CN106503511A - A kind of method and device for improving mobile phone removal of home cryptographic check security - Google Patents

A kind of method and device for improving mobile phone removal of home cryptographic check security Download PDF

Info

Publication number
CN106503511A
CN106503511A CN201610824830.5A CN201610824830A CN106503511A CN 106503511 A CN106503511 A CN 106503511A CN 201610824830 A CN201610824830 A CN 201610824830A CN 106503511 A CN106503511 A CN 106503511A
Authority
CN
China
Prior art keywords
terminal
password
biological characteristic
removal
home
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610824830.5A
Other languages
Chinese (zh)
Other versions
CN106503511B (en
Inventor
张海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610824830.5A priority Critical patent/CN106503511B/en
Publication of CN106503511A publication Critical patent/CN106503511A/en
Application granted granted Critical
Publication of CN106503511B publication Critical patent/CN106503511B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the communications field, there is provided a kind of method of raising mobile phone removal of home cryptographic check security, its methods described comprise the steps:The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;First terminal receives second terminal and sends communication response;First terminal receive user arranges the first biological characteristic password of page input in password, and first terminal sends Password Input prompting to second terminal;First terminal receives the second biological characteristic password that second terminal sends, and first terminal compares the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then sends the removal of home file to second terminal.The technical scheme that the present invention is provided has the advantages that user experience is good.

Description

A kind of method and device for improving mobile phone removal of home cryptographic check security
Technical field
The present invention relates to the communications field, more particularly to a kind of method for improving mobile phone removal of home cryptographic check security and dress Put.
Background technology
The equipment such as the terminal of the communications field, such as mobile phone, panel computer is belonging to the equipment that user commonly uses, due at present should Equipment is respectively provided with the operating system of itself, so terminal is referred to as intelligent terminal or smart mobile phone, smart mobile phone (English also: Smartphone) be the mobile phone more higher than traditional function mobile phone for those operational capabilities and function collectivity appellation.Intelligence Mobile phone is had using most operating system:Windows Phone, Android, IOS and BlackBerry OS, but between them Application software incompatible.Smart mobile phone because third party software can be installed as PC, their functions Abundant, and constantly can expand.
Existing terminal is respectively provided with the function of file storage, and this document is for example:Photo, text, video, address list etc., With the style of current smart mobile phone more and more, mobile phone change frequency more and more higher, the application mobile phone is changed after number " mobile phone removal of home " is commonly called as according to transfer, for the removal of home of existing mobile phone, how the file of old mobile phone is transferred in new cell-phone It is a problem for allowing very much people to have a headache, by taking address list as an example, currently existing scheme is realized by third party software, existing hand Machine cannot ensure the security for connecting in removal of home, so in mobile phone removal of home the data in mobile phone may be caused to reveal, user Experience Degree is low.
Content of the invention
An object of the present invention is to provide a kind of method for improving mobile phone removal of home cryptographic check security, and which mainly solves The low shortcoming of existing Experience Degree.
First aspect, there is provided a kind of method of raising mobile phone removal of home cryptographic check security, methods described include following step Suddenly:
The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;
First terminal receives second terminal and sends communication response;
First terminal receive user arranges the first biological characteristic password of page input in password, and first terminal is whole to second End sends Password Input prompting;
First terminal receives the second biological characteristic password that second terminal sends, and it is close that first terminal compares the first biological characteristic Code and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then send out to second terminal Give the removal of home file.
Optionally, methods described also includes:
As the first biological characteristic password and the second biological characteristic password are mismatched, then first terminal is not to second terminal Send the removal of home file.
Optionally, the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
Optionally, methods described can also include after first terminal does not send the removal of home file to second terminal:
The second biological characteristic password is sent to server, and is sent a warning message to server.
Optionally, methods described can also include after first terminal does not send the removal of home file to second terminal:
First terminal is sent to second hides Location Request, receives the location response that second terminal sends, and the positioning is rung Should include:The coordinate of second terminal.
Second aspect, there is provided a kind of device of raising mobile phone removal of home cryptographic check security, described device include following step Suddenly:
Transmitting element, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, sends communication response for receiving second terminal;Receive user arranges the of page input in password One biological characteristic password;
The transmitting element, is additionally operable to send Password Input prompting to second terminal;
The receiving unit, is additionally operable to receive the second biological characteristic password that second terminal sends;
Processing unit, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic is close Code and the second biological characteristic password match, then send the removal of home file to second terminal.
Optionally, the processing unit, is additionally operable to such as the first biological characteristic password and the second biological characteristic password not Coupling, then do not send the removal of home file to second terminal.
Optionally, the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
Optionally, the processing unit, is additionally operable to send the second biological characteristic password to server, and to service Device sends a warning message.
Optionally, the transmitting element, is additionally operable to send to second and hides Location Request;
The receiving unit, is additionally operable to receive the location response that second terminal sends, and the location response includes:Second eventually The coordinate at end.
A kind of third aspect, there is provided terminal, the terminal include above-mentioned raising mobile phone removal of home cryptographic check security Device.
Those of ordinary skill in the art will be appreciated that although referenced in schematic embodiment, accompanying drawing are carried out by detailed description below, But the present invention is not limited in these embodiments.But, the scope of the present invention is extensive, and is intended to be bound only by appended right Require to limit the scope of the present invention.
Description of the drawings
By reading the detailed description made by non-limiting example that is made with reference to the following drawings, other of the invention Feature, objects and advantages will become more apparent upon:
Fig. 1 is the method for improving mobile phone removal of home cryptographic check security that provided according to a preferred embodiment of the invention Flow chart.
The method of raising mobile phone removal of home cryptographic check securities of the Fig. 2 for being provided according to another preferred embodiment of the present invention Flow chart.
Fig. 3 is the device for improving mobile phone removal of home cryptographic check security that provided according to next preferred embodiment of the invention Structure chart.
The hardware architecture diagram of the terminal that Fig. 4 is provided for the present invention.
Specific embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The process that describes as flow chart or method.Although operations to be described as flow chart the process of order, therein permitted Multioperation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be rearranged.When which Process when operation is completed can be terminated, it is also possible to have the additional step being not included in accompanying drawing.The process Can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", refer to and by running preset program or can refer to Make executing the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with Memory, the survival instruction for being prestored by computing device in memory executing predetermined process process, or by ASIC, The hardware such as FPGA, DSP execute predetermined process process, or are combined to realize by said two devices.Computer equipment includes but does not limit In server, PC, notebook computer, panel computer, smart mobile phone etc..
Method (some of them are illustrated by flow process) discussed hereafter can pass through hardware, software, firmware, centre Part, microcode, hardware description language or its be combined implementing.When being implemented with software, firmware, middleware or microcode When, in order to implement, the program code or code segment of necessary task can be stored in machine or computer-readable medium (is such as deposited Storage media) in.(one or more) processor can implement necessary task.
Concrete structure disclosed herein and function detail are only representational, and be for describe the present invention show The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and is not interpreted as It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. here to describe unit, But these units should not be limited by these terms.It is used for the purpose of a unit and another unit using these terms Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second Unit, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or Any and all combination of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless Context clearly refers else, and singulative " one " otherwise used herein above, " one " also attempt to include plural number.Should also When being understood by, term " including " used herein above and/or "comprising" specify stated feature, integer, step, operation, Unit and/or the presence of component, and do not preclude the presence or addition of other features one or more, integer, step, operation, unit, Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be attached according to being different from The order indicated in figure occurs.For example, depending on involved function/action, the two width figures for illustrating in succession actually may be used Substantially simultaneously to execute or can execute in a reverse order sometimes.
Below in conjunction with the accompanying drawings the present invention is described in further detail.
According to an aspect of the invention, there is provided a kind of method for improving mobile phone removal of home cryptographic check security.Wherein, In the terminal, the terminal is included but is not limited to for the method application:Server, computer, panel computer, smart mobile phone etc., certainly In actual applications, the equipment such as such as intelligent watch or Intelligent bracelet can also be increased.
In one embodiment, the method for above-mentioned raising mobile phone removal of home cryptographic check security can be used in terminal, need It is noted that the terminal is only for example, if other existing or network equipments for being likely to occur from now on and user equipment It is applied to the present invention, within also should being included in the scope of the present invention, and is incorporated herein by reference.
Fig. 1 is refer to, Fig. 1 is the raising mobile phone removal of home cryptographic check peace of the offer according to a preferred embodiment of the invention The method of full property, the method are completed by terminal, and the method is as shown in figure 1, comprise the steps:
The communication request that step S101, first terminal are sent to second terminal, the communication request include:The finger of removal of home Show;
First terminal in above-mentioned steps S101 can be multiple communication requests to the communication request that second terminal sends, example Such as in a concrete scheme of a preferred embodiment of the invention, the communication request that above-mentioned first terminal is sent to second terminal Can be that first terminal is by Wireless Fidelity (English:Wireless Fidelity, WIFI) communication request sending, should The structure of communication request and definition may refer to being specifically defined in IEEE802.1, repeat no more here, certainly in invention one In another concrete scheme of individual preferred embodiment, above-mentioned first terminal to the communication request that second terminal sends can be, The communication request that one terminal is sent by bluetooth, certainly in actual applications, can also adopt other communication modes to send out The communication request is given, for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) send logical Letter request, can also be that first terminal is by CDMA (English certainly:Code Division Multiple Access, CDMA the communication request for) sending.The specific embodiment of the invention is not limited to the concrete manifestation form of the communication request, does not also limit The specific standard agreement that observes in the communication request.
The value of the instruction of above-mentioned removal of home is specifically as follows:Whether removal of home or not, and which can pass through to extend word in communication request In section, bit for example, sets 1 for removal of home, sets 0 for not moving embodying, certainly in actual applications, above-mentioned setting 0 can also for example be set for removal of home, 1 is set for not moving in turn, the specific embodiment of the invention does not limit above-mentioned instruction Value concrete meaning.Certainly in actual applications, one can also for example be carried in other way as the instruction that moves The special field of individual preseting length, such as 10 1,10 0,11 1 or 12 0 etc. mode, it is only necessary to first terminal and second Terminal is capable of identify that mutually.
Step S102, first terminal receive second terminal and send communication response;
The communication response that the second terminal that first terminal in above-mentioned steps S102 is received sends can be that multiple communications ring Should, such as in a concrete scheme of a preferred embodiment of the invention, the second terminal that above-mentioned first terminal is received sends Communication response can be, second terminal by Wireless Fidelity (English:Wireless Fidelity, WIFI) send one Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, repeat no more here, It is logical that certain second terminal that in another concrete scheme for inventing a preferred embodiment, above-mentioned first terminal is received sends Letter response can be that the communication response that second terminal is sent by bluetooth certainly in actual applications, can also adopt which His communication mode sends the communication response, and for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) communication response that sends can also be that second terminal is by CDMA (English certainly:Code Division Multiple Access, CDMA) communication response that sends.The specific embodiment of the invention is not limited to the communication The concrete manifestation form of request, is also not necessarily limited to the specific standard agreement that observes of the communication request.
Step S103, first terminal receive user arrange the first biological characteristic password of page input in password, and first eventually Hold to second terminal and send Password Input prompting.
Password Input prompting in above-mentioned steps is specifically as follows:One specific message, such as short message, certainly in reality In the application of border, or the page of a reality, can also be the prompting of other modes, the specific embodiment of the invention certainly It is not intended to limit the concrete manifestation form of above-mentioned prompting.
Above-mentioned biological characteristic password is included but is not limited to:Finger-print cipher, palmmprint password, vein password, facial password, pupil One or more in password.
Step S104, first terminal receive the second biological characteristic password that second terminal sends, and first terminal compares first Biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then to Second terminal sends the removal of home file.
Optionally, said method can also include after step s 104:
As the first biological characteristic password and the second biological characteristic password are mismatched, stop sending removal of home text to second terminal Part.
After communication connection is set up, first terminal displays to the user that the Password Input page to the technical scheme that the present invention is provided The first biological characteristic password of user input is obtained, then Password Input prompting is sent to second terminal, receive second terminal and return Return the second biological characteristic password, the first biological characteristic password and the second biological characteristic password are compared with determine whether as The user mobile phone removal of home, because for mobile phone removal of home, its new and old mobile phone is generally same user, then same user is random One password of input, the password is not also by network transmission, so its security is very high, so which has raising network The advantage of security.
Fig. 2 is refer to, Fig. 2 is the raising mobile phone removal of home cryptographic check of the offer according to another preferred embodiment of the present invention The method of security, the method are completed by terminal, and the method is as shown in Fig. 2 comprise the steps:
The communication request that step S201, first terminal are sent to second terminal, the communication request include:The finger of removal of home Show;
First terminal in above-mentioned steps S201 can be multiple communication requests to the communication request that second terminal sends, example Such as in a concrete scheme of a preferred embodiment of the invention, the communication request that above-mentioned first terminal is sent to second terminal Can be that first terminal is by Wireless Fidelity (English:Wireless Fidelity, WIFI) communication request sending, should The structure of communication request and definition may refer to being specifically defined in IEEE802.1, repeat no more here, certainly in invention one In another concrete scheme of individual preferred embodiment, above-mentioned first terminal to the communication request that second terminal sends can be, The communication request that one terminal is sent by bluetooth, certainly in actual applications, can also adopt other communication modes to send out The communication request is given, for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) send logical Letter request, can also be that first terminal is by CDMA (English certainly:Code Division Multiple Access, CDMA the communication request for) sending.The specific embodiment of the invention is not limited to the concrete manifestation form of the communication request, does not also limit The specific standard agreement that observes in the communication request.
The value of the instruction of above-mentioned removal of home is specifically as follows:Whether removal of home or not, and which can pass through to extend word in communication request In section, bit for example, sets 1 for removal of home, sets 0 for not moving embodying, certainly in actual applications, above-mentioned setting 0 can also for example be set for removal of home, 1 is set for not moving in turn, the specific embodiment of the invention does not limit above-mentioned instruction Value concrete meaning.Certainly in actual applications, one can also for example be carried in other way as the instruction that moves The special field of individual preseting length, such as 10 1,10 0,11 1 or 12 0 etc. mode, it is only necessary to first terminal and second Terminal is capable of identify that mutually.
Step S202, first terminal receive second terminal and send communication response;
The communication response that the second terminal that first terminal in above-mentioned steps S202 is received sends can be that multiple communications ring Should, such as in a concrete scheme of a preferred embodiment of the invention, the second terminal that above-mentioned first terminal is received sends Communication response can be, second terminal by Wireless Fidelity (English:Wireless Fidelity, WIFI) send one Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, repeat no more here, It is logical that certain second terminal that in another concrete scheme for inventing a preferred embodiment, above-mentioned first terminal is received sends Letter response can be that the communication response that second terminal is sent by bluetooth certainly in actual applications, can also adopt which His communication mode sends the communication response, and for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) communication response that sends can also be that second terminal is by CDMA (English certainly:Code Division Multiple Access, CDMA) communication response that sends.The specific embodiment of the invention is not limited to the communication The concrete manifestation form of request, is also not necessarily limited to the specific standard agreement that observes of the communication request.
Step S203, first terminal receive user password arrange the page input biological characteristic password, first terminal to Second terminal sends Password Input prompting;.
Password Input prompting in above-mentioned steps is specifically as follows:One specific message, such as short message, certainly in reality In the application of border, or the page of a reality, can also be the prompting of other modes, the specific embodiment of the invention certainly It is not intended to limit the concrete manifestation form of above-mentioned prompting.
Step S204, first terminal receive the second biological characteristic password that second terminal sends, and first terminal compares first Biological characteristic password and the second biological characteristic password, such as the second biological characteristic password and the first biological characteristic password are mismatched, the One terminal does not send removal of home file to second terminal.
Optionally, said method can also include after step s 204:
The second biological characteristic password is sent to server, and is sent a warning message to server.
For biological characteristic password, as which belongs to the inherent feature of owner, so there is no input error in which Problem, if out two biological characteristic passwords are mismatched, then be not belonging to certainly same owner, then be accomplished by second Second biological characteristic password of terminal input is sent to server, and carries out alarming processing, it is more likely that second terminal there occurs Lose or others surprisingly ask situation.
Optionally, said method can also include after step s 204:
First terminal is sent to second terminal hides Location Request, receives the location response that second terminal sends, described fixed Position response includes:The coordinate of second terminal.
Above-mentioned Location Request is hiding Location Request, and which can not be known by second terminal, if known by second terminal, Very possible positioning failure.
After communication connection is set up, first terminal displays to the user that the Password Input page to the technical scheme that the present invention is provided The first biological characteristic password of user input is obtained, then Password Input prompting is sent to second terminal, receive second terminal and return Return the second biological characteristic password, the first biological characteristic password and the second biological characteristic password are compared with determine whether as The user mobile phone removal of home, because for mobile phone removal of home, its new and old mobile phone is generally same user, then same user is random One password of input, the password is not also by network transmission, so its security is very high, so which has raising network The advantage of security.
Refer to Fig. 3, Fig. 3 is that a kind of mobile phone that improves is moved the device 300 of cryptographic check security, and described device is arranged at the In one terminal, described device includes:
Transmitting element 301, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, 32, communication response is sent for receiving second terminal;Receive user arranges page input in password First biological characteristic password;
Transmitting element 301, is additionally operable to send Password Input prompting to second terminal;
Receiving unit 302, is additionally operable to receive the second biological characteristic password that second terminal sends;
Processing unit 303, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic Password and the second biological characteristic password match, then send the removal of home file to second terminal.
Optionally, the processing unit, is additionally operable to such as the first biological characteristic password and the second biological characteristic password not Coupling, then do not send the removal of home file to second terminal.
Optionally, the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
Optionally, the processing unit, is additionally operable to send the second biological characteristic password to server, and to service Device sends a warning message.
Optionally, the transmitting element, is additionally operable to send to second terminal and hides Location Request;
The receiving unit, is additionally operable to receive the location response that second terminal sends, and the location response includes:Second eventually The coordinate at end.
The present invention also provides a kind of terminal, and the terminal includes the device of above-mentioned raising mobile phone removal of home cryptographic check security 300.
The details for specifically applying example of the invention, and without departing from the spirit or essential characteristics of the present invention, can The present invention is realized in other specific forms.Therefore, no matter from the point of view of which point, embodiment all should be regarded as exemplary, And be nonrestrictive, the scope of the present invention is by claims rather than described above is limited, it is intended that will fall All changes in the implication and scope of the equivalency of claim are included in the present invention.Should not be by appointing in claim What reference is considered as limits involved claim.Furthermore, it is to be understood that " an including " word is not excluded for other units or step, single Number is not excluded for plural number.The multiple units that states in system claims or device can also pass through software by a unit or device Or hardware is realizing.The first, the second grade word is used for representing title, and is not offered as any specific order.
Flow chart and block diagram in accompanying drawing shows system, method and the computer journey of the multiple embodiments according to the present invention The architectural framework in the cards of sequence product, function and operation.At this point, each square frame in flow chart or block diagram can generation A part for table one module, program segment or code, a part for the module, program segment or code include one or more use Executable instruction in the logic function for realizing regulation.It should also be noted that in some are as the realization that replaces, being marked in square frame The function of note can also occur with the order for being different from marked in accompanying drawing.For example, two continuous square frames can essentially base Originally it is performed in parallel, they can also be executed sometimes in the opposite order, this is depending on involved function.It is also noted that It is, the combination of each square frame and block diagram and/or the square frame in flow chart in block diagram and/or flow chart can to use and execute rule The special hardware based system of fixed function or action is realizing, or the group that can use specialized hardware and computer instruction Close to realize.
Referring to Fig. 4, the embodiment of the present invention also provides a kind of terminal 400, and the terminal 400 is included but is not limited to:Smart mobile phone, Intelligent watch, panel computer, personal computer, notebook computer or computer group, as shown in figure 4, the terminal 400 includes: Processor 401, memory 402, transceiver 403 and bus 404.Transceiver 403 is used for transceiving data between external equipment.If The quantity of the processor 401 in standby 400 can be one or more.In some embodiments of the present application, processor 401, storage Device 402 and transceiver 403 can pass through bus system or other modes connect.Equipment 400 can be used for executing the side shown in Fig. 1 Method.The implication of the term being related to regard to the present embodiment and citing, may be referred to the corresponding explanations of Fig. 1.Here is omitted.
Wherein, store program codes in memory 402.Processor 401 is used for calling the program generation stored in memory 402 Code, for executing step as shown in Figure 1.
It should be noted that processor 401 here can be a treatment element, or multiple treatment elements It is referred to as.For example, the treatment element can be central processing unit (Central Processing Unit, CPU), or spy Determine integrated circuit (Application Specific Integrated Circuit, ASIC), or be arranged to implement this One or more integrated circuits of application embodiment, for example:One or more microprocessors (digital signal Processor, DSP), or, one or more field programmable gate array (Field Programmable Gate Array, FPGA).
Memory 403 can be the general designation of a storage device, or multiple memory elements, and be used for storing and can holding Line program code or parameter, data etc. required for the operation of application program running gear.And memory 403 can include random storage Device (RAM), it is also possible to including nonvolatile memory (non-volatile memory), such as magnetic disc store, flash memory (Flash) etc..
Bus 404 can be that industry standard architecture (Industry Standard Architecture, ISA) is total Line, external equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control Bus processed etc..For ease of representing, only represented with a thick line in Fig. 4, it is not intended that only one bus or a type of Bus.
The user equipment can also include input/output unit, be connected to bus 404, with by bus and processor 401 Connect etc. other parts.The input/output unit can provide an inputting interface for operating personnel, so that operating personnel are by being somebody's turn to do Inputting interface selects item of deploying to ensure effective monitoring and control of illegal activities, and can also be other interfaces, can pass through the external miscellaneous equipment of the interface.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method, can be with Realize by another way.Device embodiment described above is only schematically, for example division of the unit, It is only a kind of division of logic function, there can be other dividing mode when actually realizing, and for example, multiple units or component can To combine or be desirably integrated into another system, or some features can be ignored, or not execute.Another, shown or beg for By coupling each other direct-coupling or communication connection can be by the indirect of some communication interfaces, device or unit Coupling is communicated to connect, and can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with It is stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially in other words The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual People's computer, server, or network equipment etc.) execute all or part of step of each embodiment methods described of the invention. And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above only in order to technical scheme to be described, rather than a limitation;To the greatest extent Pipe has been described in detail to the present invention with reference to foregoing embodiments, it will be understood by those within the art that:Its according to So the technical scheme described in foregoing embodiments can be modified, or which part or all technical characteristic are entered Row equivalent;And these modifications or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology The scope of scheme, its all should cover in the middle of the claim of the present invention and the scope of specification.

Claims (11)

1. a kind of improve mobile phone move cryptographic check security method, it is characterised in that methods described comprises the steps:
The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;
First terminal receives second terminal and sends communication response;
First terminal receive user arranges the first biological characteristic password of page input in password, and first terminal is sent out to second terminal Password Input is sent to point out;
First terminal receive second terminal send the second biological characteristic password, first terminal compare the first biological characteristic password with Second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then sending to second terminal should Removal of home file.
2. method according to claim 1, it is characterised in that methods described also includes:
As the first biological characteristic password and the second biological characteristic password are mismatched, then first terminal is not sent to second terminal The removal of home file.
3. method according to claim 1, it is characterised in that the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
4. method according to claim 2, it is characterised in that methods described is not sent to second terminal in first terminal should Can also include after removal of home file:
The second biological characteristic password is sent to server, and is sent a warning message to server.
5. method according to claim 2, it is characterised in that methods described is not sent to second terminal in first terminal should Can also include after removal of home file:
First terminal is sent to second terminal hides Location Request, receives the location response that second terminal sends, and the positioning is rung Should include:The coordinate of second terminal.
6. a kind of improve mobile phone move cryptographic check security device, it is characterised in that described device comprises the steps:
Transmitting element, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, sends communication response for receiving second terminal;Receive user arranges the first life of page input in password Thing feature password;
The transmitting element, is additionally operable to send Password Input prompting to second terminal;
The receiving unit, is additionally operable to receive the second biological characteristic password that second terminal sends;
Processing unit, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and Second biological characteristic password match, then send the removal of home file to second terminal.
7. device according to claim 6, it is characterised in that the processing unit, is additionally operable to as described first is biological special Levy password and the second biological characteristic password is mismatched, then the removal of home file is not sent to second terminal.
8. device according to claim 6, it is characterised in that the biological characteristic password is specifically included:
One or more in finger-print cipher, vein password, facial password, pupil password or palmmprint password.
9. device according to claim 7, it is characterised in that the processing unit, being additionally operable to will be described second biological special Levy password to send to server, and send a warning message to server.
10. device according to claim 7, it is characterised in that
The transmitting element, is additionally operable to send to second terminal and hides Location Request;
The receiving unit, is additionally operable to receive the location response that second terminal sends, and the location response includes:Second terminal Coordinate.
11. a kind of terminals, it is characterised in that the terminal includes the raising mobile phone removal of home as described in any one of claim 6-10 The device of cryptographic check security.
CN201610824830.5A 2016-09-14 2016-09-14 A kind of method and device improving mobile phone removal of home cryptographic check safety Active CN106503511B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610824830.5A CN106503511B (en) 2016-09-14 2016-09-14 A kind of method and device improving mobile phone removal of home cryptographic check safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610824830.5A CN106503511B (en) 2016-09-14 2016-09-14 A kind of method and device improving mobile phone removal of home cryptographic check safety

Publications (2)

Publication Number Publication Date
CN106503511A true CN106503511A (en) 2017-03-15
CN106503511B CN106503511B (en) 2019-06-14

Family

ID=58290449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610824830.5A Active CN106503511B (en) 2016-09-14 2016-09-14 A kind of method and device improving mobile phone removal of home cryptographic check safety

Country Status (1)

Country Link
CN (1) CN106503511B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135498A (en) * 2017-04-27 2017-09-05 努比亚技术有限公司 A kind of sharing files method and apparatus
WO2018049975A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transfer method and related product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984679A (en) * 2012-11-06 2013-03-20 周万荣 Method and terminal of call forwarding and data manipulation
CN104657643A (en) * 2015-03-13 2015-05-27 广东欧珀移动通信有限公司 Privacy protection method, wearable device and mobile terminal
CN105138878A (en) * 2015-07-14 2015-12-09 广东欧珀移动通信有限公司 Remote terminal control method and mobile terminal
CN105429949A (en) * 2015-10-28 2016-03-23 广东欧珀移动通信有限公司 Cipher pushing method and pushing system
CN105590211A (en) * 2014-10-21 2016-05-18 腾讯科技(深圳)有限公司 Data transfer method, data transfer device and data transfer system
CN105701397A (en) * 2014-11-24 2016-06-22 中国移动通信集团公司 Method and device for controlling application program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984679A (en) * 2012-11-06 2013-03-20 周万荣 Method and terminal of call forwarding and data manipulation
CN105590211A (en) * 2014-10-21 2016-05-18 腾讯科技(深圳)有限公司 Data transfer method, data transfer device and data transfer system
CN105701397A (en) * 2014-11-24 2016-06-22 中国移动通信集团公司 Method and device for controlling application program
CN104657643A (en) * 2015-03-13 2015-05-27 广东欧珀移动通信有限公司 Privacy protection method, wearable device and mobile terminal
CN105138878A (en) * 2015-07-14 2015-12-09 广东欧珀移动通信有限公司 Remote terminal control method and mobile terminal
CN105429949A (en) * 2015-10-28 2016-03-23 广东欧珀移动通信有限公司 Cipher pushing method and pushing system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018049975A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transfer method and related product
CN107135498A (en) * 2017-04-27 2017-09-05 努比亚技术有限公司 A kind of sharing files method and apparatus
CN107135498B (en) * 2017-04-27 2020-01-17 宁波甬宸影视文化股份有限公司 File sharing method and equipment

Also Published As

Publication number Publication date
CN106503511B (en) 2019-06-14

Similar Documents

Publication Publication Date Title
US10601978B2 (en) Telecommunication device utilization based on heartbeat communication
CN102439898B (en) Based on the multi-tier authentication method and system of model
US20160210632A1 (en) Secured payment method and relevant device and system
CN107071865A (en) The method and device that a kind of Wireless Fidelity is quickly connected
CN108345462B (en) Method and device for upgrading components
CN104754563A (en) Wireless hotspot access sharing method, mobile terminals and system
CN104699515B (en) A kind of upgrade method and intelligent terminal based on Android operation system
CN104636924A (en) Safe payment method, server and system
CN107336681A (en) The control method and device of vehicle
EP3256943A1 (en) Systems and methods for adaptive cloning of mobile devices
CN111984557A (en) Data processing method, device and system
CN106503511A (en) A kind of method and device for improving mobile phone removal of home cryptographic check security
KR20170083537A (en) Add-on modem for wireless devices and methods useful in conjunction therewith
CN106507268A (en) The method and device of dynamic authentication in a kind of mobile phone removal of home
CN106446110A (en) Realization method and device for connecting security in terminal moving
CN105227441A (en) Cloud server, contact identity defining method and system
CN104079325A (en) Method of sharing information and electronic equipment
CN106484506A (en) File store path system of selection and device in a kind of terminal removal of home
CN106161750B (en) Information processing method and electronic equipment
KR101660248B1 (en) Smart card processing multi subscribers' information, electronic device using thereof, and method for managing multi subscribers in the electronic device
CN113518021A (en) Method, system, device and equipment for binding user account
US9535566B2 (en) Method, apparatus and system of displaying a file
US10277690B2 (en) Configuration-driven sign-up
US9807230B2 (en) Parameter writing program on communication subscriber card
CN106658669A (en) Quick connection method and device for wireless fidelity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant