit or device
Or hardware is realizing.The first, the second grade word is used for representing title, and is not offered as any specific order.
Flow chart and block diagram in accompanying drawing shows system, method and the computer journey of the multiple embodiments according to the present invention
The architectural framework in the cards of sequence product, function and operation.At this point, each square frame in flow chart or block diagram can generation
A part for table one module, program segment or code, a part for the module, program segment or code include one or more use
Executable instruction in the logic function for realizing regulation.It should also be noted that in some are as the realization that replaces, being marked in square frame
The function of note can also occur with the order for being different from marked in accompanying drawing.For example, two continuous square frames can essentially base
Originally it is performed in parallel, they can also be executed sometimes in the opposite order, this is depending on involved function.It is also noted that
It is, the combination of each square frame and block diagram and/or the square frame in flow chart in block diagram and/or flow chart can to use and execute rule
The special hardware based system of fixed function or action is realizing, or the group that can use specialized hardware and computer instruction
Close to realize.
Referring to Fig. 4, the embodiment of the present invention also provides a kind of terminal 400, and the terminal 400 is included but is not limited to:Smart mobile phone,
Intelligent watch, panel computer, personal computer, notebook computer or computer group, as shown in figure 4, the terminal 400 includes:
Processor 401, memory 402, transceiver 403 and bus 404.Transceiver 403 is used for transceiving data between external equipment.If
The quantity of the processor 401 in standby 400 can be one or more.In some embodiments of the present application, processor 401, storage
Device 402 and transceiver 403 can pass through bus system or other modes connect.Equipment 400 can be used for executing the side shown in Fig. 1
Method.The implication of the term being related to regard to the present embodiment and citing, may be referred to the corresponding explanations of Fig. 1.Here is omitted.
Wherein, store program codes in memory 402.Processor 401 is used for calling the program generation stored in memory 402
Code, for executing step as shown in Figure 1.
It should be noted that processor 401 here can be a treatment element, or multiple treatment elements
It is referred to as.For example, the treatment element can be central processing unit (Central Processing Unit, CPU), or spy
Determine integrated circuit (Application Specific Integrated Circuit, ASIC), or be arranged to implement this
One or more integrated circuits of application embodiment, for example:One or more microprocessors (digital signal
Processor, DSP), or, one or more field programmable gate array (Field Programmable Gate Array,
FPGA).
Memory 403 can be the general designation of a storage device, or multiple memory elements, and be used for storing and can holding
Line program code or parameter, data etc. required for the operation of application program running gear.And memory 403 can include random storage
Device (RAM), it is also possible to including nonvolatile memory (non-volatile memory), such as magnetic disc store, flash memory
(Flash) etc..
Bus 404 can be that industry standard architecture (Industry Standard Architecture, ISA) is total
Line, external equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended
Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control
Bus processed etc..For ease of representing, only represented with a thick line in Fig. 4, it is not intended that only one bus or a type of
Bus.
The user equipment can also include input/output unit, be connected to bus 404, with by bus and processor 401
Connect etc. other parts.The input/output unit can provide an inputting interface for operating personnel, so that operating personnel are by being somebody's turn to do
Inputting interface selects item of deploying to ensure effective monitoring and control of illegal activities, and can also be other interfaces, can pass through the external miscellaneous equipment of the interface.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description,
Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method, can be with
Realize by another way.Device embodiment described above is only schematically, for example division of the unit,
It is only a kind of division of logic function, there can be other dividing mode when actually realizing, and for example, multiple units or component can
To combine or be desirably integrated into another system, or some features can be ignored, or not execute.Another, shown or beg for
By coupling each other direct-coupling or communication connection can be by the indirect of some communication interfaces, device or unit
Coupling is communicated to connect, and can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit
The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with
It is stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially in other words
The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual
People's computer, server, or network equipment etc.) execute all or part of step of each embodiment methods described of the invention.
And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above only in order to technical scheme to be described, rather than a limitation;To the greatest extent
Pipe has been described in detail to the present invention with reference to foregoing embodiments, it will be understood by those within the art that:Its according to
So the technical scheme described in foregoing embodiments can be modified, or which part or all technical characteristic are entered
Row equivalent;And these modifications or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology
The scope of scheme, its all should cover in the middle of the claim of the present invention and the scope of specification.
Claims (11)
1. a kind of improve mobile phone move cryptographic check security method, it is characterised in that methods described comprises the steps:
The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;
First terminal receives second terminal and sends communication response;
First terminal receive user arranges the first biological characteristic password of page input in password, and first terminal is sent out to second terminal
Password Input is sent to point out;
First terminal receive second terminal send the second biological characteristic password, first terminal compare the first biological characteristic password with
Second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then sending to second terminal should
Removal of home file.
2. method according to claim 1, it is characterised in that methods described also includes:
As the first biological characteristic password and the second biological characteristic password are mismatched, then first terminal is not sent to second terminal
The removal of home file.
3. method according to claim 1, it is characterised in that the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
4. method according to claim 2, it is characterised in that methods described is not sent to second terminal in first terminal should
Can also include after removal of home file:
The second biological characteristic password is sent to server, and is sent a warning message to server.
5. method according to claim 2, it is characterised in that methods described is not sent to second terminal in first terminal should
Can also include after removal of home file:
First terminal is sent to second terminal hides Location Request, receives the location response that second terminal sends, and the positioning is rung
Should include:The coordinate of second terminal.
6. a kind of improve mobile phone move cryptographic check security device, it is characterised in that described device comprises the steps:
Transmitting element, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, sends communication response for receiving second terminal;Receive user arranges the first life of page input in password
Thing feature password;
The transmitting element, is additionally operable to send Password Input prompting to second terminal;
The receiving unit, is additionally operable to receive the second biological characteristic password that second terminal sends;
Processing unit, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and
Second biological characteristic password match, then send the removal of home file to second terminal.
7. device according to claim 6, it is characterised in that the processing unit, is additionally operable to as described first is biological special
Levy password and the second biological characteristic password is mismatched, then the removal of home file is not sent to second terminal.
8. device according to claim 6, it is characterised in that the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
9. device according to claim 7, it is characterised in that the processing unit, being additionally operable to will be described second biological special
Levy password to send to server, and send a warning message to server.
10. device according to claim 7, it is characterised in that
The transmitting element, is additionally operable to send to second terminal and hides Location Request;
The receiving unit, is additionally operable to receive the location response that second terminal sends, and the location response includes:Second terminal
Coordinate.
11. a kind of terminals, it is characterised in that the terminal includes the raising mobile phone removal of home as described in any one of claim 6-10
The device of cryptographic check security.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610824830.5A CN106503511B (en) | 2016-09-14 | 2016-09-14 | A kind of method and device improving mobile phone removal of home cryptographic check safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610824830.5A CN106503511B (en) | 2016-09-14 | 2016-09-14 | A kind of method and device improving mobile phone removal of home cryptographic check safety |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106503511A true CN106503511A (en) | 2017-03-15 |
CN106503511B CN106503511B (en) | 2019-06-14 |
Family
ID=58290449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610824830.5A Active CN106503511B (en) | 2016-09-14 | 2016-09-14 | A kind of method and device improving mobile phone removal of home cryptographic check safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106503511B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107135498A (en) * | 2017-04-27 | 2017-09-05 | 努比亚技术有限公司 | A kind of sharing files method and apparatus |
WO2018049975A1 (en) * | 2016-09-14 | 2018-03-22 | 广东欧珀移动通信有限公司 | Data transfer method and related product |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984679A (en) * | 2012-11-06 | 2013-03-20 | 周万荣 | Method and terminal of call forwarding and data manipulation |
CN104657643A (en) * | 2015-03-13 | 2015-05-27 | 广东欧珀移动通信有限公司 | Privacy protection method, wearable device and mobile terminal |
CN105138878A (en) * | 2015-07-14 | 2015-12-09 | 广东欧珀移动通信有限公司 | Remote terminal control method and mobile terminal |
CN105429949A (en) * | 2015-10-28 | 2016-03-23 | 广东欧珀移动通信有限公司 | Cipher pushing method and pushing system |
CN105590211A (en) * | 2014-10-21 | 2016-05-18 | 腾讯科技(深圳)有限公司 | Data transfer method, data transfer device and data transfer system |
CN105701397A (en) * | 2014-11-24 | 2016-06-22 | 中国移动通信集团公司 | Method and device for controlling application program |
-
2016
- 2016-09-14 CN CN201610824830.5A patent/CN106503511B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984679A (en) * | 2012-11-06 | 2013-03-20 | 周万荣 | Method and terminal of call forwarding and data manipulation |
CN105590211A (en) * | 2014-10-21 | 2016-05-18 | 腾讯科技(深圳)有限公司 | Data transfer method, data transfer device and data transfer system |
CN105701397A (en) * | 2014-11-24 | 2016-06-22 | 中国移动通信集团公司 | Method and device for controlling application program |
CN104657643A (en) * | 2015-03-13 | 2015-05-27 | 广东欧珀移动通信有限公司 | Privacy protection method, wearable device and mobile terminal |
CN105138878A (en) * | 2015-07-14 | 2015-12-09 | 广东欧珀移动通信有限公司 | Remote terminal control method and mobile terminal |
CN105429949A (en) * | 2015-10-28 | 2016-03-23 | 广东欧珀移动通信有限公司 | Cipher pushing method and pushing system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018049975A1 (en) * | 2016-09-14 | 2018-03-22 | 广东欧珀移动通信有限公司 | Data transfer method and related product |
CN107135498A (en) * | 2017-04-27 | 2017-09-05 | 努比亚技术有限公司 | A kind of sharing files method and apparatus |
CN107135498B (en) * | 2017-04-27 | 2020-01-17 | 宁波甬宸影视文化股份有限公司 | File sharing method and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106503511B (en) | 2019-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10601978B2 (en) | Telecommunication device utilization based on heartbeat communication | |
CN102439898B (en) | Based on the multi-tier authentication method and system of model | |
US20160210632A1 (en) | Secured payment method and relevant device and system | |
CN107071865A (en) | The method and device that a kind of Wireless Fidelity is quickly connected | |
CN108345462B (en) | Method and device for upgrading components | |
CN104754563A (en) | Wireless hotspot access sharing method, mobile terminals and system | |
CN104699515B (en) | A kind of upgrade method and intelligent terminal based on Android operation system | |
CN104636924A (en) | Safe payment method, server and system | |
CN107336681A (en) | The control method and device of vehicle | |
EP3256943A1 (en) | Systems and methods for adaptive cloning of mobile devices | |
CN111984557A (en) | Data processing method, device and system | |
CN106503511A (en) | A kind of method and device for improving mobile phone removal of home cryptographic check security | |
KR20170083537A (en) | Add-on modem for wireless devices and methods useful in conjunction therewith | |
CN106507268A (en) | The method and device of dynamic authentication in a kind of mobile phone removal of home | |
CN106446110A (en) | Realization method and device for connecting security in terminal moving | |
CN105227441A (en) | Cloud server, contact identity defining method and system | |
CN104079325A (en) | Method of sharing information and electronic equipment | |
CN106484506A (en) | File store path system of selection and device in a kind of terminal removal of home | |
CN106161750B (en) | Information processing method and electronic equipment | |
KR101660248B1 (en) | Smart card processing multi subscribers' information, electronic device using thereof, and method for managing multi subscribers in the electronic device | |
CN113518021A (en) | Method, system, device and equipment for binding user account | |
US9535566B2 (en) | Method, apparatus and system of displaying a file | |
US10277690B2 (en) | Configuration-driven sign-up | |
US9807230B2 (en) | Parameter writing program on communication subscriber card | |
CN106658669A (en) | Quick connection method and device for wireless fidelity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |