CN106507268A - The method and device of dynamic authentication in a kind of mobile phone removal of home - Google Patents
The method and device of dynamic authentication in a kind of mobile phone removal of home Download PDFInfo
- Publication number
- CN106507268A CN106507268A CN201610825085.6A CN201610825085A CN106507268A CN 106507268 A CN106507268 A CN 106507268A CN 201610825085 A CN201610825085 A CN 201610825085A CN 106507268 A CN106507268 A CN 106507268A
- Authority
- CN
- China
- Prior art keywords
- terminal
- result
- password
- input
- removal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/64—Details of telephonic subscriber devices file transfer between terminals
Abstract
The invention belongs to the communications field, there is provided a kind of method of dynamic authentication in mobile phone removal of home, methods described comprise the steps:The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;First terminal receives second terminal and sends communication response;First terminal receive user arranges the first password of page input in password, first terminal is input to first password in setup algorithm model, first terminal calls the computing formula matched with first password input time in setting model to be calculated the first result, and first terminal sends Password Input prompting to second terminal;First terminal receives the second result that second Password Input by user input of second terminal transmission is obtained to setup algorithm model, first terminal compares the first result and the second result, as the first result is identical with the second result, then the removal of home file is sent to second terminal.The technical scheme that the present invention is provided has the advantages that user experience is good.
Description
Technical field
The present invention relates to the communications field, more particularly in a kind of removal of home of mobile phone dynamic authentication method and device.
Background technology
The equipment such as the terminal of the communications field, such as mobile phone, panel computer is belonging to the equipment that user commonly uses, due at present should
Equipment is respectively provided with the operating system of itself, so terminal is referred to as intelligent terminal or smart mobile phone, smart mobile phone (English also:
Smartphone) be the mobile phone more higher than traditional function mobile phone for those operational capabilities and function collectivity appellation.Intelligence
Mobile phone is had using most operating system:Windows Phone, Android, IOS and BlackBerry OS, but between them
Application software incompatible.Smart mobile phone because third party software can be installed as PC, their functions
Abundant, and constantly can expand.
Existing terminal is respectively provided with the function of file storage, and this document is for example:Photo, text, video, address list etc.,
With the style of current smart mobile phone more and more, mobile phone change frequency more and more higher, the application mobile phone is changed after number
" mobile phone removal of home " is commonly called as according to transfer, for the removal of home of existing mobile phone, how the file of old mobile phone is transferred in new cell-phone
It is a problem for allowing very much people to have a headache, by taking address list as an example, currently existing scheme is realized by third party software, existing hand
Machine cannot ensure the security for connecting in removal of home, so in mobile phone removal of home the data in mobile phone may be caused to reveal, user
Experience Degree is low.
Content of the invention
The method that an object of the present invention is to provide dynamic authentication in a kind of mobile phone removal of home, which mainly solves existing body
The low shortcoming of degree of testing.
First aspect, there is provided a kind of method of dynamic authentication in mobile phone removal of home, methods described comprise the steps:
The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;
First terminal receives second terminal and sends communication response;
First terminal receive user arranges the first password of page input in password, and first password is input to by first terminal
In setup algorithm model, first terminal calls the computing formula matched with first password input time in setting model to calculate
To the first result, first terminal is to second terminal transmission Password Input prompting;
First terminal receives the obtaining the second Password Input of user input to setup algorithm model of second terminal transmission
The second result, first terminal compares the first result and the second result, and such as the first result is identical with the second result, then to second eventually
End sends the removal of home file.
Optionally, methods described also includes:
As the first result and the second result are differed, then first terminal does not send the removal of home file to second terminal.
Optionally, first terminal calls the computing formula matched with first password input time in setting model to calculate
Concrete to the first result, including:
The first password is inquired in the time that first terminal is stored from setting model and the mapping relations of computing formula
The first password is input to the computing formula and is calculated the first result by input time corresponding computing formula.
Optionally, methods described also includes after the removal of home file is not sent to the second terminal:
First terminal sends Password Input prompting again to second terminal, receive that second terminal sends by user input
The 3rd result that 3rd Password Input is obtained to setup algorithm model, as the 3rd result is identical with first result, first eventually
Hold to the second terminal and send the removal of home file, as the 3rd result is differed with the first result, first terminal not to
The second terminal sends the removal of home file, and first terminal sends warning information to server, and the warning information includes:Institute
State the mark of second terminal.
Optionally, methods described also includes after the first terminal sends warning information to server:
The first terminal sends screen locking order to the second terminal, and the screen locking order is used for indicating described second eventually
Hold screen locking.
Second aspect, there is provided the device of dynamic authentication in a kind of mobile phone removal of home, described device include:
Transmitting element, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, sends communication response for receiving second terminal;Receive user arranges the of page input in password
One password;
Processing unit, for first password is input in setup algorithm model, call in setting model with first password
The computing formula that input time matches is calculated the first result;
The transmitting element, is additionally operable to send Password Input prompting to second terminal;
The receiving unit, is additionally operable to receive second Password Input by user input of second terminal transmission to setting meter
Calculate the second result that model is obtained;
The processing unit, is additionally operable to compare the first result and the second result, and such as the first result is identical with the second result, then
The removal of home file is sent to second terminal.
Optionally, the processing unit is additionally operable to such as the first result and the second result and differs, then first terminal is not to
Two terminals send the removal of home file.
Optionally, the processing unit is concrete, for the mapping relations of time for storing from setting model and computing formula
In inquire the first password input time corresponding computing formula, the first password is input to the computing formula meter
Calculation obtains the first result.
Optionally, the transmitting element is additionally operable to send Password Input prompting again to second terminal;
The receiving unit, is additionally operable to receive the 3rd Password Input by user input of second terminal transmission to setting meter
Calculate the 3rd result that model is obtained;
The processing unit, is additionally operable to as the 3rd result is identical with first result, sends institute to the second terminal
Removal of home file is stated, and as the 3rd result is differed with the first result, the removal of home file is not sent to the second terminal, to
Server sends warning information, and the warning information includes:The mark of the second terminal.
Optionally, the transmitting element is additionally operable to send screen locking order to the second terminal, and the screen locking order is used for
Indicate the second terminal by screen locking.
A kind of third aspect, there is provided terminal, the terminal include the device of dynamic authentication in above-mentioned mobile phone removal of home.
Those of ordinary skill in the art will be appreciated that although referenced in schematic embodiment, accompanying drawing are carried out by detailed description below,
But the present invention is not limited in these embodiments.But, the scope of the present invention is extensive, and is intended to be bound only by appended right
Require to limit the scope of the present invention.
Description of the drawings
By reading the detailed description made by non-limiting example that is made with reference to the following drawings, other of the invention
Feature, objects and advantages will become more apparent upon:
Fig. 1 for provided according to a preferred embodiment of the invention mobile phone removal of home in dynamic authentication method flow chart.
Fig. 2 for provided according to another preferred embodiment of the present invention mobile phone removal of home in dynamic authentication method flow process
Figure.
Fig. 3 for provided according to next preferred embodiment of the invention mobile phone removal of home in dynamic authentication device structure chart.
The hardware architecture diagram of the terminal that Fig. 4 is provided for the present invention.
Specific embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The process that describes as flow chart or method.Although operations to be described as flow chart the process of order, therein permitted
Multioperation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be rearranged.When which
Process when operation is completed can be terminated, it is also possible to have the additional step being not included in accompanying drawing.The process
Can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", refer to and by running preset program or can refer to
Make executing the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with
Memory, the survival instruction for being prestored by computing device in memory executing predetermined process process, or by ASIC,
The hardware such as FPGA, DSP execute predetermined process process, or are combined to realize by said two devices.Computer equipment includes but does not limit
In server, PC, notebook computer, panel computer, smart mobile phone etc..
Method (some of them are illustrated by flow process) discussed hereafter can pass through hardware, software, firmware, centre
Part, microcode, hardware description language or its be combined implementing.When being implemented with software, firmware, middleware or microcode
When, in order to implement, the program code or code segment of necessary task can be stored in machine or computer-readable medium (is such as deposited
Storage media) in.(one or more) processor can implement necessary task.
Concrete structure disclosed herein and function detail are only representational, and be for describe the present invention show
The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and is not interpreted as
It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. here to describe unit,
But these units should not be limited by these terms.It is used for the purpose of a unit and another unit using these terms
Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second
Unit, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or
Any and all combination of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless
Context clearly refers else, and singulative " one " otherwise used herein above, " one " also attempt to include plural number.Should also
When being understood by, term " including " used herein above and/or "comprising" specify stated feature, integer, step, operation,
Unit and/or the presence of component, and do not preclude the presence or addition of other features one or more, integer, step, operation, unit,
Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be attached according to being different from
The order indicated in figure occurs.For example, depending on involved function/action, the two width figures for illustrating in succession actually may be used
Substantially simultaneously to execute or can execute in a reverse order sometimes.
Below in conjunction with the accompanying drawings the present invention is described in further detail.
According to an aspect of the invention, there is provided in a kind of removal of home of mobile phone dynamic authentication method.Wherein, the method should
With in the terminal, the terminal is included but is not limited to:Server, computer, panel computer, smart mobile phone etc., are answered actual certainly
With in, the equipment such as such as intelligent watch or Intelligent bracelet can also be increased.
In one embodiment, in above-mentioned mobile phone removal of home, the method for dynamic authentication can be used in terminal, need explanation
It is that the terminal is only for example, if other existing or network equipments for being likely to occur from now on and user equipment are applied to this
Invention, within also should being included in the scope of the present invention, and is incorporated herein by reference.
Fig. 1 is refer to, Fig. 1 is the side of dynamic authentication during the mobile phone of the offer according to a preferred embodiment of the invention is moved
Method, the method are completed by terminal, and the method is as shown in figure 1, comprise the steps:
The communication request that step S101, first terminal are sent to second terminal, the communication request include:The finger of removal of home
Show;
First terminal in above-mentioned steps S101 can be multiple communication requests to the communication request that second terminal sends, example
Such as in a concrete scheme of a preferred embodiment of the invention, the communication request that above-mentioned first terminal is sent to second terminal
Can be that first terminal is by Wireless Fidelity (English:Wireless Fidelity, WIFI) communication request sending, should
The structure of communication request and definition may refer to being specifically defined in IEEE802.1, repeat no more here, certainly in invention one
In another concrete scheme of individual preferred embodiment, above-mentioned first terminal to the communication request that second terminal sends can be,
The communication request that one terminal is sent by bluetooth, certainly in actual applications, can also adopt other communication modes to send out
The communication request is given, for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) send logical
Letter request, can also be that first terminal is by CDMA (English certainly:Code Division Multiple Access,
CDMA the communication request for) sending.The specific embodiment of the invention is not limited to the concrete manifestation form of the communication request, does not also limit
The specific standard agreement that observes in the communication request.
The value of the instruction of above-mentioned removal of home is specifically as follows:Whether removal of home or not, and which can pass through to extend word in communication request
In section, bit for example, sets 1 for removal of home, sets 0 for not moving embodying, certainly in actual applications, above-mentioned setting
0 can also for example be set for removal of home, 1 is set for not moving in turn, the specific embodiment of the invention does not limit above-mentioned instruction
Value concrete meaning.Certainly in actual applications, one can also for example be carried in other way as the instruction that moves
The special field of individual preseting length, such as 10 1,10 0,11 1 or 12 0 etc. mode, it is only necessary to first terminal and second
Terminal is capable of identify that mutually.
Step S102, first terminal receive second terminal and send communication response;
The communication response that the second terminal that first terminal in above-mentioned steps S102 is received sends can be that multiple communications ring
Should, such as in a concrete scheme of a preferred embodiment of the invention, the second terminal that above-mentioned first terminal is received sends
Communication response can be, second terminal by Wireless Fidelity (English:Wireless Fidelity, WIFI) send one
Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, repeat no more here,
It is logical that certain second terminal that in another concrete scheme for inventing a preferred embodiment, above-mentioned first terminal is received sends
Letter response can be that the communication response that second terminal is sent by bluetooth certainly in actual applications, can also adopt which
His communication mode sends the communication response, and for example, first terminal is by Long Term Evolution (English:Long Term
Evolution, LTE) communication response that sends can also be that second terminal is by CDMA (English certainly:Code
Division Multiple Access, CDMA) communication response that sends.The specific embodiment of the invention is not limited to the communication
The concrete manifestation form of request, is also not necessarily limited to the specific standard agreement that observes of the communication request.
Step S103, first terminal receive user arrange the first password of page input in password, and first terminal is by first
To in setup algorithm model, first terminal calls the calculating matched in setting model with first password input time to Password Input
Formula is calculated the first result, and first terminal sends Password Input prompting to second terminal.
Password Input prompting in above-mentioned steps is specifically as follows:One specific message, such as short message, certainly in reality
In the application of border, or the page of a reality, can also be the prompting of other modes, the specific embodiment of the invention certainly
It is not intended to limit the concrete manifestation form of above-mentioned prompting.
Above-mentioned computing formula can have multiple, and the specific quantity for arranging can be by user's sets itself, for example, by first
Password is multiplied by a specific numeral, naturally it is also possible to be to take the remainder first password divided by a specific numeral or result is equal
Can be with.Illustrate by taking two formula as an example below.
Formula 1:Y=A*X, wherein, y is the first result, and X is first password, and A is specific numeral, it should be noted that
Above-mentioned specific numeral can dynamically change according to the time, and for example every 1 minute, the specific numeral Jia 1, naturally it is also possible to
It is that the specific numeral subtracted 1 every 1 minute, so the formula is the formula with time dynamic.
Formula 2:Y=X/B, wherein, y is the first result, and X is first password, and B is specific numeral, it should be noted that
Above-mentioned specific numeral can dynamically change according to the time, and for example every 1 minute, the specific numeral Jia 1, naturally it is also possible to
It is that the specific numeral subtracted 1 every 1 minute, so the formula is the formula with time dynamic, it should be noted that working as
For division when, the first result can be that the result that calculates according to formula 2 is rounded, and this rounds to round up can also be
Round downwards, certain first result can also be the remainder calculated according to formula 2.
Step S104, first terminal receive second Password Input by user input of second terminal transmission to setup algorithm
The second result that model is obtained, first terminal compare the first result and the second result, and such as the first result is identical with the second result, then
The removal of home file is sent to second terminal.
Optionally, said method can also include after step s 104:
As the first result and the second result are differed, then first terminal does not send the removal of home file to second terminal.
The technical scheme that the present invention is provided selects different computing formula meters according to the time after communication connection is set up
Calculation obtains result, receives the result of another checking, so two results is compared and can obtain whether which belongs to same
Individual user, as the result of the checking is to change over time, so which is dynamic result, even if so intercepting
One result, cannot also carry out the interception of follow-up data, improve security, so its security is very high, so which has
It is improved the advantage of internet security.
Fig. 2 is refer to, Fig. 1 is dynamic authentication during the mobile phone of the offer according to another preferred embodiment of the present invention is moved
Method, the method are completed by terminal, and the method is as shown in figure 1, comprise the steps:
The communication request that step S201, first terminal are sent to second terminal, the communication request include:The finger of removal of home
Show;
First terminal in above-mentioned steps S201 can be multiple communication requests to the communication request that second terminal sends, example
Such as in a concrete scheme of a preferred embodiment of the invention, the communication request that above-mentioned first terminal is sent to second terminal
Can be that first terminal is by Wireless Fidelity (English:Wireless Fidelity, WIFI) communication request sending, should
The structure of communication request and definition may refer to being specifically defined in IEEE802.1, repeat no more here, certainly in invention one
In another concrete scheme of individual preferred embodiment, above-mentioned first terminal to the communication request that second terminal sends can be,
The communication request that one terminal is sent by bluetooth, certainly in actual applications, can also adopt other communication modes to send out
The communication request is given, for example, first terminal is by Long Term Evolution (English:Long Term Evolution, LTE) send logical
Letter request, can also be that first terminal is by CDMA (English certainly:Code Division Multiple Access,
CDMA the communication request for) sending.The specific embodiment of the invention is not limited to the concrete manifestation form of the communication request, does not also limit
The specific standard agreement that observes in the communication request.
The value of the instruction of above-mentioned removal of home is specifically as follows:Whether removal of home or not, and which can pass through to extend word in communication request
In section, bit for example, sets 1 for removal of home, sets 0 for not moving embodying, certainly in actual applications, above-mentioned setting
0 can also for example be set for removal of home, 1 is set for not moving in turn, the specific embodiment of the invention does not limit above-mentioned instruction
Value concrete meaning.Certainly in actual applications, one can also for example be carried in other way as the instruction that moves
The special field of individual preseting length, such as 10 1,10 0,11 1 or 12 0 etc. mode, it is only necessary to first terminal and second
Terminal is capable of identify that mutually.
Step S202, first terminal receive second terminal and send communication response;
The communication response that the second terminal that first terminal in above-mentioned steps S202 is received sends can be that multiple communications ring
Should, such as in a concrete scheme of a preferred embodiment of the invention, the second terminal that above-mentioned first terminal is received sends
Communication response can be, second terminal by Wireless Fidelity (English:Wireless Fidelity, WIFI) send one
Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, repeat no more here,
It is logical that certain second terminal that in another concrete scheme for inventing a preferred embodiment, above-mentioned first terminal is received sends
Letter response can be that the communication response that second terminal is sent by bluetooth certainly in actual applications, can also adopt which
His communication mode sends the communication response, and for example, first terminal is by Long Term Evolution (English:Long Term
Evolution, LTE) communication response that sends can also be that second terminal is by CDMA (English certainly:Code
Division Multiple Access, CDMA) communication response that sends.The specific embodiment of the invention is not limited to the communication
The concrete manifestation form of request, is also not necessarily limited to the specific standard agreement that observes of the communication request.
Step S203, first terminal receive user arrange the first password of page input in password, and first terminal is from setting
Time corresponding with the first password input time is inquired in the mapping relations of the computing formula computing formula of model storage,
The first password is input to the computing formula and is calculated the first result, it is defeated that first terminal sends password to second terminal
Enter prompting.
Password Input prompting in above-mentioned steps is specifically as follows:One specific message, such as short message, certainly in reality
In the application of border, or the page of a reality, can also be the prompting of other modes, the specific embodiment of the invention certainly
It is not intended to limit the concrete manifestation form of above-mentioned prompting.
Above-mentioned computing formula can have multiple, and the specific quantity for arranging can be by user's sets itself, for example, by first
Password is multiplied by a specific numeral, naturally it is also possible to be to take the remainder first password divided by a specific numeral or result is equal
Can be with.Illustrate by taking two formula as an example below.
Formula 1:Y=A*X, wherein, y is the first result, and X is first password, and A is specific numeral, it should be noted that
Above-mentioned specific numeral can dynamically change according to the time, and for example every 1 minute, the specific numeral Jia 1, naturally it is also possible to
It is that the specific numeral subtracted 1 every 1 minute, so the formula is the formula with time dynamic.
Formula 2:Y=X/B, wherein, y is the first result, and X is first password, and B is specific numeral, it should be noted that
Above-mentioned specific numeral can dynamically change according to the time, and for example every 1 minute, the specific numeral Jia 1, naturally it is also possible to
It is that the specific numeral subtracted 1 every 1 minute, so the formula is the formula with time dynamic, it should be noted that working as
For division when, the first result can be that the result that calculates according to formula 2 is rounded, and this rounds to round up can also be
Round downwards, certain first result can also be the remainder calculated according to formula 2.
Step S104, first terminal receive second Password Input by user input of second terminal transmission to setup algorithm
The second result that model is obtained, first terminal compare the first result and the second result, and such as the first result is identical with the second result, then
The removal of home file is sent to second terminal.
Optionally, said method can also include after step s 104:
As the first result and the second result are differed, first terminal sends Password Input prompting again to second terminal, connects
The 3rd result that the 3rd Password Input of user input is obtained that second terminal sends, such as the 3rd knot is received to setup algorithm model
Fruit is identical with first result, and first terminal sends the removal of home file to the second terminal, as the 3rd result with
First result is differed, and first terminal does not send the removal of home file to the second terminal, and first terminal is sent to server
Warning information, the warning information include:The mark of the second terminal.
Optionally, said method can also include after above-mentioned technical proposal:
The first terminal sends screen locking order to the second terminal, and the screen locking order is used for indicating described second eventually
Hold screen locking.
Second terminal screen locking is enabled to by above-mentioned screen locking order, it is to avoid the operation of non-owner.
The technical scheme that the present invention is provided selects different computing formula meters according to the time after communication connection is set up
Calculation obtains result, receives the result of another checking, so two results is compared and can obtain whether which belongs to same
Individual user, as the result of the checking is to change over time, so which is dynamic result, even if so intercepting
One result, cannot also carry out the interception of follow-up data, improve security, so its security is very high, so which has
It is improved the advantage of internet security.
Fig. 3 is referred to, Fig. 3 is a kind of device 300 of dynamic authentication in mobile phone removal of home, and described device is arranged at first terminal
Interior, described device includes:
Transmitting element 301, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit 302, sends communication response for receiving second terminal;Receive user arranges page input in password
First password;
Processing unit 303, for first password is input in setup algorithm model, calls close with first in setting model
The computing formula that code input time matches is calculated the first result;
Transmitting element 301, is additionally operable to send Password Input prompting to second terminal;
Receiving unit 302, is additionally operable to receive second Password Input by user input of second terminal transmission to setting meter
Calculate the second result that model is obtained;
Processing unit 303, is additionally operable to compare the first result and the second result, and such as the first result is identical with the second result, then
The removal of home file is sent to second terminal.
Optionally, the processing unit is additionally operable to such as the first result and the second result and differs, then first terminal is not to
Two terminals send the removal of home file.
Optionally, the processing unit is concrete, for the mapping relations of time for storing from setting model and computing formula
In inquire the first password input time corresponding computing formula, the first password is input to the computing formula meter
Calculation obtains the first result.
Optionally, the transmitting element is additionally operable to send Password Input prompting again to second terminal;
The receiving unit, is additionally operable to receive the 3rd Password Input by user input of second terminal transmission to setting meter
Calculate the 3rd result that model is obtained;
The processing unit, is additionally operable to as the 3rd result is identical with first result, sends institute to the second terminal
Removal of home file is stated, and as the 3rd result is differed with the first result, the removal of home file is not sent to the second terminal, to
Server sends warning information, and the warning information includes:The mark of the second terminal.
Optionally, the transmitting element is additionally operable to send screen locking order to the second terminal, and the screen locking order is used for
Indicate the second terminal by screen locking.
The present invention also provides a kind of terminal, and the terminal includes the device 300 of dynamic authentication in above-mentioned mobile phone removal of home.
The details for specifically applying example of the invention, and without departing from the spirit or essential characteristics of the present invention, can
The present invention is realized in other specific forms.Therefore, no matter from the point of view of which point, embodiment all should be regarded as exemplary,
And be nonrestrictive, the scope of the present invention is by claims rather than described above is limited, it is intended that will fall
All changes in the implication and scope of the equivalency of claim are included in the present invention.Should not be by appointing in claim
What reference is considered as limits involved claim.Furthermore, it is to be understood that " an including " word is not excluded for other units or step, single
Number is not excluded for plural number.The multiple units that states in system claims or device can also pass through software by a unit or device
Or hardware is realizing.The first, the second grade word is used for representing title, and is not offered as any specific order.
Flow chart and block diagram in accompanying drawing shows system, method and the computer journey of the multiple embodiments according to the present invention
The architectural framework in the cards of sequence product, function and operation.At this point, each square frame in flow chart or block diagram can generation
A part for table one module, program segment or code, a part for the module, program segment or code include one or more use
Executable instruction in the logic function for realizing regulation.It should also be noted that in some are as the realization that replaces, being marked in square frame
The function of note can also occur with the order for being different from marked in accompanying drawing.For example, two continuous square frames can essentially base
Originally it is performed in parallel, they can also be executed sometimes in the opposite order, this is depending on involved function.It is also noted that
It is, the combination of each square frame and block diagram and/or the square frame in flow chart in block diagram and/or flow chart can to use and execute rule
The special hardware based system of fixed function or action is realizing, or the group that can use specialized hardware and computer instruction
Close to realize.
Referring to Fig. 4, the embodiment of the present invention also provides a kind of terminal 400, and the terminal 400 is included but is not limited to:Smart mobile phone,
Intelligent watch, panel computer, personal computer, notebook computer or computer group, as shown in figure 4, the terminal 400 includes:
Processor 401, memory 402, transceiver 403 and bus 404.Transceiver 403 is used for transceiving data between external equipment.If
The quantity of the processor 401 in standby 400 can be one or more.In some embodiments of the present application, processor 401, storage
Device 402 and transceiver 403 can pass through bus system or other modes connect.Equipment 400 can be used for executing the side shown in Fig. 1
Method.The implication of the term being related to regard to the present embodiment and citing, may be referred to the corresponding explanations of Fig. 1.Here is omitted.
Wherein, store program codes in memory 402.Processor 401 is used for calling the program generation stored in memory 402
Code, for executing step as shown in Figure 1.
It should be noted that processor 401 here can be a treatment element, or multiple treatment elements
It is referred to as.For example, the treatment element can be central processing unit (Central Processing Unit, CPU), or spy
Determine integrated circuit (Application Specific Integrated Circuit, ASIC), or be arranged to implement this
One or more integrated circuits of application embodiment, for example:One or more microprocessors (digital signal
Processor, DSP), or, one or more field programmable gate array (Field Programmable Gate Array,
FPGA).
Memory 403 can be the general designation of a storage device, or multiple memory elements, and be used for storing and can holding
Line program code or parameter, data etc. required for the operation of application program running gear.And memory 403 can include random storage
Device (RAM), it is also possible to including nonvolatile memory (non-volatile memory), such as magnetic disc store, flash memory
(Flash) etc..
Bus 404 can be that industry standard architecture (Industry Standard Architecture, ISA) is total
Line, external equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended
Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control
Bus processed etc..For ease of representing, only represented with a thick line in Fig. 4, it is not intended that only one bus or a type of
Bus.
The user equipment can also include input/output unit, be connected to bus 404, with by bus and processor 401
Connect etc. other parts.The input/output unit can provide an inputting interface for operating personnel, so that operating personnel are by being somebody's turn to do
Inputting interface selects item of deploying to ensure effective monitoring and control of illegal activities, and can also be other interfaces, can pass through the external miscellaneous equipment of the interface.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description,
Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method, can be with
Realize by another way.Device embodiment described above is only schematically, for example division of the unit,
It is only a kind of division of logic function, there can be other dividing mode when actually realizing, and for example, multiple units or component can
To combine or be desirably integrated into another system, or some features can be ignored, or not execute.Another, shown or beg for
By coupling each other direct-coupling or communication connection can be by the indirect of some communication interfaces, device or unit
Coupling is communicated to connect, and can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit
The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with
It is stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially in other words
The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual
People's computer, server, or network equipment etc.) execute all or part of step of each embodiment methods described of the invention.
And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above only in order to technical scheme to be described, rather than a limitation;To the greatest extent
Pipe has been described in detail to the present invention with reference to foregoing embodiments, it will be understood by those within the art that:Its according to
So the technical scheme described in foregoing embodiments can be modified, or which part or all technical characteristic are entered
Row equivalent;And these modifications or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology
The scope of scheme, its all should cover in the middle of the claim of the present invention and the scope of specification.
Claims (11)
1. a kind of method of dynamic authentication during mobile phone is moved, it is characterised in that methods described comprises the steps:
The communication request that first terminal is sent to second terminal, the communication request include:The instruction of removal of home;
First terminal receives second terminal and sends communication response;
First terminal receive user arranges the first password of page input in password, and first password is input to setting by first terminal
In computation model, first terminal calls the computing formula matched with first password input time in setting model to be calculated
One result, first terminal send Password Input prompting to second terminal;
First terminal receives that the second Password Input by user input that second terminal sends is obtained to setup algorithm model
Two results, first terminal compare the first result and the second result, and such as the first result is identical with the second result, then send out to second terminal
Give the removal of home file.
2. method according to claim 1, it is characterised in that methods described also includes:
As the first result and the second result are differed, then first terminal does not send the removal of home file to second terminal.
3. method according to claim 1, it is characterised in that first terminal is called in setting model and is input into first password
The computing formula that time matches is calculated the first result specifically, including:
The first password input is inquired in the time that first terminal is stored from setting model and the mapping relations of computing formula
The first password is input to the computing formula and is calculated the first result by time corresponding computing formula.
4. method according to claim 2, it is characterised in that methods described is not sending the removal of home to the second terminal
Also include after file:
First terminal sends Password Input prompting again to second terminal, receive that second terminal sends by the 3rd of user input the
The 3rd result that Password Input is obtained to setup algorithm model, as the 3rd result identical with first result, first terminal to
The second terminal sends the removal of home file, and as the 3rd result is differed with the first result, first terminal is not to described
Second terminal sends the removal of home file, and first terminal sends warning information to server, and the warning information includes:Described
The mark of two terminals.
5. method according to claim 4, it is characterised in that methods described sends announcement in the first terminal to server
Also include after alarming information:
The first terminal sends screen locking order to the second terminal, and the screen locking order is used for indicating that the second terminal will
Screen locking.
6. the device of dynamic authentication during a kind of mobile phone is moved, it is characterised in that described device includes:
Transmitting element, for the communication request sent to second terminal, the communication request includes:The instruction of removal of home;
Receiving unit, sends communication response for receiving second terminal;Receive user arranges the first close of page input in password
Code;
Processing unit, for first password is input in setup algorithm model, is called in setting model and is input into first password
The computing formula that time matches is calculated the first result;
The transmitting element, is additionally operable to send Password Input prompting to second terminal;
The receiving unit, is additionally operable to receive second Password Input by user input of second terminal transmission to setup algorithm mould
The second result that type is obtained;
The processing unit, is additionally operable to compare the first result and the second result, and such as the first result is identical with the second result, then to the
Two terminals send the removal of home file.
7. device according to claim 6, it is characterised in that the processing unit is additionally operable to the first result such as and the second knot
Fruit differs, then first terminal does not send the removal of home file to second terminal.
8. device according to claim 6, it is characterised in that the processing unit is concrete, for storing from setting model
Time corresponding with the first password input time is inquired in the mapping relations of computing formula computing formula, by described
One Password Input is calculated the first result to the computing formula.
9. device according to claim 7, it is characterised in that the transmitting element is additionally operable to be sent to second terminal again
Password Input is pointed out;
The receiving unit, is additionally operable to receive the 3rd Password Input by user input of second terminal transmission to setup algorithm mould
The 3rd result that type is obtained;
The processing unit, is additionally operable to as the 3rd result is identical with first result, to the second terminal send described in remove
Family's file, as the 3rd result is differed with the first result, does not send the removal of home file to the second terminal, to service
Device sends warning information, and the warning information includes:The mark of the second terminal.
10. device according to claim 9, it is characterised in that the transmitting element is additionally operable to send out to the second terminal
Screen locking order, the screen locking order is sent to be used for indicating the second terminal by screen locking.
11. a kind of terminals, it is characterised in that the terminal includes that the mobile phone as described in any one of claim 6-10 is moved in moving
The device of state checking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610825085.6A CN106507268B (en) | 2016-09-14 | 2016-09-14 | Method and device for dynamic verification in mobile phone carriers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610825085.6A CN106507268B (en) | 2016-09-14 | 2016-09-14 | Method and device for dynamic verification in mobile phone carriers |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106507268A true CN106507268A (en) | 2017-03-15 |
CN106507268B CN106507268B (en) | 2020-01-31 |
Family
ID=58291414
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610825085.6A Active CN106507268B (en) | 2016-09-14 | 2016-09-14 | Method and device for dynamic verification in mobile phone carriers |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106507268B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018049975A1 (en) * | 2016-09-14 | 2018-03-22 | 广东欧珀移动通信有限公司 | Data transfer method and related product |
CN113986075A (en) * | 2021-10-22 | 2022-01-28 | 维沃移动通信有限公司 | Information display method and device, verification method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020042753A1 (en) * | 2000-10-06 | 2002-04-11 | Ortiz Luis M. | Transaction broker method and system |
CN101764800A (en) * | 2009-12-02 | 2010-06-30 | 深圳市融创天下科技发展有限公司 | Method for dynamic password multi-terminal combined authentication |
CN102857564A (en) * | 2012-08-27 | 2013-01-02 | 华为终端有限公司 | Data synchronization method, terminal and system |
CN103957037A (en) * | 2014-04-09 | 2014-07-30 | 北京工业大学 | Method for automatic communication between PC side and Android mobile phone side based on Bluetooth |
CN104023410A (en) * | 2014-05-14 | 2014-09-03 | 北京奇虎科技有限公司 | Method and device capable of realizing safe data transfer between wireless terminals |
CN104144175A (en) * | 2013-05-06 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Method, device and system for data migration |
-
2016
- 2016-09-14 CN CN201610825085.6A patent/CN106507268B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020042753A1 (en) * | 2000-10-06 | 2002-04-11 | Ortiz Luis M. | Transaction broker method and system |
CN101764800A (en) * | 2009-12-02 | 2010-06-30 | 深圳市融创天下科技发展有限公司 | Method for dynamic password multi-terminal combined authentication |
CN102857564A (en) * | 2012-08-27 | 2013-01-02 | 华为终端有限公司 | Data synchronization method, terminal and system |
CN104144175A (en) * | 2013-05-06 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Method, device and system for data migration |
CN103957037A (en) * | 2014-04-09 | 2014-07-30 | 北京工业大学 | Method for automatic communication between PC side and Android mobile phone side based on Bluetooth |
CN104023410A (en) * | 2014-05-14 | 2014-09-03 | 北京奇虎科技有限公司 | Method and device capable of realizing safe data transfer between wireless terminals |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018049975A1 (en) * | 2016-09-14 | 2018-03-22 | 广东欧珀移动通信有限公司 | Data transfer method and related product |
CN113986075A (en) * | 2021-10-22 | 2022-01-28 | 维沃移动通信有限公司 | Information display method and device, verification method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106507268B (en) | 2020-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI713841B (en) | Model training method and device based on shared data | |
CN107071865A (en) | The method and device that a kind of Wireless Fidelity is quickly connected | |
US20160210632A1 (en) | Secured payment method and relevant device and system | |
CN107949064A (en) | Collocation method, device, base station and the computer-readable recording medium of channel | |
CN111352597B (en) | Multi-screen display control method and device, electronic equipment and readable storage medium | |
CN108345462B (en) | Method and device for upgrading components | |
CN107147724A (en) | A kind of information push method, server and computer-readable recording medium | |
CN104216761A (en) | Method for using shared device in device capable of operating two operation systems | |
CN113115331A (en) | Control method and communication device | |
CN106686545A (en) | Method and apparatus for applying wireless fidelity country code | |
CN106507268A (en) | The method and device of dynamic authentication in a kind of mobile phone removal of home | |
CN106503511B (en) | A kind of method and device improving mobile phone removal of home cryptographic check safety | |
CN106446110A (en) | Realization method and device for connecting security in terminal moving | |
CN109933407B (en) | Block chain DAPP virtual machine, data processing method and computing equipment | |
CN106484506A (en) | File store path system of selection and device in a kind of terminal removal of home | |
CN102891888B (en) | A kind of data access method and relevant device, system | |
CN107368738A (en) | A kind of anti-Root method and devices of smart machine | |
CN106231544A (en) | The removal of home of a kind of terminal is transmitted the method and device that path storage selects | |
CN106874036B (en) | Application program updating method and device and mobile terminal | |
CN109586901A (en) | A kind of key updating method and equipment | |
CN106658669B (en) | A kind of quick connecting method and device of Wireless Fidelity | |
CN104461499A (en) | Method and device for setting default application and mobile terminal | |
CN108769236A (en) | Using recommendation method, electronic device and computer readable storage medium | |
CN107153548A (en) | Terminal app group technology and system | |
CN110876139A (en) | Method, system, electronic equipment and vehicle for sharing mobile phone card package flow |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: Guangdong Opel Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |