CN106507268A - The method and device of dynamic authentication in a kind of mobile phone removal of home - Google Patents

The method and device of dynamic authentication in a kind of mobile phone removal of home Download PDF

Info

Publication number
CN106507268A
CN106507268A CN201610825085.6A CN201610825085A CN106507268A CN 106507268 A CN106507268 A CN 106507268A CN 201610825085 A CN201610825085 A CN 201610825085A CN 106507268 A CN106507268 A CN 106507268A
Authority
CN
China
Prior art keywords
terminal
result
password
input
removal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610825085.6A
Other languages
Chinese (zh)
Other versions
CN106507268B (en
Inventor
张海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610825085.6A priority Critical patent/CN106507268B/en
Publication of CN106507268A publication Critical patent/CN106507268A/en
Application granted granted Critical
Publication of CN106507268B publication Critical patent/CN106507268B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/64Details of telephonic subscriber devices file transfer between terminals

Abstract

The invention belongs to the communications field, there is provided a kind of method of dynamic authentication in mobile phone removal of home, methods described comprise the steps:The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;First terminal receives second terminal and sends communication response;First terminal receive user arranges the first password of page input in password, first terminal is input to first password in setup algorithm model, first terminal calls the computing formula matched with first password input time in setting model to be calculated the first result, and first terminal sends Password Input prompting to second terminal;First terminal receives the second result that second Password Input by user input of second terminal transmission is obtained to setup algorithm model, first terminal compares the first result and the second result, as the first result is identical with the second result, then the removal of home file is sent to second terminal.The technical scheme that the present invention is provided has the advantages that user experience is good.

Description

The method and device of dynamic authentication in a kind of mobile phone removal of home
Technical field
The present invention relates to the communications field, more particularly in a kind of removal of home of mobile phone dynamic authentication method and device.
Background technology
The equipment such as the terminal of the communications field, such as mobile phone, panel computer is belonging to the equipment that user commonly uses, due at present should Equipment is respectively provided with the operating system of itself, so terminal is referred to as intelligent terminal or smart mobile phone, smart mobile phone (English also: Smartphone) be the mobile phone more higher than traditional function mobile phone for those operational capabilities and function collectivity appellation.Intelligence Mobile phone is had using most operating system:Windows Phone, Android, IOS and BlackBerry OS, but between them Application software incompatible.Smart mobile phone because third party software can be installed as PC, their functions Abundant, and constantly can expand.
Existing terminal is respectively provided with the function of file storage, and this document is for example:Photo, text, video, address list etc., With the style of current smart mobile phone more and more, mobile phone change frequency more and more higher, the application mobile phone is changed after number " mobile phone removal of home " is commonly called as according to transfer, for the removal of home of existing mobile phone, how the file of old mobile phone is transferred in new cell-phone It is a problem for allowing very much people to have a headache, by taking address list as an example, currently existing scheme is realized by third party software, existing hand Machine cannot ensure the security for connecting in removal of home, so in mobile phone removal of home the data in mobile phone may be caused to reveal, user Experience Degree is low.
Content of the invention
The method that an object of the present invention is to provide dynamic authentication in a kind of mobile phone removal of home, which mainly solves existing body The low shortcoming of degree of testing.
First aspect, there is provided a kind of method of dynamic authentication in mobile phone removal of home, methods described comprise the steps:
The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;
First terminal receives second terminal and sends communication response;
First terminal receive user arranges the first password of page input in password, and first password is input to by first terminal In setup algorithm model, first terminal calls the computing formula matched with first password input time in setting model to calculate To the first result, first terminal is to second terminal transmission Password Input prompting;
First terminal receives the obtaining the second Password Input of user input to setup algorithm model of second terminal transmission The second result, first terminal compares the first result and the second result, and such as the first result is identical with the second result, then to second eventually End sends the removal of home file.
Optionally, methods described also includes:
As the first result and the second result are differed, then first terminal does not send the removal of home file to second terminal.
Optionally, first terminal calls the computing formula matched with first password input time in setting model to calculate Concrete to the first result, including:
The first password is inquired in the time that first terminal is stored from setting model and the mapping relations of computing formula The first password is input to the computing formula and is calculated the first result by input time corresponding computing formula.
Optionally, methods described also includes after the removal of home file is not sent to the second terminal:
First terminal sends Password Input prompting again to second terminal, receive that second terminal sends by user input The 3rd result that 3rd Password Input is obtained to setup algorithm model, as the 3rd result is identical with first result, first eventually Hold to the second terminal and send the removal of home file, as the 3rd result is differed with the first result, first terminal not to The second terminal sends the removal of home file, and first terminal sends warning information to server, and the warning information includes:Institute State the mark of second terminal.
Optionally, methods described also includes after the first terminal sends warning information to server:
The first terminal sends screen locking order to the second terminal, and the screen locking order is used for indicating described second eventually Hold screen locking.
Second aspect, there is provided the device of dynamic authentication in a kind of mobile phone removal of home, described device include:
Transmitting element, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, sends communication response for receiving second terminal;Receive user arranges the of page input in password One password;
Processing unit, for first password is input in setup algorithm model, call in setting model with first password The computing formula that input time matches is calculated the first result;
The transmitting element, is additionally operable to send Password Input prompting to second terminal;
The receiving unit, is additionally operable to receive second Password Input by user input of second terminal transmission to setting meter Calculate the second result that model is obtained;
The processing unit, is additionally operable to compare the first result and the second result, and such as the first result is identical with the second result, then The removal of home file is sent to second terminal.
Optionally, the processing unit is additionally operable to such as the first result and the second result and differs, then first terminal is not to Two terminals send the removal of home file.
Optionally, the processing unit is concrete, for the mapping relations of time for storing from setting model and computing formula In inquire the first password input time corresponding computing formula, the first password is input to the computing formula meter Calculation obtains the first result.
Optionally, the transmitting element is additionally operable to send Password Input prompting again to second terminal;
The receiving unit, is additionally operable to receive the 3rd Password Input by user input of second terminal transmission to setting meter Calculate the 3rd result that model is obtained;
The processing unit, is additionally operable to as the 3rd result is identical with first result, sends institute to the second terminal Removal of home file is stated, and as the 3rd result is differed with the first result, the removal of home file is not sent to the second terminal, to Server sends warning information, and the warning information includes:The mark of the second terminal.
Optionally, the transmitting element is additionally operable to send screen locking order to the second terminal, and the screen locking order is used for Indicate the second terminal by screen locking.
A kind of third aspect, there is provided terminal, the terminal include the device of dynamic authentication in above-mentioned mobile phone removal of home.
Those of ordinary skill in the art will be appreciated that although referenced in schematic embodiment, accompanying drawing are carried out by detailed description below, But the present invention is not limited in these embodiments.But, the scope of the present invention is extensive, and is intended to be bound only by appended right Require to limit the scope of the present invention.
Description of the drawings
By reading the detailed description made by non-limiting example that is made with reference to the following drawings, other of the invention Feature, objects and advantages will become more apparent upon:
Fig. 1 for provided according to a preferred embodiment of the invention mobile phone removal of home in dynamic authentication method flow chart.
Fig. 2 for provided according to another preferred embodiment of the present invention mobile phone removal of home in dynamic authentication method flow process Figure.
Fig. 3 for provided according to next preferred embodiment of the invention mobile phone removal of home in dynamic authentication device structure chart.
The hardware architecture diagram of the terminal that Fig. 4 is provided for the present invention.
Specific embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The process that describes as flow chart or method.Although operations to be described as flow chart the process of order, therein permitted Multioperation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be rearranged.When which Process when operation is completed can be terminated, it is also possible to have the additional step being not included in accompanying drawing.The process Can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", refer to and by running preset program or can refer to Make executing the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with Memory, the survival instruction for being prestored by computing device in memory executing predetermined process process, or by ASIC, The hardware such as FPGA, DSP execute predetermined process process, or are combined to realize by said two devices.Computer equipment includes but does not limit In server, PC, notebook computer, panel computer, smart mobile phone etc..
Method (some of them are illustrated by flow process) discussed hereafter can pass through hardware, software, firmware, centre Part, microcode, hardware description language or its be combined implementing.When being implemented with software, firmware, middleware or microcode When, in order to implement, the program code or code segment of necessary task can be stored in machine or computer-readable medium (is such as deposited Storage media) in.(one or more) processor can implement necessary task.
Concrete structure disclosed herein and function detail are only representational, and be for describe the present invention show The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and is not interpreted as It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. here to describe unit, But these units should not be limited by these terms.It is used for the purpose of a unit and another unit using these terms Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second Unit, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or Any and all combination of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless Context clearly refers else, and singulative " one " otherwise used herein above, " one " also attempt to include plural number.Should also When being understood by, term " including " used herein above and/or "comprising" specify stated feature, integer, step, operation, Unit and/or the presence of component, and do not preclude the presence or addition of other features one or more, integer, step, operation, unit, Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be attached according to being different from The order indicated in figure occurs.For example, depending on involved function/action, the two width figures for illustrating in succession actually may be used Substantially simultaneously to execute or can execute in a reverse order sometimes.
Below in conjunction with the accompanying drawings the present invention is described in further detail.
According to an aspect of the invention, there is provided in a kind of removal of home of mobile phone dynamic authentication method.Wherein, the method should With in the terminal, the terminal is included but is not limited to:Server, computer, panel computer, smart mobile phone etc., are answered actual certainly With in, the equipment such as such as intelligent watch or Intelligent bracelet can also be increased.
In one embodiment, in above-mentioned mobile phone removal of home, the method for dynamic authentication can be used in terminal, need explanation It is that the terminal is only for example, if other existing or network equipments for being likely to occur from now on and user equipment are applied to this Invention, within also should being included in the scope of the present invention, and is incorporated herein by reference.
Fig. 1 is refer to, Fig. 1 is the side of dynamic authentication during the mobile phone of the offer according to a preferred embodiment of the invention is moved Method, the method are completed by terminal, and the method is as shown in figure 1, comprise the steps:
The communication request that step S101, first terminal are sent to second terminal, the communication request include:The finger of removal of home Show;
First terminal in above-mentioned steps S101 can be multiple communication requests to the communication request that second terminal sends, example Such as in a concrete scheme of a preferred embodiment of the invention, the communication request that above-mentioned first terminal is sent to second terminal Can be that first terminal is by Wireless Fidelity (English:Wireless Fidelity, WIFI) communication request sending, should The structure of communication request and definition may refer to being specifically defined in IEEE802.1, repeat no more here, certainly in invention one In another concrete scheme of individual preferred embodiment, above-mentioned first terminal to the communication request that second terminal sends can be, The communication request that one terminal is sent by bluetooth, certainly in actual applications, can also adopt other communication modes to send out The communication request is given, for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) send logical Letter request, can also be that first terminal is by CDMA (English certainly:Code Division Multiple Access, CDMA the communication request for) sending.The specific embodiment of the invention is not limited to the concrete manifestation form of the communication request, does not also limit The specific standard agreement that observes in the communication request.
The value of the instruction of above-mentioned removal of home is specifically as follows:Whether removal of home or not, and which can pass through to extend word in communication request In section, bit for example, sets 1 for removal of home, sets 0 for not moving embodying, certainly in actual applications, above-mentioned setting 0 can also for example be set for removal of home, 1 is set for not moving in turn, the specific embodiment of the invention does not limit above-mentioned instruction Value concrete meaning.Certainly in actual applications, one can also for example be carried in other way as the instruction that moves The special field of individual preseting length, such as 10 1,10 0,11 1 or 12 0 etc. mode, it is only necessary to first terminal and second Terminal is capable of identify that mutually.
Step S102, first terminal receive second terminal and send communication response;
The communication response that the second terminal that first terminal in above-mentioned steps S102 is received sends can be that multiple communications ring Should, such as in a concrete scheme of a preferred embodiment of the invention, the second terminal that above-mentioned first terminal is received sends Communication response can be, second terminal by Wireless Fidelity (English:Wireless Fidelity, WIFI) send one Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, repeat no more here, It is logical that certain second terminal that in another concrete scheme for inventing a preferred embodiment, above-mentioned first terminal is received sends Letter response can be that the communication response that second terminal is sent by bluetooth certainly in actual applications, can also adopt which His communication mode sends the communication response, and for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) communication response that sends can also be that second terminal is by CDMA (English certainly:Code Division Multiple Access, CDMA) communication response that sends.The specific embodiment of the invention is not limited to the communication The concrete manifestation form of request, is also not necessarily limited to the specific standard agreement that observes of the communication request.
Step S103, first terminal receive user arrange the first password of page input in password, and first terminal is by first To in setup algorithm model, first terminal calls the calculating matched in setting model with first password input time to Password Input Formula is calculated the first result, and first terminal sends Password Input prompting to second terminal.
Password Input prompting in above-mentioned steps is specifically as follows:One specific message, such as short message, certainly in reality In the application of border, or the page of a reality, can also be the prompting of other modes, the specific embodiment of the invention certainly It is not intended to limit the concrete manifestation form of above-mentioned prompting.
Above-mentioned computing formula can have multiple, and the specific quantity for arranging can be by user's sets itself, for example, by first Password is multiplied by a specific numeral, naturally it is also possible to be to take the remainder first password divided by a specific numeral or result is equal Can be with.Illustrate by taking two formula as an example below.
Formula 1:Y=A*X, wherein, y is the first result, and X is first password, and A is specific numeral, it should be noted that Above-mentioned specific numeral can dynamically change according to the time, and for example every 1 minute, the specific numeral Jia 1, naturally it is also possible to It is that the specific numeral subtracted 1 every 1 minute, so the formula is the formula with time dynamic.
Formula 2:Y=X/B, wherein, y is the first result, and X is first password, and B is specific numeral, it should be noted that Above-mentioned specific numeral can dynamically change according to the time, and for example every 1 minute, the specific numeral Jia 1, naturally it is also possible to It is that the specific numeral subtracted 1 every 1 minute, so the formula is the formula with time dynamic, it should be noted that working as For division when, the first result can be that the result that calculates according to formula 2 is rounded, and this rounds to round up can also be Round downwards, certain first result can also be the remainder calculated according to formula 2.
Step S104, first terminal receive second Password Input by user input of second terminal transmission to setup algorithm The second result that model is obtained, first terminal compare the first result and the second result, and such as the first result is identical with the second result, then The removal of home file is sent to second terminal.
Optionally, said method can also include after step s 104:
As the first result and the second result are differed, then first terminal does not send the removal of home file to second terminal.
The technical scheme that the present invention is provided selects different computing formula meters according to the time after communication connection is set up Calculation obtains result, receives the result of another checking, so two results is compared and can obtain whether which belongs to same Individual user, as the result of the checking is to change over time, so which is dynamic result, even if so intercepting One result, cannot also carry out the interception of follow-up data, improve security, so its security is very high, so which has It is improved the advantage of internet security.
Fig. 2 is refer to, Fig. 1 is dynamic authentication during the mobile phone of the offer according to another preferred embodiment of the present invention is moved Method, the method are completed by terminal, and the method is as shown in figure 1, comprise the steps:
The communication request that step S201, first terminal are sent to second terminal, the communication request include:The finger of removal of home Show;
First terminal in above-mentioned steps S201 can be multiple communication requests to the communication request that second terminal sends, example Such as in a concrete scheme of a preferred embodiment of the invention, the communication request that above-mentioned first terminal is sent to second terminal Can be that first terminal is by Wireless Fidelity (English:Wireless Fidelity, WIFI) communication request sending, should The structure of communication request and definition may refer to being specifically defined in IEEE802.1, repeat no more here, certainly in invention one In another concrete scheme of individual preferred embodiment, above-mentioned first terminal to the communication request that second terminal sends can be, The communication request that one terminal is sent by bluetooth, certainly in actual applications, can also adopt other communication modes to send out The communication request is given, for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) send logical Letter request, can also be that first terminal is by CDMA (English certainly:Code Division Multiple Access, CDMA the communication request for) sending.The specific embodiment of the invention is not limited to the concrete manifestation form of the communication request, does not also limit The specific standard agreement that observes in the communication request.
The value of the instruction of above-mentioned removal of home is specifically as follows:Whether removal of home or not, and which can pass through to extend word in communication request In section, bit for example, sets 1 for removal of home, sets 0 for not moving embodying, certainly in actual applications, above-mentioned setting 0 can also for example be set for removal of home, 1 is set for not moving in turn, the specific embodiment of the invention does not limit above-mentioned instruction Value concrete meaning.Certainly in actual applications, one can also for example be carried in other way as the instruction that moves The special field of individual preseting length, such as 10 1,10 0,11 1 or 12 0 etc. mode, it is only necessary to first terminal and second Terminal is capable of identify that mutually.
Step S202, first terminal receive second terminal and send communication response;
The communication response that the second terminal that first terminal in above-mentioned steps S202 is received sends can be that multiple communications ring Should, such as in a concrete scheme of a preferred embodiment of the invention, the second terminal that above-mentioned first terminal is received sends Communication response can be, second terminal by Wireless Fidelity (English:Wireless Fidelity, WIFI) send one Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, repeat no more here, It is logical that certain second terminal that in another concrete scheme for inventing a preferred embodiment, above-mentioned first terminal is received sends Letter response can be that the communication response that second terminal is sent by bluetooth certainly in actual applications, can also adopt which His communication mode sends the communication response, and for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) communication response that sends can also be that second terminal is by CDMA (English certainly:Code Division Multiple Access, CDMA) communication response that sends.The specific embodiment of the invention is not limited to the communication The concrete manifestation form of request, is also not necessarily limited to the specific standard agreement that observes of the communication request.
Step S203, first terminal receive user arrange the first password of page input in password, and first terminal is from setting Time corresponding with the first password input time is inquired in the mapping relations of the computing formula computing formula of model storage, The first password is input to the computing formula and is calculated the first result, it is defeated that first terminal sends password to second terminal Enter prompting.
Password Input prompting in above-mentioned steps is specifically as follows:One specific message, such as short message, certainly in reality In the application of border, or the page of a reality, can also be the prompting of other modes, the specific embodiment of the invention certainly It is not intended to limit the concrete manifestation form of above-mentioned prompting.
Above-mentioned computing formula can have multiple, and the specific quantity for arranging can be by user's sets itself, for example, by first Password is multiplied by a specific numeral, naturally it is also possible to be to take the remainder first password divided by a specific numeral or result is equal Can be with.Illustrate by taking two formula as an example below.
Formula 1:Y=A*X, wherein, y is the first result, and X is first password, and A is specific numeral, it should be noted that Above-mentioned specific numeral can dynamically change according to the time, and for example every 1 minute, the specific numeral Jia 1, naturally it is also possible to It is that the specific numeral subtracted 1 every 1 minute, so the formula is the formula with time dynamic.
Formula 2:Y=X/B, wherein, y is the first result, and X is first password, and B is specific numeral, it should be noted that Above-mentioned specific numeral can dynamically change according to the time, and for example every 1 minute, the specific numeral Jia 1, naturally it is also possible to It is that the specific numeral subtracted 1 every 1 minute, so the formula is the formula with time dynamic, it should be noted that working as For division when, the first result can be that the result that calculates according to formula 2 is rounded, and this rounds to round up can also be Round downwards, certain first result can also be the remainder calculated according to formula 2.
Step S104, first terminal receive second Password Input by user input of second terminal transmission to setup algorithm The second result that model is obtained, first terminal compare the first result and the second result, and such as the first result is identical with the second result, then The removal of home file is sent to second terminal.
Optionally, said method can also include after step s 104:
As the first result and the second result are differed, first terminal sends Password Input prompting again to second terminal, connects The 3rd result that the 3rd Password Input of user input is obtained that second terminal sends, such as the 3rd knot is received to setup algorithm model Fruit is identical with first result, and first terminal sends the removal of home file to the second terminal, as the 3rd result with First result is differed, and first terminal does not send the removal of home file to the second terminal, and first terminal is sent to server Warning information, the warning information include:The mark of the second terminal.
Optionally, said method can also include after above-mentioned technical proposal:
The first terminal sends screen locking order to the second terminal, and the screen locking order is used for indicating described second eventually Hold screen locking.
Second terminal screen locking is enabled to by above-mentioned screen locking order, it is to avoid the operation of non-owner.
The technical scheme that the present invention is provided selects different computing formula meters according to the time after communication connection is set up Calculation obtains result, receives the result of another checking, so two results is compared and can obtain whether which belongs to same Individual user, as the result of the checking is to change over time, so which is dynamic result, even if so intercepting One result, cannot also carry out the interception of follow-up data, improve security, so its security is very high, so which has It is improved the advantage of internet security.
Fig. 3 is referred to, Fig. 3 is a kind of device 300 of dynamic authentication in mobile phone removal of home, and described device is arranged at first terminal Interior, described device includes:
Transmitting element 301, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit 302, sends communication response for receiving second terminal;Receive user arranges page input in password First password;
Processing unit 303, for first password is input in setup algorithm model, calls close with first in setting model The computing formula that code input time matches is calculated the first result;
Transmitting element 301, is additionally operable to send Password Input prompting to second terminal;
Receiving unit 302, is additionally operable to receive second Password Input by user input of second terminal transmission to setting meter Calculate the second result that model is obtained;
Processing unit 303, is additionally operable to compare the first result and the second result, and such as the first result is identical with the second result, then The removal of home file is sent to second terminal.
Optionally, the processing unit is additionally operable to such as the first result and the second result and differs, then first terminal is not to Two terminals send the removal of home file.
Optionally, the processing unit is concrete, for the mapping relations of time for storing from setting model and computing formula In inquire the first password input time corresponding computing formula, the first password is input to the computing formula meter Calculation obtains the first result.
Optionally, the transmitting element is additionally operable to send Password Input prompting again to second terminal;
The receiving unit, is additionally operable to receive the 3rd Password Input by user input of second terminal transmission to setting meter Calculate the 3rd result that model is obtained;
The processing unit, is additionally operable to as the 3rd result is identical with first result, sends institute to the second terminal Removal of home file is stated, and as the 3rd result is differed with the first result, the removal of home file is not sent to the second terminal, to Server sends warning information, and the warning information includes:The mark of the second terminal.
Optionally, the transmitting element is additionally operable to send screen locking order to the second terminal, and the screen locking order is used for Indicate the second terminal by screen locking.
The present invention also provides a kind of terminal, and the terminal includes the device 300 of dynamic authentication in above-mentioned mobile phone removal of home.
The details for specifically applying example of the invention, and without departing from the spirit or essential characteristics of the present invention, can The present invention is realized in other specific forms.Therefore, no matter from the point of view of which point, embodiment all should be regarded as exemplary, And be nonrestrictive, the scope of the present invention is by claims rather than described above is limited, it is intended that will fall All changes in the implication and scope of the equivalency of claim are included in the present invention.Should not be by appointing in claim What reference is considered as limits involved claim.Furthermore, it is to be understood that " an including " word is not excluded for other units or step, single Number is not excluded for plural number.The multiple units that states in system claims or device can also pass through software by a unit or device Or hardware is realizing.The first, the second grade word is used for representing title, and is not offered as any specific order.
Flow chart and block diagram in accompanying drawing shows system, method and the computer journey of the multiple embodiments according to the present invention The architectural framework in the cards of sequence product, function and operation.At this point, each square frame in flow chart or block diagram can generation A part for table one module, program segment or code, a part for the module, program segment or code include one or more use Executable instruction in the logic function for realizing regulation.It should also be noted that in some are as the realization that replaces, being marked in square frame The function of note can also occur with the order for being different from marked in accompanying drawing.For example, two continuous square frames can essentially base Originally it is performed in parallel, they can also be executed sometimes in the opposite order, this is depending on involved function.It is also noted that It is, the combination of each square frame and block diagram and/or the square frame in flow chart in block diagram and/or flow chart can to use and execute rule The special hardware based system of fixed function or action is realizing, or the group that can use specialized hardware and computer instruction Close to realize.
Referring to Fig. 4, the embodiment of the present invention also provides a kind of terminal 400, and the terminal 400 is included but is not limited to:Smart mobile phone, Intelligent watch, panel computer, personal computer, notebook computer or computer group, as shown in figure 4, the terminal 400 includes: Processor 401, memory 402, transceiver 403 and bus 404.Transceiver 403 is used for transceiving data between external equipment.If The quantity of the processor 401 in standby 400 can be one or more.In some embodiments of the present application, processor 401, storage Device 402 and transceiver 403 can pass through bus system or other modes connect.Equipment 400 can be used for executing the side shown in Fig. 1 Method.The implication of the term being related to regard to the present embodiment and citing, may be referred to the corresponding explanations of Fig. 1.Here is omitted.
Wherein, store program codes in memory 402.Processor 401 is used for calling the program generation stored in memory 402 Code, for executing step as shown in Figure 1.
It should be noted that processor 401 here can be a treatment element, or multiple treatment elements It is referred to as.For example, the treatment element can be central processing unit (Central Processing Unit, CPU), or spy Determine integrated circuit (Application Specific Integrated Circuit, ASIC), or be arranged to implement this One or more integrated circuits of application embodiment, for example:One or more microprocessors (digital signal Processor, DSP), or, one or more field programmable gate array (Field Programmable Gate Array, FPGA).
Memory 403 can be the general designation of a storage device, or multiple memory elements, and be used for storing and can holding Line program code or parameter, data etc. required for the operation of application program running gear.And memory 403 can include random storage Device (RAM), it is also possible to including nonvolatile memory (non-volatile memory), such as magnetic disc store, flash memory (Flash) etc..
Bus 404 can be that industry standard architecture (Industry Standard Architecture, ISA) is total Line, external equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control Bus processed etc..For ease of representing, only represented with a thick line in Fig. 4, it is not intended that only one bus or a type of Bus.
The user equipment can also include input/output unit, be connected to bus 404, with by bus and processor 401 Connect etc. other parts.The input/output unit can provide an inputting interface for operating personnel, so that operating personnel are by being somebody's turn to do Inputting interface selects item of deploying to ensure effective monitoring and control of illegal activities, and can also be other interfaces, can pass through the external miscellaneous equipment of the interface.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method, can be with Realize by another way.Device embodiment described above is only schematically, for example division of the unit, It is only a kind of division of logic function, there can be other dividing mode when actually realizing, and for example, multiple units or component can To combine or be desirably integrated into another system, or some features can be ignored, or not execute.Another, shown or beg for By coupling each other direct-coupling or communication connection can be by the indirect of some communication interfaces, device or unit Coupling is communicated to connect, and can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with It is stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially in other words The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual People's computer, server, or network equipment etc.) execute all or part of step of each embodiment methods described of the invention. And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above only in order to technical scheme to be described, rather than a limitation;To the greatest extent Pipe has been described in detail to the present invention with reference to foregoing embodiments, it will be understood by those within the art that:Its according to So the technical scheme described in foregoing embodiments can be modified, or which part or all technical characteristic are entered Row equivalent;And these modifications or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology The scope of scheme, its all should cover in the middle of the claim of the present invention and the scope of specification.

Claims (11)

1. a kind of method of dynamic authentication during mobile phone is moved, it is characterised in that methods described comprises the steps:
The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;
First terminal receives second terminal and sends communication response;
First terminal receive user arranges the first password of page input in password, and first password is input to setting by first terminal In computation model, first terminal calls the computing formula matched with first password input time in setting model to be calculated One result, first terminal send Password Input prompting to second terminal;
First terminal receives that the second Password Input by user input that second terminal sends is obtained to setup algorithm model Two results, first terminal compare the first result and the second result, and such as the first result is identical with the second result, then send out to second terminal Give the removal of home file.
2. method according to claim 1, it is characterised in that methods described also includes:
As the first result and the second result are differed, then first terminal does not send the removal of home file to second terminal.
3. method according to claim 1, it is characterised in that first terminal is called in setting model and is input into first password The computing formula that time matches is calculated the first result specifically, including:
The first password input is inquired in the time that first terminal is stored from setting model and the mapping relations of computing formula The first password is input to the computing formula and is calculated the first result by time corresponding computing formula.
4. method according to claim 2, it is characterised in that methods described is not sending the removal of home to the second terminal Also include after file:
First terminal sends Password Input prompting again to second terminal, receive that second terminal sends by the 3rd of user input the The 3rd result that Password Input is obtained to setup algorithm model, as the 3rd result identical with first result, first terminal to The second terminal sends the removal of home file, and as the 3rd result is differed with the first result, first terminal is not to described Second terminal sends the removal of home file, and first terminal sends warning information to server, and the warning information includes:Described The mark of two terminals.
5. method according to claim 4, it is characterised in that methods described sends announcement in the first terminal to server Also include after alarming information:
The first terminal sends screen locking order to the second terminal, and the screen locking order is used for indicating that the second terminal will Screen locking.
6. the device of dynamic authentication during a kind of mobile phone is moved, it is characterised in that described device includes:
Transmitting element, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, sends communication response for receiving second terminal;Receive user arranges the first close of page input in password Code;
Processing unit, for first password is input in setup algorithm model, is called in setting model and is input into first password The computing formula that time matches is calculated the first result;
The transmitting element, is additionally operable to send Password Input prompting to second terminal;
The receiving unit, is additionally operable to receive second Password Input by user input of second terminal transmission to setup algorithm mould The second result that type is obtained;
The processing unit, is additionally operable to compare the first result and the second result, and such as the first result is identical with the second result, then to the Two terminals send the removal of home file.
7. device according to claim 6, it is characterised in that the processing unit is additionally operable to the first result such as and the second knot Fruit differs, then first terminal does not send the removal of home file to second terminal.
8. device according to claim 6, it is characterised in that the processing unit is concrete, for storing from setting model Time corresponding with the first password input time is inquired in the mapping relations of computing formula computing formula, by described One Password Input is calculated the first result to the computing formula.
9. device according to claim 7, it is characterised in that the transmitting element is additionally operable to be sent to second terminal again Password Input is pointed out;
The receiving unit, is additionally operable to receive the 3rd Password Input by user input of second terminal transmission to setup algorithm mould The 3rd result that type is obtained;
The processing unit, is additionally operable to as the 3rd result is identical with first result, to the second terminal send described in remove Family's file, as the 3rd result is differed with the first result, does not send the removal of home file to the second terminal, to service Device sends warning information, and the warning information includes:The mark of the second terminal.
10. device according to claim 9, it is characterised in that the transmitting element is additionally operable to send out to the second terminal Screen locking order, the screen locking order is sent to be used for indicating the second terminal by screen locking.
11. a kind of terminals, it is characterised in that the terminal includes that the mobile phone as described in any one of claim 6-10 is moved in moving The device of state checking.
CN201610825085.6A 2016-09-14 2016-09-14 Method and device for dynamic verification in mobile phone carriers Active CN106507268B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610825085.6A CN106507268B (en) 2016-09-14 2016-09-14 Method and device for dynamic verification in mobile phone carriers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610825085.6A CN106507268B (en) 2016-09-14 2016-09-14 Method and device for dynamic verification in mobile phone carriers

Publications (2)

Publication Number Publication Date
CN106507268A true CN106507268A (en) 2017-03-15
CN106507268B CN106507268B (en) 2020-01-31

Family

ID=58291414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610825085.6A Active CN106507268B (en) 2016-09-14 2016-09-14 Method and device for dynamic verification in mobile phone carriers

Country Status (1)

Country Link
CN (1) CN106507268B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018049975A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transfer method and related product
CN113986075A (en) * 2021-10-22 2022-01-28 维沃移动通信有限公司 Information display method and device, verification method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020042753A1 (en) * 2000-10-06 2002-04-11 Ortiz Luis M. Transaction broker method and system
CN101764800A (en) * 2009-12-02 2010-06-30 深圳市融创天下科技发展有限公司 Method for dynamic password multi-terminal combined authentication
CN102857564A (en) * 2012-08-27 2013-01-02 华为终端有限公司 Data synchronization method, terminal and system
CN103957037A (en) * 2014-04-09 2014-07-30 北京工业大学 Method for automatic communication between PC side and Android mobile phone side based on Bluetooth
CN104023410A (en) * 2014-05-14 2014-09-03 北京奇虎科技有限公司 Method and device capable of realizing safe data transfer between wireless terminals
CN104144175A (en) * 2013-05-06 2014-11-12 腾讯科技(深圳)有限公司 Method, device and system for data migration

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020042753A1 (en) * 2000-10-06 2002-04-11 Ortiz Luis M. Transaction broker method and system
CN101764800A (en) * 2009-12-02 2010-06-30 深圳市融创天下科技发展有限公司 Method for dynamic password multi-terminal combined authentication
CN102857564A (en) * 2012-08-27 2013-01-02 华为终端有限公司 Data synchronization method, terminal and system
CN104144175A (en) * 2013-05-06 2014-11-12 腾讯科技(深圳)有限公司 Method, device and system for data migration
CN103957037A (en) * 2014-04-09 2014-07-30 北京工业大学 Method for automatic communication between PC side and Android mobile phone side based on Bluetooth
CN104023410A (en) * 2014-05-14 2014-09-03 北京奇虎科技有限公司 Method and device capable of realizing safe data transfer between wireless terminals

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018049975A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transfer method and related product
CN113986075A (en) * 2021-10-22 2022-01-28 维沃移动通信有限公司 Information display method and device, verification method and device and electronic equipment

Also Published As

Publication number Publication date
CN106507268B (en) 2020-01-31

Similar Documents

Publication Publication Date Title
TWI713841B (en) Model training method and device based on shared data
CN107071865A (en) The method and device that a kind of Wireless Fidelity is quickly connected
US20160210632A1 (en) Secured payment method and relevant device and system
CN107949064A (en) Collocation method, device, base station and the computer-readable recording medium of channel
CN111352597B (en) Multi-screen display control method and device, electronic equipment and readable storage medium
CN108345462B (en) Method and device for upgrading components
CN107147724A (en) A kind of information push method, server and computer-readable recording medium
CN104216761A (en) Method for using shared device in device capable of operating two operation systems
CN113115331A (en) Control method and communication device
CN106686545A (en) Method and apparatus for applying wireless fidelity country code
CN106507268A (en) The method and device of dynamic authentication in a kind of mobile phone removal of home
CN106503511B (en) A kind of method and device improving mobile phone removal of home cryptographic check safety
CN106446110A (en) Realization method and device for connecting security in terminal moving
CN109933407B (en) Block chain DAPP virtual machine, data processing method and computing equipment
CN106484506A (en) File store path system of selection and device in a kind of terminal removal of home
CN102891888B (en) A kind of data access method and relevant device, system
CN107368738A (en) A kind of anti-Root method and devices of smart machine
CN106231544A (en) The removal of home of a kind of terminal is transmitted the method and device that path storage selects
CN106874036B (en) Application program updating method and device and mobile terminal
CN109586901A (en) A kind of key updating method and equipment
CN106658669B (en) A kind of quick connecting method and device of Wireless Fidelity
CN104461499A (en) Method and device for setting default application and mobile terminal
CN108769236A (en) Using recommendation method, electronic device and computer readable storage medium
CN107153548A (en) Terminal app group technology and system
CN110876139A (en) Method, system, electronic equipment and vehicle for sharing mobile phone card package flow

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant