CN106507268B - Method and device for dynamic verification in mobile phone carriers - Google Patents

Method and device for dynamic verification in mobile phone carriers Download PDF

Info

Publication number
CN106507268B
CN106507268B CN201610825085.6A CN201610825085A CN106507268B CN 106507268 B CN106507268 B CN 106507268B CN 201610825085 A CN201610825085 A CN 201610825085A CN 106507268 B CN106507268 B CN 106507268B
Authority
CN
China
Prior art keywords
terminal
result
password input
password
moving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610825085.6A
Other languages
Chinese (zh)
Other versions
CN106507268A (en
Inventor
张海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610825085.6A priority Critical patent/CN106507268B/en
Publication of CN106507268A publication Critical patent/CN106507268A/en
Application granted granted Critical
Publication of CN106507268B publication Critical patent/CN106507268B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/64Details of telephonic subscriber devices file transfer between terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention belongs to the field of communication, and provides a method for dynamically verifying moving of mobile phones, which comprises the following steps that a terminal sends a communication request to a second terminal, wherein the communication request comprises an instruction of moving the mobile phone, a 0 terminal receives a communication response sent by the second terminal, a 1 terminal receives 2 passwords input by a user on a password setting page, a 3 terminal inputs 4 passwords into a set calculation model, a terminal calls a calculation formula matched with password input time in the set model to calculate an result, a terminal sends a password input prompt to the second terminal, a terminal receives a second result sent by the second terminal and obtained by inputting the second passwords input by the user into the set calculation model, and the terminal compares the result with the second result, and sends the moving file to the second terminal if the result is the same as the second result.

Description

Method and device for dynamic verification in mobile phone carriers
Technical Field
The invention relates to the field of communication, in particular to a method and a device for dynamic verification in moving of mobile phones.
Background
The terminal in the communication field, such as a mobile Phone, a tablet computer and other devices, belongs to a device commonly used by users, and at present, the device has an operating system of the device, so the terminal is also called as a smart terminal or a smart Phone, and the smart Phone (english: Smartphone) is an integrated name for the mobile Phone with stronger computing capability and functions than the traditional functional mobile Phone.
The existing terminals have a function of storing files such as photos, texts, videos, address lists and the like, along with the fact that the smart mobile phones are more and more in style at present and the frequency of mobile phone replacement is higher and higher, data transfer after mobile phone replacement is commonly called mobile phone moving according to the application, for the existing mobile phone moving, the problem that pieces of files of old mobile phones are very headache to new mobile phones is solved, for example, the address lists are used, the existing scheme is achieved through third-party software, the existing mobile phones cannot guarantee connection safety when moving, and therefore data leakage in the mobile phones can be caused when the mobile phones move, and user experience is low.
Disclosure of Invention
The objective of the present invention is to provide a dynamic verification method for mobile phones, which mainly solves the disadvantage of low experience in the prior art.
, it provides a method for dynamic verification in kinds of mobile phones moving, said method includes the following steps:
a communication request sent by the terminal to the second terminal, the communication request including an instruction to move;
the terminal receives the communication response sent by the second terminal;
the terminal receives a password input by a user on a password setting page, the terminal inputs a password into a setting calculation model, the terminal calls a calculation formula matched with password input time in the setting model to calculate to obtain a result, and the terminal sends a password input prompt to the second terminal;
the th terminal receives a second result obtained by inputting a second password input by the user into the set calculation model and sent by the second terminal, the th terminal compares the th result with the second result, and if the th result is the same as the second result, the moving file is sent to the second terminal.
Optionally, the method further includes:
if the th result is not the same as the second result, the th terminal does not transmit the move file to the second terminal.
Optionally, the th terminal calls a calculation formula matched with the th password input time in the setting model to calculate a th result, which specifically includes:
the terminal inquires out the formula corresponding to the password input time from the mapping relation between the time stored in the setting model and the formula, and inputs the password into the formula to calculate the result.
Optionally, after the moving file is not sent to the second terminal, the method further includes:
the terminal sends a password input prompt to the second terminal again, receives a third result obtained by inputting a third password input by a user to a set calculation model and sent by the second terminal, if the third result is the same as the result, the terminal sends the moving file to the second terminal, if the third result is not the same as the result, the terminal does not send the moving file to the second terminal, and the terminal sends alarm information to a server, wherein the alarm information comprises the identification of the second terminal.
Optionally, after the terminal sends the warning message to the server, the method further includes:
and the terminal sends a screen locking command to the second terminal, wherein the screen locking command is used for indicating that the second terminal locks the screen.
In a second aspect, there is provided an apparatus for dynamic authentication in moving of kinds of mobile phones, the apparatus comprising:
a sending unit, configured to send a communication request to the second terminal, where the communication request includes: an indication of moving;
the receiving unit is used for receiving a communication response sent by the second terminal, receiving th passwords input by a user on a password setting page;
the processing unit is used for inputting the th password into the set calculation model, calling a calculation formula matched with the th password input time in the set model, and calculating to obtain a th result;
the sending unit is also used for sending a password input prompt to the second terminal;
the receiving unit is further used for receiving a second result obtained by inputting a second password input by a user into the set calculation model and sent by the second terminal;
the processing unit is further configured to compare the th result with the second result, and send the moving file to the second terminal if the th result is the same as the second result.
Optionally, the processing unit is further configured to, if the th result is different from the second result, not send the moving file to the second terminal by the th terminal.
Optionally, the processing unit is specifically configured to query a calculation formula corresponding to the -th password input time from a mapping relationship between time stored in the set model and the calculation formula, and input the -th password to the calculation formula to obtain a -th result.
Optionally, the sending unit is further configured to send the password input prompt to the second terminal again;
the receiving unit is further used for receiving a third result obtained by inputting a third password input by a user into the set calculation model and sent by the second terminal;
the processing unit is further configured to send the moving file to the second terminal if a third result is the same as the th result, and send an alarm message to a server without sending the moving file to the second terminal if the third result is not the same as the th result, where the alarm message includes an identifier of the second terminal.
Optionally, the sending unit is further configured to send a screen locking command to the second terminal, where the screen locking command is used to indicate that the second terminal is to lock a screen.
In a third aspect, kinds of terminals are provided, and the terminals comprise the device for dynamic verification in mobile phone moving.
It will be appreciated by those of ordinary skill in the art that although the following detailed description will proceed with reference being made to illustrative embodiments, the drawings, but the present invention is not limited to these embodiments, but rather the scope of the invention is broad and is intended to be limited only by the claims appended hereto.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a method for dynamic authentication in moving a mobile phone according to preferred embodiments of the present invention.
Fig. 2 is a flowchart of a method for dynamic authentication in moving a mobile phone according to another preferred embodiments of the present invention.
Fig. 3 is a block diagram of a device for dynamic authentication in moving a mobile phone according to a preferred embodiment of the present invention.
Fig. 4 is a schematic diagram of a hardware structure of the terminal provided by the present invention.
Detailed Description
Before discussing exemplary embodiments in greater detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts.
The term "computer device" or "computer" in this context refers to an intelligent electronic device that can execute predetermined processes such as numerical calculation and/or logic calculation by running predetermined programs or instructions, and may include a processor and a memory, wherein the processor executes a pre-stored instruction stored in the memory to execute the predetermined processes, or the predetermined processes are executed by hardware such as ASIC, FPGA, DSP, or a combination thereof. Computer devices include, but are not limited to, servers, personal computers, laptops, tablets, smart phones, and the like.
When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine or computer readable medium (such as a storage medium.) the processor(s) () may perform the necessary tasks.
Specific structural and functional details disclosed herein are merely representative and are provided for purposes of describing example embodiments of the present invention. The present invention may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.
It is to be understood that, although the terms "," "second," etc. may be used herein to describe various elements, these elements should not be limited by these terms.
As used herein, the singular forms "," "" are intended to include the plural unless the context clearly indicates otherwise, it is also understood that the terms "comprises" and/or "comprising," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be noted that in alternative implementations, the functions/acts noted may occur out of the order noted in the figures, for example, two figures shown in succession may in fact be executed substantially concurrently or the acts may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
The present invention is described in further detail with reference to the attached figures.
According to aspects of the invention, a method for dynamic authentication in mobile phones is provided, wherein the method is applied to terminals including but not limited to servers, computers, tablet computers, smart phones and the like, and devices such as smart watches or smart bracelets can be added in practical application.
In embodiments, the above method for dynamic authentication in mobile phone moving can be used in a terminal, and it should be noted that the terminal is merely an example, and other existing or future network devices and user devices, if applicable to the present invention, should also be included in the scope of the present invention and are included herein by reference.
Referring to fig. 1, fig. 1 is a diagram illustrating a method for providing dynamic authentication in a mobile phone carrier according to preferred embodiments of the present invention, where the method is performed by a terminal, and the method is shown in fig. 1 and includes the following steps:
step S101, the th terminal sends a communication request to the second terminal, wherein the communication request comprises an instruction of moving;
the communication request sent by the th terminal to the second terminal in the step S101 may be Multiple communication requests, for example, in 0 specific solutions of preferred embodiments of the present invention, the communication request sent by the 1 th terminal to the second terminal may be communication requests sent by the 2 th terminal through Wireless Fidelity (WIFI), and the structure and definition of the communication request may refer to specific definitions in IEEE802.1, which is not described here, and certainly in another specific solutions of preferred embodiments of the present invention, the communication request sent by the th terminal to the second terminal may be communication requests sent by the th terminal through bluetooth, and in practical applications, the communication request may also be sent by using another communication method, for example, the communication request sent by the th terminal through Long Term Evolution (Long Term Evolution, LTE), and the communication request sent by the th terminal may also be a Code Division Multiple Access communication protocol (Multiple Access protocol), which is certainly not limited to CDMA communication requests sent by Multiple Access protocols.
The value of the move instruction may be specifically move or not move, which may be embodied by bits in the expanded field in the communication request, for example, setting 1 as move and setting 0 as not move, but in practical applications, the setting may be reversed, for example, setting 0 as move and setting 1 as not move, and the specific embodiment of the present invention is not limited to the specific meaning of the value of the instruction.
Step S102, the th terminal receives a communication response sent by the second terminal;
the communication response sent by the second terminal and received by the th terminal in the step S102 may be Multiple communication responses, for example, in specific solutions of preferred embodiments of the present invention, the communication response sent by the second terminal and received by the th terminal may be communication responses sent by the second terminal through Wireless Fidelity (WIFI), and the structure and definition of the communication response may refer to specific definitions in IEEE802.1, which is not described herein, and certainly in another specific solutions of the preferred embodiments of the present invention, the communication response sent by the second terminal and received by the th terminal may be communication responses sent by the second terminal through bluetooth, and certainly in actual applications, the communication response may also be sent by using other communication methods, for example, the communication response sent by the th terminal through Long Term Evolution (LTE) may also be code division, and the second terminal may also be a communication response sent by Multiple Access protocol (Multiple Access protocol), and certainly, the code division is not limited to the specific communication protocol of CDMA communication requests.
Step S103, the terminal receives the th password input by the user on the password setting page, the th terminal inputs the th password into the setting calculation model, the th terminal calls a calculation formula matched with th password input time in the setting model to calculate the th result, and the th terminal sends a password input prompt to the second terminal.
The password input prompt in the above step may specifically be specific messages, such as short messages, certainly in practical applications, actual pages may also be provided, and certainly, prompts in other manners may also be provided, and the specific embodiment of the present invention does not limit the specific representation form of the prompt.
The above calculation formulas may be multiple, and the specific setting number may be set by the user, for example, the th password is multiplied by specific numbers, or the remainder or the result may be obtained by dividing the th password by specific numbers.
Formula 1, y is a × X, where y is the result of , X is the th password, and a is a specific number, and it should be noted that the specific number may dynamically change according to time, for example, the specific number is increased by 1 every 1 minute, or the specific number is decreased by 1 every 1 minute, so that the formula is a formula that dynamically changes with time.
Y is X/B, where y is the th result, X is the th password, and B is a specific number, it should be noted that the specific number may dynamically change according to time, for example, the specific number is increased by 1 every 1 minute, or the specific number is decreased by 1 every 1 minute, so that the formula is a formula that dynamically changes with time, and it should be noted that, in the case of division, the th result may be the result rounded according to the formula 2, and the rounding may be upward or downward, or of course, the th result may be the remainder calculated according to the formula 2.
And S104, the th terminal receives a second result obtained by inputting a second password input by the user into the set calculation model and sent by the second terminal, the th terminal compares the th result with the second result, and if the th result is the same as the second result, the moving file is sent to the second terminal.
Optionally, after step S104, the method may further include:
if the th result is not the same as the second result, the th terminal does not transmit the move file to the second terminal.
After the communication connection is established, different calculation formulas are selected according to time to calculate the result, and another verification result is received, so that whether the two results belong to the same users can be obtained by comparing the two results, and the verification result is a dynamic result because the verification result changes along with the change of time, so that the subsequent data can not be intercepted even if results are intercepted, the safety is improved, and the safety is very high, so that the method has the advantage of improving the network safety.
Referring to fig. 2, fig. 1 is a diagram illustrating a method for dynamic authentication in a mobile phone carrier according to another preferred embodiments of the present invention, where the method is performed by a terminal, and the method is shown in fig. 1, and includes the following steps:
step S201, the th terminal sends a communication request to the second terminal, wherein the communication request comprises an instruction of moving;
the communication request sent by the th terminal to the second terminal in the step S201 may be a plurality of communication requests, for example, in 0 specific solutions of preferred embodiments of the present invention, the communication request sent by the 1 th terminal to the second terminal may be communication requests sent by the 2 th terminal through Wireless Fidelity (WIFI), and the structure and definition of the communication request may refer to specific definitions in IEEE802.1, which is not described herein, but of course, in another specific solutions of preferred embodiments of the present invention, the communication request sent by the th terminal to the second terminal may be communication requests sent by the th terminal through bluetooth, and in practical applications, the communication request may also be sent by other communication methods, for example, the communication request sent by the th terminal through Long Term Evolution (Long Term Evolution, LTE), and the communication request sent by the th terminal through Code Division Multiple Access protocol (Multiple Access protocol), which is certainly not limited to CDMA communication requests sent by CDMA specific embodiments of the present invention.
The value of the move instruction may be specifically move or not move, which may be embodied by bits in the expanded field in the communication request, for example, setting 1 as move and setting 0 as not move, but in practical applications, the setting may be reversed, for example, setting 0 as move and setting 1 as not move, and the specific embodiment of the present invention is not limited to the specific meaning of the value of the instruction.
Step S202, the th terminal receives a communication response sent by the second terminal;
the communication response sent by the second terminal and received by the th terminal in the step S202 may be Multiple communication responses, for example, in specific solutions of preferred embodiments of the present invention, the communication response sent by the second terminal and received by the th terminal may be communication responses sent by the second terminal through Wireless Fidelity (WIFI), and the structure and definition of the communication response may refer to specific definitions in IEEE802.1, which is not described herein, and certainly in another specific solutions of preferred embodiments of the present invention, the communication response sent by the second terminal and received by the th terminal may be communication responses sent by the second terminal through bluetooth, and certainly in actual applications, the communication response may also be sent by using other communication methods, for example, the communication response sent by the th terminal through Long Term Evolution (LTE) may also be code division, and the second terminal may also be a communication response sent by using Multiple Access protocol (code division Multiple Access) and may also be not be limited to the specific communication protocol of CDMA communication requests.
Step S203, the terminal receives the th password input by the user on the password setting page, the th terminal inquires out the calculation formula corresponding to the th password input time from the mapping relation between the time stored in the setting model and the calculation formula, the th password is input into the calculation formula to be calculated to obtain a th result, and the th terminal sends a password input prompt to the second terminal.
The password input prompt in the above step may specifically be specific messages, such as short messages, certainly in practical applications, actual pages may also be provided, and certainly, prompts in other manners may also be provided, and the specific embodiment of the present invention does not limit the specific representation form of the prompt.
The above calculation formulas may be multiple, and the specific setting number may be set by the user, for example, the th password is multiplied by specific numbers, or the remainder or the result may be obtained by dividing the th password by specific numbers.
Formula 1, y is a × X, where y is the result of , X is the th password, and a is a specific number, and it should be noted that the specific number may dynamically change according to time, for example, the specific number is increased by 1 every 1 minute, or the specific number is decreased by 1 every 1 minute, so that the formula is a formula that dynamically changes with time.
Y is X/B, where y is the th result, X is the th password, and B is a specific number, it should be noted that the specific number may dynamically change according to time, for example, the specific number is increased by 1 every 1 minute, or the specific number is decreased by 1 every 1 minute, so that the formula is a formula that dynamically changes with time, and it should be noted that, in the case of division, the th result may be the result rounded according to the formula 2, and the rounding may be upward or downward, or of course, the th result may be the remainder calculated according to the formula 2.
And S104, the th terminal receives a second result obtained by inputting a second password input by the user into the set calculation model and sent by the second terminal, the th terminal compares the th result with the second result, and if the th result is the same as the second result, the moving file is sent to the second terminal.
Optionally, after step S104, the method may further include:
if the th result is different from the second result, the terminal sends the password input prompt to the second terminal again, receives a third result obtained by inputting a third password input by a user to a set calculation model and sent by the second terminal, if the third result is the same as the th result, the terminal sends the moving file to the second terminal, if the third result is not the same as the th result, the terminal does not send the moving file to the second terminal, and the terminal sends alarm information to a server, wherein the alarm information comprises the identifier of the second terminal.
Optionally, the method may further include, after the foregoing technical solution:
and the terminal sends a screen locking command to the second terminal, wherein the screen locking command is used for indicating that the second terminal locks the screen.
The screen locking command can enable the second terminal to lock the screen, so that operation of a non-owner is avoided.
After the communication connection is established, different calculation formulas are selected according to time to calculate the result, and another verification result is received, so that whether the two results belong to the same users can be obtained by comparing the two results, and the verification result is a dynamic result because the verification result changes along with the change of time, so that the subsequent data can not be intercepted even if results are intercepted, the safety is improved, and the safety is very high, so that the method has the advantage of improving the network safety.
Referring to fig. 3, fig. 3 is a diagram illustrating an apparatus 300 for dynamic verification in moving of kinds of mobile phones, the apparatus being disposed in a terminal, the apparatus comprising:
a sending unit 301, configured to send a communication request to the second terminal, where the communication request includes: an indication of moving;
a receiving unit 302, configured to receive a communication response sent by the second terminal, and receive an th password input by the user on the password setting page;
the processing unit 303 is configured to input the th password into the setting calculation model, and call a calculation formula matched with the th password input time in the setting model to calculate a th result;
the sending unit 301 is further configured to send a password input prompt to the second terminal;
the receiving unit 302 is further configured to receive a second result obtained by inputting a second password input by the user into the set calculation model and sent by the second terminal;
the processing unit 303 is further configured to compare the th result with the second result, and send the moving file to the second terminal if the th result is the same as the second result.
Optionally, the processing unit is further configured to, if the th result is different from the second result, not send the moving file to the second terminal by the th terminal.
Optionally, the processing unit is specifically configured to query a calculation formula corresponding to the -th password input time from a mapping relationship between time stored in the set model and the calculation formula, and input the -th password to the calculation formula to obtain a -th result.
Optionally, the sending unit is further configured to send the password input prompt to the second terminal again;
the receiving unit is further used for receiving a third result obtained by inputting a third password input by a user into the set calculation model and sent by the second terminal;
the processing unit is further configured to send the moving file to the second terminal if a third result is the same as the th result, and send an alarm message to a server without sending the moving file to the second terminal if the third result is not the same as the th result, where the alarm message includes an identifier of the second terminal.
Optionally, the sending unit is further configured to send a screen locking command to the second terminal, where the screen locking command is used to indicate that the second terminal is to lock a screen.
The invention also provides terminals, which comprise the device 300 for dynamic verification during mobile phone moving.
The present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof, and accordingly, the present embodiments are to be considered as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures, for example, two sequential blocks may in fact be executed substantially concurrently, or in reverse order, depending upon the functionality involved, and it is also noted that each block of the block diagrams and/or flowchart, and combinations of blocks in the block diagrams and/or flowchart, may be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Referring to fig. 4, embodiments of the present invention further provide kinds of terminals 400, where the terminals 400 include, but are not limited to, a smart phone, a smart watch, a tablet computer, a personal computer, a notebook computer, or a group of computers, and as shown in fig. 4, the terminals 400 include a processor 401, a memory 402, a transceiver 403, and a bus 404, where the transceiver 403 is used for transceiving data with an external device, the number of the processors 401 in the device 400 may be or more, in some embodiments of the present application , the processor 401, the memory 402, and the transceiver 403 may be connected by a bus system or other means, the devices 400 may be used for performing the method shown in fig. 1, and for meaning and example of terms related to this embodiment, reference may be made to corresponding descriptions in fig. 1, and therefore, the description is not repeated here.
Wherein the memory 402 has program code stored therein. The processor 401 is arranged to call program code stored in the memory 402 for performing the steps as shown in fig. 1.
For example, the Processing element may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or Integrated circuits configured to implement embodiments of the present Application, such as or more microprocessors (DSPs), or or more Field Programmable 2 arrays (FPGAs).
The memory 403 may be storage devices or a collective name of multiple storage elements, and is used for storing executable program codes or parameters, data and the like required by the running device of the application program, and the memory 403 may include a Random Access Memory (RAM) or a non-volatile memory (non-volatile memory), such as a disk memory, a Flash memory (Flash) and the like.
Bus 404 can be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like.
The user device may also include an input/output device coupled to the bus 404 for coupling to other components, such as the processor 401 via the bus, the input/output device may provide an input interface for an operator to select a control item via the input interface, and other interfaces via which other devices may be externally coupled.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units into logical functional divisions may be realized in other ways, and for example, multiple units or components may be combined or integrated into another systems, or features may be omitted or not executed, and at point , the shown or discussed coupling or direct coupling or communication connection between each other may be through communication interfaces, indirect coupling or communication connection between devices or units, which may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in places, or may also be distributed on multiple network units.
In addition, functional units in the embodiments of the present invention may be integrated into processing units, or each unit may exist alone physically, or two or more units are integrated into units.
Based on the understanding that the technical solution of the present invention, in essence or a part contributing to the prior art, or a part of the technical solution, can be embodied in the form of a software product, which is stored in storage media and includes several instructions for making computer devices (which may be personal computers, servers, or network devices) execute all or part of the steps of the method according to the embodiments of the present invention, and the aforementioned storage media include various media capable of storing program codes, such as a usb disk, a mobile hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (12)

1, kinds of mobile phone moving in the dynamic verification method, characterized by, the said method includes the following steps:
the terminal sends a communication request to the second terminal, the communication request includes an instruction of moving the house, the instruction of moving the house is embodied by a plurality of bits in an extension field in the communication request or is embodied by special fields with set length carried in the communication request, wherein the special fields are fields with set length composed of a plurality of '1' or a plurality of '0's;
the th terminal receives the communication response sent by the second terminal;
the th terminal receives th password input by a user on a password setting page, the 0 th terminal inputs 1 th password into a setting calculation model, the 2 th terminal calls a calculation formula matched with the 3 th password input time in the setting model to calculate a 4 th result, and the 5 th terminal sends a password input prompt to the second terminal, wherein the 6 th terminal calls a calculation formula matched with the th password input time in the setting model to calculate a th result comprises multiplying the th password by specific numbers to obtain a th result or dividing the th password by specific numbers to obtain a remainder or an integer to obtain a th result, and the specific numbers are reduced by 1 every 1 minute;
the th terminal receives a second result obtained by inputting a second password input by the user into the set calculation model and sent by the second terminal, the th terminal compares the th result with the second result, and if the th result is the same as the second result, the moving file is sent to the second terminal.
2. The method of claim 1, further comprising:
if the th result is not the same as the second result, the th terminal does not transmit the move file to the second terminal.
3. The method as claimed in claim 1, wherein the calculating the result by calling the calculation formula matched with the password input time in the setting model comprises:
the terminal inquires out the formula corresponding to the password input time from the mapping relation between the time stored in the setting model and the formula, and inputs the password into the formula to calculate the result.
4. The method of claim 2, further comprising, after not sending the move file to the second terminal:
the terminal sends a password input prompt to the second terminal again, receives a third result obtained by inputting a third password input by a user to a set calculation model and sent by the second terminal, if the third result is the same as the result, the terminal sends the moving file to the second terminal, if the third result is not the same as the result, the terminal does not send the moving file to the second terminal, and the terminal sends alarm information to a server, wherein the alarm information comprises the identification of the second terminal.
5. The method according to claim 4, wherein after the terminal sends out the alarm information to the server, the method further comprises:
and the terminal sends a screen locking command to the second terminal, wherein the screen locking command is used for indicating that the second terminal locks the screen.
6, device for dynamic verification in moving mobile phone, wherein the device comprises:
a sending unit, configured to send a communication request to a second terminal, where the communication request includes an instruction to move the house, and the instruction to move the house is embodied by bits in an extension field in the communication request or is embodied by special fields with set length carried in the communication request, where the special fields are fields with set length composed of multiple "1" or multiple "0" s;
the receiving unit is used for receiving a communication response sent by the second terminal, receiving th passwords input by a user on a password setting page;
the processing unit is used for inputting th passwords into the set calculation model, calling a calculation formula matched with th password input time in the set model to calculate a 0 th result, calling a calculation formula matched with th password input time in the set model to calculate a th result, multiplying th passwords by specific numbers to obtain a th result or dividing th passwords by specific numbers to obtain a remainder or an integer to obtain a th result, and subtracting 1 from the specific numbers every 1 minute;
the sending unit is also used for sending a password input prompt to the second terminal;
the receiving unit is further used for receiving a second result obtained by inputting a second password input by a user into the set calculation model and sent by the second terminal;
the processing unit is further configured to compare the th result with the second result, and send the moving file to the second terminal if the th result is the same as the second result.
7. The apparatus of claim 6, wherein the processing unit is further configured to not send the moved file to the second terminal by the terminal if the th result is different from the second result.
8. The apparatus according to claim 6, wherein the processing unit is specifically configured to query a calculation formula corresponding to the th password input time from a mapping relationship between time stored in the setting model and the calculation formula, and input the th password into the calculation formula to calculate a th result.
9. The apparatus of claim 7, wherein the sending unit is further configured to send the password input prompt to the second terminal again;
the receiving unit is further used for receiving a third result obtained by inputting a third password input by a user into the set calculation model and sent by the second terminal;
the processing unit is further configured to send the moving file to the second terminal if a third result is the same as the th result, and send an alarm message to a server without sending the moving file to the second terminal if the third result is not the same as the th result, where the alarm message includes an identifier of the second terminal.
10. The apparatus according to claim 9, wherein the sending unit is further configured to send a screen lock command to the second terminal, and the screen lock command is used to instruct the second terminal to lock the screen.
11, kinds of terminals, characterized in that, the terminals include the device for dynamic authentication in moving mobile phone according to any claims 6-10.
12, computer-readable storage media, wherein program instructions are stored in the computer-readable storage media, the program instructions for causing a computer to perform the method of any of claims 1-5 through when invoked.
CN201610825085.6A 2016-09-14 2016-09-14 Method and device for dynamic verification in mobile phone carriers Active CN106507268B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610825085.6A CN106507268B (en) 2016-09-14 2016-09-14 Method and device for dynamic verification in mobile phone carriers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610825085.6A CN106507268B (en) 2016-09-14 2016-09-14 Method and device for dynamic verification in mobile phone carriers

Publications (2)

Publication Number Publication Date
CN106507268A CN106507268A (en) 2017-03-15
CN106507268B true CN106507268B (en) 2020-01-31

Family

ID=58291414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610825085.6A Active CN106507268B (en) 2016-09-14 2016-09-14 Method and device for dynamic verification in mobile phone carriers

Country Status (1)

Country Link
CN (1) CN106507268B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446110B (en) * 2016-09-14 2020-07-28 Oppo广东移动通信有限公司 Method and device for realizing connection security of terminal moving
CN113986075A (en) * 2021-10-22 2022-01-28 维沃移动通信有限公司 Information display method and device, verification method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764800A (en) * 2009-12-02 2010-06-30 深圳市融创天下科技发展有限公司 Method for dynamic password multi-terminal combined authentication
CN102857564A (en) * 2012-08-27 2013-01-02 华为终端有限公司 Data synchronization method, terminal and system
CN103957037A (en) * 2014-04-09 2014-07-30 北京工业大学 Method for automatic communication between PC side and Android mobile phone side based on Bluetooth
CN104023410A (en) * 2014-05-14 2014-09-03 北京奇虎科技有限公司 Method and device capable of realizing safe data transfer between wireless terminals
CN104144175A (en) * 2013-05-06 2014-11-12 腾讯科技(深圳)有限公司 Method, device and system for data migration

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020042753A1 (en) * 2000-10-06 2002-04-11 Ortiz Luis M. Transaction broker method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764800A (en) * 2009-12-02 2010-06-30 深圳市融创天下科技发展有限公司 Method for dynamic password multi-terminal combined authentication
CN102857564A (en) * 2012-08-27 2013-01-02 华为终端有限公司 Data synchronization method, terminal and system
CN104144175A (en) * 2013-05-06 2014-11-12 腾讯科技(深圳)有限公司 Method, device and system for data migration
CN103957037A (en) * 2014-04-09 2014-07-30 北京工业大学 Method for automatic communication between PC side and Android mobile phone side based on Bluetooth
CN104023410A (en) * 2014-05-14 2014-09-03 北京奇虎科技有限公司 Method and device capable of realizing safe data transfer between wireless terminals

Also Published As

Publication number Publication date
CN106507268A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN107766900B (en) Method, system and computing device for printing bar code
US20160210632A1 (en) Secured payment method and relevant device and system
US9078083B2 (en) Application server awareness of device capabilities in a wireless network
USRE45363E1 (en) Method and apparatus for network access
US10491607B2 (en) Method and system for implementing verification within data transfer
US10601978B2 (en) Telecommunication device utilization based on heartbeat communication
US10491548B2 (en) Techniques to configure bot flow
CN110809255B (en) Card information activation method and device and storage medium
CN111352597B (en) Multi-screen display control method and device, electronic equipment and readable storage medium
US20180262284A1 (en) Method, apparatus and terminal device for sending broadcast
CN113115331B (en) Control method and communication device
EP3565370B1 (en) Wireless fidelity (wi-fi) connection method and related product
CN106227483B (en) Display control method and mobile terminal
CN106507268B (en) Method and device for dynamic verification in mobile phone carriers
CN106603125B (en) Method and device for data interaction with Bluetooth equipment
CN108009036B (en) Method for positioning operation causing data abnormity and server
EP3373137B1 (en) Method, apparatus and terminal device for sending broadcast
WO2018161725A1 (en) Method for processing ordered broadcast and electronic device
CN106446110B (en) Method and device for realizing connection security of terminal moving
CN106503511B (en) A kind of method and device improving mobile phone removal of home cryptographic check safety
CN106484506B (en) File storage path selection method and device in terminal moving
CN106231544B (en) Method and device for storage and selection of transmission path in terminal moving process
CN105207980A (en) Information processing method and electronic equipment
EP2799982B1 (en) Smart card applications for rendering digital text on a mobile equipment
EP3061278B1 (en) Method and apparatus for managing communications with multiple identification profiles

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant