CN106559390B - Method and apparatus for enhancing device security - Google Patents

Method and apparatus for enhancing device security Download PDF

Info

Publication number
CN106559390B
CN106559390B CN201510628941.4A CN201510628941A CN106559390B CN 106559390 B CN106559390 B CN 106559390B CN 201510628941 A CN201510628941 A CN 201510628941A CN 106559390 B CN106559390 B CN 106559390B
Authority
CN
China
Prior art keywords
equipment
lock
password
unlocking
prompt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510628941.4A
Other languages
Chinese (zh)
Other versions
CN106559390A (en
Inventor
张锬锬
万昌洵
徐欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510628941.4A priority Critical patent/CN106559390B/en
Publication of CN106559390A publication Critical patent/CN106559390A/en
Application granted granted Critical
Publication of CN106559390B publication Critical patent/CN106559390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0869Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network for achieving mutual authentication

Abstract

The invention relates to a method and a device for enhancing equipment safety. The method comprises the following steps: when the user identifier is detected to be bound with the equipment, judging whether an equipment lock of the user identifier control equipment is unlocked or not; if the starting is finished, ending; if the equipment lock is not unlocked, outputting prompt information for unlocking the equipment lock; acquiring a trigger instruction of the prompt message for unlocking the equipment lock, and entering an equipment lock setting interface according to the trigger instruction; and acquiring the password input on the equipment lock setting interface, and starting the equipment lock according to the password. According to the method and the device for enhancing the equipment safety, whether the equipment lock of the user identification control equipment is unlocked is judged, if not, prompt information is output, the input password is obtained by entering the equipment lock setting interface according to the prompt information, the equipment lock is started according to the password, after the user identification is stolen, the equipment lock is started due to the bound equipment, other people cannot control the equipment by using the user identification, and the equipment safety is improved.

Description

Method and apparatus for enhancing device security
Technical Field
The invention relates to the field of Internet of things safety, in particular to a method and a device for enhancing equipment safety.
Background
The internet of things is an internet connected with objects, the core and the foundation of the internet of things are still the internet, and the internet of things is a network extending and expanding on the basis of the internet, and a user side of the internet of things extends and expands any object to exchange information and communicate.
With the development of the internet of things, after application software is generally logged in through an application software account, bound equipment is remotely controlled, after the application software account is stolen, a thief can log in the application software through the application software account of the user, can check the corresponding equipment bound with the application software account of the user, and control the bound equipment, and the safety of the equipment is low.
Disclosure of Invention
Therefore, it is necessary to provide a method for enhancing the security of the device to prevent others from controlling the device and improve the security of the device, aiming at the problem that the device is controlled by others and the security of the device is low due to the traditional leakage of the application software account.
In addition, it is necessary to provide a device for enhancing the safety of the device, which can prevent others from controlling the device and improve the safety of the device.
A method of enhancing device security, comprising the steps of:
when the user identification is detected to be bound with the equipment, judging whether the equipment lock of the equipment controlled by the user identification is unlocked; if the starting is finished, ending;
if the equipment lock is not unlocked, outputting prompt information for unlocking the equipment lock;
acquiring a trigger instruction of the prompt message for unlocking the equipment lock, and entering an equipment lock setting interface according to the trigger instruction;
and acquiring the password input on the equipment lock setting interface, and starting the equipment lock according to the password.
An apparatus to enhance device security, comprising:
the judging module is used for judging whether the equipment lock of the equipment controlled by the user identification is unlocked or not when the user identification is detected to be bound with the equipment; if the starting is finished, ending;
the output module is used for outputting prompt information for unlocking the equipment lock if the equipment lock is not unlocked;
the cut-in module is used for acquiring a trigger instruction of the prompt message for unlocking the equipment lock and entering an equipment lock setting interface according to the trigger instruction;
and the acquisition module is used for acquiring the password input on the equipment lock setting interface and starting the equipment lock according to the password.
According to the method and the device for enhancing the equipment safety, after the user identification is detected to be bound with the equipment, whether the equipment lock of the equipment controlled by the user identification is unlocked is judged, if not, prompt information is output, the equipment lock enters an equipment lock setting interface according to the prompt information, the input password is acquired at the equipment lock setting interface, the equipment lock is started according to the password, after the user identification is stolen, the equipment lock is started due to the bound equipment, other people cannot control the equipment by utilizing the user identification, and the equipment safety is improved.
Drawings
FIG. 1 is a diagram illustrating an application environment in which a method for upgrading firmware of a device operates according to an embodiment;
fig. 2 is a schematic diagram of the internal structure of the terminal in one embodiment;
FIG. 3 is a flow diagram of a method for enhancing device security in one embodiment;
FIG. 4 is a schematic diagram illustrating an embodiment of outputting a prompt in an instant messaging manner in an Android system;
FIG. 5 is a diagram illustrating an embodiment of a prompt output in the IOS system in the form of an instant messaging message;
FIG. 6 is a diagram illustrating a prompt in a notification bar, according to an embodiment;
FIG. 7A is a diagram illustrating an embodiment of a process for displaying a prompt token at a device menu entry and cutting into a device lock interface entry;
FIG. 7B is a diagram illustrating a process of displaying a prompt mark at an entry of a device menu and cutting into an entry of a device lock interface in another embodiment;
FIG. 8 is a schematic diagram of entering a numeric password;
FIG. 9 is a schematic diagram of inputting an alphabetic password;
FIG. 10 is a schematic diagram of inputting an alphabetic password;
FIG. 11 is a schematic diagram of entering a pattern password;
FIG. 12 is a block diagram of an apparatus for enhancing device security in one embodiment;
fig. 13 is a block diagram showing the construction of an apparatus for enhancing the security of a device according to another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Fig. 1 is a schematic diagram of an application environment in which a method for upgrading device firmware operates according to an embodiment. As shown in fig. 1, the application environment includes a terminal 120 where a device 110, an instant messaging application, and/or a light application are located.
The device 110 may be various internet of things devices, such as a smart band, a smart coffee cup, a smart air conditioner, a smart television, and the like. The device 110 may receive various information and output information according to its own supported functions, for example, the device may display text, pictures, etc. with a display screen. Device 110 may communicate with terminal 120. The device 110 may have a WiFi module, a bluetooth module, a GSM (Global System for Mobile Communication) module, etc.
The terminal 120 may have an instant messaging application installed or a light application running thereon. The user can log in the instant messaging application or the light application through the user identification, control the bound equipment to execute certain operations and the like. The terminal 120 may be a mobile phone, a tablet computer, a personal digital assistant, etc. The light application is an application that is searched for without downloading.
Fig. 2 is a schematic diagram of an internal structure of the terminal in one embodiment. As shown in fig. 2, the terminal includes a processor, a storage medium, a memory, a network interface, a sound collection device, a display screen, a speaker, and an input device, which are connected through a system bus. The storage medium of the terminal stores an operating system and further comprises a device for enhancing the equipment security, and the device for enhancing the equipment security is used for realizing a method for enhancing the equipment security. The processor is used for providing calculation and control capability and supporting the operation of the whole terminal. The memory in the terminal provides an environment for the operation of the device for enhancing the device security in the storage medium, and the network interface is used for performing network communication with the server or other devices, such as sending a data request to the server, receiving data returned by the server, and the like. The display screen of the terminal can be a liquid crystal display screen or an electronic ink display screen, and the input device can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the terminal, or an external keyboard, a touch pad or a mouse. The terminal may be a mobile phone, a tablet computer or a personal digital assistant. Those skilled in the art will appreciate that the configuration shown in fig. 2 is a block diagram of only a portion of the configuration associated with the present application and does not constitute a limitation on the terminal to which the present application is applied, and that a particular terminal may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
FIG. 3 is a flow diagram of a method for enhancing device security in one embodiment. As shown in fig. 3, a method for enhancing device security, which is executed on a terminal, includes the following steps:
step 302, when it is detected that the user identifier is bound to the device, it is determined whether the device lock of the device is controlled to be unlocked by the user identifier, if so, the process is ended, and if not, step 304 is executed.
Specifically, the user identifier is bound to the device, that is, a binding relationship between the user identifier and the device identifier is established. When the first user identifier is in binding relation with the device identifier, the user identifier is the owner of the device. When the owner of the device shares the device with the other user identifiers, the shared other user identifiers are sharers of the device, and after the sharers of the device receive the device sharing, the binding relationship between the device identifiers and the user identifiers of the sharers is established.
The user identification can be an instant communication identification registered by the user, an electronic mailbox or other user accounts and the like. Preferably, it is the instant messaging identity of the user. The device id may be a device number or a device MAC (Media Access Control) address, etc. The equipment number can be composed of a number distributed to an equipment producer by the platform of the internet of things and a serial number distributed to the equipment by the equipment producer. The Internet of things platform distributes numbers to equipment producers, and the legality of the equipment producers can be verified and monitored conveniently.
And when the user identification becomes the owner or the sharer of the equipment, judging whether the equipment lock of the user identification control equipment is unlocked, if the equipment lock is unlocked, ending, and if the equipment lock is not unlocked, outputting prompt information for unlocking the equipment lock. The equipment lock is a checkpoint of the control equipment, and the operation of the control equipment can be carried out only after the verification is passed. The user identification control device is used for sending a control instruction to the bound device after a user logs in the instant messaging application or the light application through the user identification, so that the control device executes corresponding action according to the control instruction.
And step 304, outputting prompt information for unlocking the equipment lock.
Specifically, the output prompt message for unlocking the device lock has various manners, and the prompt message for unlocking the device lock can be output in a text form, a voice form or a rich media form.
The text form means a word description prompting that the device lock needs to be unlocked. The voice form is that the prompt information is output in a voice form, and the voice prompt information can be played by clicking to play the voice. The rich media format refers to a format in which various characters, pictures, sounds, videos, and the like are combined.
Besides outputting prompt information for unlocking the equipment lock, the equipment lock introduction control can be output, the trigger operation of the equipment lock introduction control is obtained, and the detail information of the equipment lock is displayed according to the trigger operation. The detail information of the device lock includes a function introduction description of the device lock, and the like. The user can know the function and the function of the equipment lock conveniently through the detailed information of the equipment lock.
Step 306, acquiring a trigger instruction of the prompt message for unlocking the device lock, and entering a device lock setting interface according to the trigger instruction.
Specifically, when the prompt information for unlocking the device lock is output, a jump entry or a hyperlink address and the like can be set in the prompt information, a trigger instruction generated by a trigger operation on the jump entry or the hyperlink address in the prompt information is obtained, and the device lock setting interface is accessed according to the trigger instruction.
Step 308, acquiring the password input on the device lock setting interface, and enabling the device lock according to the password.
Specifically, the step of obtaining the password input on the device lock setting interface includes: and acquiring one or more of a numeric password, an alphabetic password, a password combining numbers and letters, a pattern password, a fingerprint password and a voiceprint password which are input on the equipment lock setting interface. The entered password is stored on the server and/or the terminal.
According to the method for enhancing the equipment safety, after the user identification is detected to be bound with the equipment, whether the equipment lock of the equipment controlled by the user identification is unlocked is judged, if not, prompt information is output, the equipment lock enters an equipment lock setting interface according to the prompt information, the input password is acquired at the equipment lock setting interface, the equipment lock is started according to the password, and after the user identification is stolen, the equipment lock is started by the bound equipment, so that other people cannot control the equipment by utilizing the user identification, and the equipment safety is improved.
In one embodiment, the step of outputting a prompt to unlock the device lock includes: and displaying the prompt message for unlocking the equipment lock in an instant messaging message window in an instant messaging message mode.
The prompt message can be displayed in one or more of a text form, a voice form, a picture form, a rich media form and the like.
Fig. 4 is a schematic diagram illustrating that a prompt message is output in an instant messaging manner in the Android system in one embodiment. As shown in fig. 4, in the Android system, the prompt information for unlocking the device lock is displayed in the instant messaging message window, and a jump entry and a device lock introduction entry for entering the device lock are provided. The prompt message may include "please click to unlock the device lock to prevent the user identification from being stolen or losing the mobile terminal, resulting in the device being maliciously controlled by a person". Acquiring a skip entry of the unlocking device lock, entering an unlocking device lock interface when the unlocking device lock is unlocked for the first time, prompting that the unlocking device lock is unlocked on the unlocking device lock interface, and even if the user identifier is stolen, other people cannot log in the user identifier of the user to control the bound device, and providing an unlocking protection control; when the equipment lock is opened and the equipment lock is currently in a closed state, the equipment lock switch control interface is entered, the equipment lock is prompted to be unlocked on the equipment lock switch control interface, an unlocking instruction of the equipment lock by a user is obtained, and the equipment lock is unlocked. And acquiring a trigger operation on an introduction entrance of the equipment lock, entering an introduction page of the equipment lock, checking detailed description of functions of the equipment lock, solving problems and the like. In addition, the function of allowing the mobile phone computer to be on line synchronously can be provided, namely, the same user identification is allowed to log in on the mobile phone and the computer at the same time. Furthermore, the anti-theft function of the mobile terminal is provided, and the geographic position of the mobile terminal can be positioned by starting the anti-theft function of the mobile terminal.
FIG. 5 is a diagram illustrating an embodiment in which a hint is output in the form of an instant messaging message in the IOS system. As shown in fig. 5, in the IOS system, the prompt message for unlocking the device lock is shown in the instant messaging window. The prompt message may include "please click to unlock the device lock to prevent the user identification from being stolen or losing the mobile terminal, resulting in the device being maliciously controlled by a person". A jump entry to unlock the device lock is provided. Acquiring a skip entry of the unlocking device lock, entering an unlocking device lock interface when the unlocking device lock is unlocked for the first time, prompting that the unlocking device lock is unlocked on the unlocking device lock interface, and even if a user identifier is stolen, other people cannot log in the user identifier of the user to control the bound device and provide an unlocking protection control; when the equipment lock is opened and the equipment lock is currently in a closed state, the equipment lock switch control interface is entered, the equipment lock is prompted to be unlocked on the equipment lock switch control interface, an unlocking instruction of the equipment lock by a user is obtained, and the equipment lock is unlocked.
In one embodiment, the step of outputting a prompt to unlock the device lock includes: and displaying prompt information of unlocking the equipment lock in the notification bar.
Specifically, the prompt information for unlocking the device lock is displayed in a notification bar of an Android system, an IOS system, a windows phone system, or the like. The prompt message can be displayed in one or more of a text form, a voice form, a picture form, a rich media form and the like.
After the prompt information for unlocking the equipment lock is displayed in the notification bar, pull-down operation can be acquired, the trigger operation of a user on the prompt information is acquired, a trigger instruction is generated according to the trigger operation, and the equipment lock setting interface is accessed according to the trigger instruction. A skip entry can be embedded into the prompt message, or a skip control is arranged on the prompt message side, the operation of clicking the skip entry or the skip control by a user is obtained, a trigger instruction is generated according to the click operation, and the device lock setting interface is accessed according to the trigger instruction.
FIG. 6 is a diagram illustrating a prompt in a notification bar, according to an embodiment. As shown in fig. 6, prompt information for unlocking the device lock, for example, prompt information displayed in text form, is displayed in a notification bar of the system, and a jump control is set. Acquiring triggering operation of a jump control for unlocking the equipment lock, entering an equipment lock unlocking interface when the equipment lock is unlocked for the first time, prompting that the equipment lock is unlocked on the equipment lock unlocking interface, preventing others from logging in the equipment bound by the user identification even if the user identification is stolen, and providing an unlocking protection control; when the equipment lock is opened and the equipment lock is currently in a closed state, the equipment lock switch control interface is entered, the equipment lock is prompted to be unlocked on the equipment lock switch control interface, an unlocking instruction of the equipment lock by a user is obtained, and the equipment lock is unlocked.
In one embodiment, the step of outputting a prompt to unlock the device lock includes: displaying a prompt mark at an equipment menu entrance of the instant messaging application or the light application, acquiring a trigger operation of the prompt mark, switching into an equipment lock interface entrance, and displaying prompt information of unlocking the equipment lock at the equipment lock interface entrance.
Specifically, the prompt message may be presented in one or more of a text form, a voice form, a picture form, a rich media form, and the like.
FIG. 7A is a diagram illustrating a process for showing a prompt for a device menu entry and cutting into a device lock interface entry, according to an embodiment. As shown in fig. 7A, a prompt mark is shown at the device menu entry of the instant messaging application or the light application, and the prompt mark may be a dot, an oval dot, a triangle, a number, or the like, such as a dot in the first drawing. The indicia may be displayed in a color such as red, black, etc. The trigger operation for obtaining the prompt mark displayed at the entrance of the device menu is switched into the device lock interface entrance, for example, the device lock interface entrance, namely 'device lock (not enabled) new', is displayed in the second picture, and meanwhile, functions of authorizing friends, modifying device remarks, checking device update, unbinding and the like are provided.
In the Android system, an equipment lock (not started) new is displayed at an equipment lock interface entrance, a trigger operation on the equipment lock interface entrance is acquired, an equipment lock setting interface is entered, and after a password is set on the equipment lock setting interface, the equipment lock is started. When the device lock is enabled, the device lock (enabled) is displayed at the entrance of the device lock interface.
Fig. 7B is a schematic diagram illustrating a process of displaying a prompt mark at a device menu entry and cutting into a device lock interface entry according to another embodiment. As shown in fig. 7B, in the IOS system, "unlock the device lock" is displayed at the device lock interface entry, the trigger operation to the device lock interface entry is acquired, the device lock setting interface is entered, and after the password is set at the device lock setting interface, the device lock is enabled. When the device lock is enabled, a "device lock" is displayed at the device lock interface entry.
In one embodiment, the password for obtaining the input on the device lock setting interface may be one or more of a numeric password, an alphabetic password, a password combining numbers and letters, a pattern password, a fingerprint password and a voiceprint password.
Further, in an embodiment, the method further includes: acquiring the selected equipment bound with the user identification, and acquiring an input password; and comparing the input password with the password of the equipment lock of the equipment, if the input password is the same as the password of the equipment lock, passing the verification, and controlling the equipment, and if the input password is not the same as the password of the equipment lock, failing the verification, and failing to control the equipment.
The digital code is a code composed of numbers, which can be 6-bit, 8-bit, 10-bit, etc., such as 123456. Fig. 8 is a schematic diagram of inputting a numeric keypad, as shown in fig. 8, on the device lock setup interface, such as 123456. And when the number input by the user is collected again, comparing the collected number with the stored number password, if the collected number is the same as the stored number password, unlocking successfully, and otherwise, unlocking fails.
The alphabetic password refers to a password composed of letters, such as sabd. Fig. 9 is a schematic diagram of inputting an alphabetic password, and as shown in fig. 9, an alphabetic password, such as sabd, is input on the device lock setting interface. And when the letters input by the user are collected again, comparing the collected letters with the stored letter passwords, if the collected letters are the same as the stored letter passwords, successfully unlocking, and otherwise, failing to unlock.
The combination of the numbers and the letters refers to a combination of the letters and the numbers in any combination, such as s01z 02. Fig. 10 is a schematic diagram of inputting an alphabetic password, such as s01z02, at the device lock setup interface. Furthermore, letter cases may also be distinguished. And when the characters input by the user are collected again, comparing the collected characters with the stored combined password of the numbers and the letters, if the collected characters are the same as the stored combined password of the numbers and the letters, unlocking successfully, and otherwise, unlocking fails.
The pattern password is a password composed of 9 points arbitrarily drawn patterns. FIG. 11 is a diagram illustrating inputting a pattern password. As shown in fig. 11, a zigzag pattern, a pattern password, is drawn, and may be set as desired, without being limited thereto. And when the pattern input by the user is collected again, comparing the collected pattern with the stored pattern password, if the collected pattern is the same as the stored pattern password, successfully unlocking, and otherwise, failing to unlock.
The fingerprint password is that the fingerprint of the user is used as the password. And when the fingerprint of the user is collected again, comparing the collected fingerprint password with the stored fingerprint password, if the collected fingerprint password is matched with the stored fingerprint password, unlocking successfully, and otherwise, unlocking fails. The matching is that the error between the captured fingerprint and the fingerprint code is within the allowable error range.
The voiceprint password is the password which is the voice collected by the user. And when the voice of the user is collected again, comparing the collected voice with the stored voiceprint password, if the collected voice is matched with the stored voiceprint password, unlocking successfully, and otherwise, unlocking fails. The match is that the error between the captured sound and the voiceprint password is within the allowable error range.
The method and the device have the advantages that various modes for setting the equipment lock password are provided, convenience is brought to a user to flexibly set the password, and safety is improved. In addition, multiple passwords can be combined together, multiple passwords are set, for example, after one layer of digital password is set, one layer of pattern password is set, after the digital password passes verification, the pattern password enters a pattern password verification interface to be verified by adopting the input pattern, and after the verification passes, the pattern password enters an equipment control interface.
In one embodiment, the method for enhancing device security further includes: and when the device is detected to be unbound with the user identifier, closing the device lock of the device.
Specifically, after it is detected that the binding relationship between the user identifier and the device identifier is released, the device lock for controlling the device by the user identifier is closed. After the user identifier logs in the light application or the instant messaging application, the unbound equipment cannot be checked, and the corresponding equipment lock is automatically closed.
The device being unbound to the user identity may include the owner of the device being unbound to the device, the sharer of the device being unbound to the device.
And after the owner of the equipment is unbound with the equipment, automatically unbinding other user identifications bound with the equipment from the equipment, and closing all equipment locks of the user identifications unbound with the equipment.
When the sharer of the device is unbound from the device, the other user identifiers bound with the device are not affected, and only the device lock of the user identifier unbound from the device needs to be closed.
Further, when the user identifier is bound to the device again, it is necessary to determine whether the device lock of the device is unlocked under the control of the user identifier, if the device lock is unlocked, the user identifier is ended, if the device lock is not unlocked, the prompt message for unlocking the device lock is output, the trigger instruction for the prompt message for unlocking the device lock is acquired, the device lock is entered into the device lock setting interface according to the trigger instruction, the password input on the device lock setting interface is acquired, and the device lock is enabled according to the password.
Further, the method for enhancing the security of the device further includes: and recording the binding time of the user identification and the equipment, and sequencing the binding relation of the user identification and the equipment according to the sequence of the binding time.
Specifically, the binding time of the user identifier and the device binding is recorded, for example, 10 minutes and 10 seconds such as 2015, 8 month, 1 day, 10 days, and the like, but is not limited thereto. And recording the binding relations and binding times of all the user identifications and the equipment identifications on the server, sequencing the binding relations of the user identifications and the equipment identifications according to the binding times, and arranging the latest binding relation information at the top so as to conveniently search the latest binding relation information.
Further, the method for enhancing the security of the device further includes: when the user identification is detected to be bound with a plurality of different devices, the device locks respectively set for the plurality of different devices are acquired, or the device locks are set for the plurality of devices once.
Specifically, when the user identifier is bound to a plurality of devices, a plurality of different devices respectively set a device lock, and when a device lock is set for each device, different passwords may be set respectively, or the same password may be set. When the device locks are set for a plurality of devices once, the same passwords can be set for the device locks of the plurality of devices.
The multiple devices are provided with the same device lock password, the operation is convenient, and the multiple devices can be controlled after one-time unlocking. The equipment lock of each equipment in a plurality of equipment sets up the password respectively, then it is safer, the equipment lock password of an equipment is cracked the back, can not cause other equipment also to be controlled.
FIG. 12 is a block diagram of an apparatus to enhance device security in one embodiment. The apparatus for enhancing device security in fig. 12 is a functional architecture constructed by a method corresponding to the method for enhancing device security, and please refer to the description in the method. As shown in FIG. 12, an apparatus for enhancing device security includes a determination module 1202, an output module 1204, a hand-in module 1206, and an acquisition module 1208. Wherein:
the determining module 1202 is configured to determine whether the device lock of the device is unlocked under control of the user identifier when it is detected that the user identifier is bound to the device; if the power is on, the method is finished.
In particular, it is detected that the user identification in the user identification and device binding is a device owner or device sharer. And binding the user identifier and the equipment, namely establishing a binding relationship between the user identifier and the equipment identifier. When the first user identifier is in binding relation with the device identifier, the user identifier is the owner of the device. When the owner of the device shares the device with the other user identifiers, the shared other user identifiers are sharers of the device, and after the sharers of the device receive the device sharing, the binding relationship between the device identifiers and the user identifiers of the sharers is established. The user identification can be an instant communication identification registered by the user, an electronic mailbox or other user accounts and the like. Preferably, it is the instant messaging identity of the user. The device identification may be a device number or a device MAC address, etc. The equipment number can be composed of a number distributed to an equipment producer by the platform of the internet of things and a serial number distributed to the equipment by the equipment producer. The Internet of things platform distributes numbers to equipment producers, and the legality of the equipment producers can be verified and monitored conveniently.
And when the user identification becomes the owner or the sharer of the equipment, judging whether the equipment lock of the user identification control equipment is unlocked, if the equipment lock is unlocked, ending, and if the equipment lock is not unlocked, outputting prompt information for unlocking the equipment lock. The equipment lock is a checkpoint of the control equipment, and the operation of the control equipment can be carried out only after the verification is passed.
The output module 1204 is configured to output a prompt message for unlocking the device lock if the device lock is not unlocked.
Specifically, the output prompt message for unlocking the device lock has various manners, and the prompt message for unlocking the device lock can be output in a text form, a voice form or a rich media form.
The text form means a word description prompting that the device lock needs to be unlocked. The voice form is that the prompt information is output in a voice form, and the voice prompt information can be played by clicking to play the voice. The rich media format refers to a format in which various characters, pictures, sounds, videos, and the like are combined.
Besides outputting prompt information for unlocking the device lock, the output module 1204 may further output a device lock introduction control, the cut-in module 1206 obtains a trigger operation on the device lock introduction control, and details of the device lock are displayed according to the trigger operation. The detail information of the device lock includes a function introduction description of the device lock, and the like.
The cut-in module 1206 is configured to obtain a trigger instruction of the prompt message for unlocking the device lock, and enter a device lock setting interface according to the trigger instruction.
Specifically, when the prompt information for unlocking the device lock is output, a jump entry or a hyperlink address and the like may be set in the prompt information, the cut-in module 1206 obtains a trigger instruction generated by a trigger operation on the jump entry or the hyperlink address in the prompt information, and enters a device lock setting interface according to the trigger instruction.
The obtaining module 1208 is configured to obtain the password input on the device lock setting interface, and enable the device lock according to the password.
Specifically, the step of obtaining the password input on the device lock setting interface includes: and acquiring one or more of a numeric password, an alphabetic password, a password combining numbers and letters, a pattern password, a fingerprint password and a voiceprint password which are input on the equipment lock setting interface.
According to the device for enhancing the equipment safety, after the user identification is bound with the equipment, whether the equipment lock of the user identification control equipment is unlocked is judged, if not, prompt information is output, the equipment lock enters the equipment lock setting interface according to the prompt information, the input password is acquired at the equipment lock setting interface, the equipment lock is started according to the password, after the user identification is stolen, the equipment lock is started due to the bound equipment, other people cannot control the equipment by utilizing the user identification, and the equipment safety is improved.
In one embodiment, the output module 1204 is further configured to display a prompt message for unlocking the device lock in an instant messaging window in an instant messaging manner.
The prompt message can be displayed in one or more of a text form, a voice form, a picture form, a rich media form and the like.
In one embodiment, the output module 1204 is further configured to present a prompt for unlocking the device lock in a notification bar.
Specifically, the prompt information for unlocking the device lock is displayed in a notification bar of an Android system, an IOS system, a windows phone system, or the like. The prompt message can be displayed in one or more of a text form, a voice form, a picture form, a rich media form and the like.
After the prompt information for unlocking the equipment lock is displayed in the notification bar, pull-down operation can be acquired, the trigger operation of a user on the prompt information is acquired, a trigger instruction is generated according to the trigger operation, and the equipment lock setting interface is accessed according to the trigger instruction. A skip entry can be embedded into the prompt message, or a skip control is arranged on the prompt message side, the operation of clicking the skip entry or the skip control by a user is obtained, a trigger instruction is generated according to the click operation, and the device lock setting interface is accessed according to the trigger instruction.
In one embodiment, the output module 1204 is further configured to display a prompt mark at an entry of a device menu of an instant messaging application or a light application, obtain a trigger operation on the prompt mark, switch into an entry of a device lock interface, and display a prompt message for unlocking the device lock at the entry of the device lock interface.
Specifically, the prompt message may be presented in one or more of a text form, a voice form, a picture form, a rich media form, and the like.
The obtaining module 1208 is further configured to obtain one or more of a numeric password, a pattern password, a password combining numbers and letters, a fingerprint password, and a voiceprint password input on the device lock setting interface.
The digital code is a code composed of numbers, which can be 6-bit, 8-bit, 10-bit, etc., such as 123456. Fig. 8 is a schematic diagram of inputting a numeric keypad, as shown in fig. 8, on the device lock setup interface, such as 123456.
The alphabetic password refers to a password composed of letters, such as sabd. Fig. 9 is a schematic diagram of inputting an alphabetic password, and as shown in fig. 9, an alphabetic password, such as sabd, is input on the device lock setting interface.
The combination of the numbers and the letters refers to a combination of the letters and the numbers in any combination, such as s01z 02. Fig. 10 is a schematic diagram of inputting an alphabetic password, such as s01z02, at the device lock setup interface.
The pattern password is a password composed of 9 points arbitrarily drawn patterns. FIG. 11 is a diagram illustrating inputting a pattern password. As shown in fig. 11, a zigzag pattern, a pattern password, is drawn, and may be set as desired, without being limited thereto.
The fingerprint password is that the fingerprint of the user is used as the password.
The voiceprint password is the password which is the voice collected by the user.
The method and the device have the advantages that various modes for setting the equipment lock password are provided, convenience is brought to a user to flexibly set the password, and safety is improved.
In addition, the obtaining module 1208 is further configured to, when detecting that the user identifier is bound to multiple different devices, obtain to set device locks for the multiple different devices respectively, or set device locks for the multiple devices once.
Specifically, when the user identifier is bound to a plurality of devices, a plurality of different devices respectively set a device lock, and when a device lock is set for each device, different passwords may be set respectively, or the same password may be set. When the device locks are set for a plurality of devices once, the same passwords can be set for the device locks of the plurality of devices.
Fig. 13 is a block diagram showing the construction of an apparatus for enhancing the security of a device according to another embodiment. The apparatus for enhancing device security in fig. 13 is a functional architecture constructed by a method corresponding to the method for enhancing device security, and please refer to the description in the method. As shown in fig. 13, an apparatus for enhancing device security includes a shutdown module 1210 and a comparison module 1212 in addition to a determination module 1202, an output module 1204, a hand-in module 1206, and an acquisition module 1208. Wherein:
the closing module 1210 is configured to close the device lock of the device when it is detected that the device is unbound from the user identifier.
Specifically, after it is detected that the binding relationship between the user identifier and the device identifier is released, the device lock for controlling the device by the user identifier is closed. After the user identifier logs in the light application or the instant messaging application, the unbound equipment cannot be checked, and the corresponding equipment lock is automatically closed.
The device being unbound to the user identity may include the owner of the device being unbound to the device, the sharer of the device being unbound to the device.
And after the owner of the equipment is unbound with the equipment, automatically unbinding other user identifications bound with the equipment from the equipment, and closing all equipment locks of the user identifications unbound with the equipment.
When the sharer of the device is unbound from the device, the other user identifiers bound with the device are not affected, and only the device lock of the user identifier unbound from the device needs to be closed.
Further, when the user identifier is bound to the device again, the determination module 1202 determines whether the device lock of the user identifier control device is unlocked, if the device lock is unlocked, the determination is finished, if the device lock is not unlocked, the output module 1204 outputs the prompt information for unlocking the device lock, the switching-in module 1206 obtains the trigger instruction for the prompt information for unlocking the device lock, the device lock setting interface is accessed according to the trigger instruction, the password input on the device lock setting interface is obtained by the obtaining module 1208, and the device lock is enabled according to the password.
Further, the obtaining module 1208 is further configured to obtain the selected device bound to the user identifier, and obtain the input password.
The comparing module 1212 is configured to compare the input password with the password of the device lock of the device, and if the input password is the same as the password of the device lock of the device, the verification passes and the device is controlled, and if the input password is not the same as the password of the device lock of the device, the verification fails and the device cannot be controlled.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), or the like.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (18)

1. A method of enhancing device security, comprising the steps of:
when the user identification is detected to be bound with the equipment, judging whether the equipment lock of the equipment controlled by the user identification is unlocked; if the starting is finished, ending;
if the equipment lock is not unlocked, outputting prompt information for unlocking the equipment lock;
the outputting of the prompt message for unlocking the device lock includes: displaying prompt information of unlocking the equipment lock in a notification bar;
embedding a jump entry in the prompt message, or setting a jump control at the prompt message side;
acquiring a trigger instruction of a jump entry or a jump control of the prompt message for unlocking the equipment lock, and entering an equipment lock setting interface according to the trigger instruction;
and acquiring the password input on the equipment lock setting interface, and starting the equipment lock according to the password.
2. The method of claim 1, wherein the step of outputting a prompt to unlock the device lock comprises:
and outputting prompt information for unlocking the device lock in a text form, a voice form or a rich media form.
3. The method of claim 1, wherein the step of outputting a prompt to unlock the device lock comprises:
displaying the prompt information of the unlocking device lock in an instant messaging message mode in an instant messaging message window;
or displaying a prompt mark at an equipment menu entrance of the instant messaging application or the light application, acquiring the trigger operation of the prompt mark, switching into an equipment lock interface entrance, and displaying prompt information of unlocking the equipment lock at the equipment lock interface entrance.
4. The method of claim 1, wherein the user identity detected in the user identity to device binding is a device owner or a device sharer.
5. The method of claim 1, wherein the step of obtaining the password entered on the device lock settings interface comprises:
and acquiring one or more of a numeric password, an alphabetic password, a password combining numbers and letters, a pattern password, a fingerprint password and a voiceprint password which are input on the equipment lock setting interface.
6. The method of claim 1, further comprising:
and when the equipment is detected to be unbound with the user identifier, closing the equipment lock of the equipment.
7. The method of claim 1, further comprising:
when the user identification is detected to be bound with a plurality of different devices, the device locks respectively set for the different devices are acquired, or the device locks are set for the devices once.
8. The method of claim 1, wherein after the step of enabling the device lock according to the password, the method further comprises:
acquiring the selected equipment bound with the user identification, and acquiring an input password;
and comparing the input password with the password of the equipment lock of the equipment, if the input password is the same as the password of the equipment lock, passing the verification, and controlling the equipment, and if the input password is not the same as the password of the equipment lock, failing the verification, and failing to control the equipment.
9. An apparatus for enhancing device security, comprising:
the judging module is used for judging whether the equipment lock of the equipment controlled by the user identification is unlocked or not when the user identification is detected to be bound with the equipment; if the starting is finished, ending;
the output module is used for outputting prompt information for unlocking the equipment lock if the equipment lock is not unlocked; the output module is also used for displaying prompt information of unlocking the equipment lock in a notification bar; embedding a jump entry in the prompt message, or setting a jump control at the prompt message side;
the cut-in module is used for acquiring a trigger instruction of a jump entry or a jump control of prompt information for unlocking the equipment lock and entering an equipment lock setting interface according to the trigger instruction;
and the acquisition module is used for acquiring the password input on the equipment lock setting interface and starting the equipment lock according to the password.
10. The apparatus of claim 9, wherein the output module is further configured to output a prompt to unlock the device lock in text form, voice form, or rich media form.
11. The apparatus of claim 9, wherein the output module is further configured to display a prompt message of the unlocking device lock in an instant messaging message manner in an instant messaging message window;
or the output module is further configured to display a prompt mark at an entry of an equipment menu of an instant messaging application or a light application, acquire a trigger operation on the prompt mark, cut into an entry of an equipment lock interface, and display prompt information for unlocking the equipment lock at the entry of the equipment lock interface.
12. The apparatus of claim 9, wherein the user identity detected in the user identity to device binding is a device owner or a device sharer.
13. The apparatus of claim 9, wherein the obtaining module is further configured to obtain one or more of a numeric password, an alphabetic password, a password combining numeric and alphabetic characters, a pattern password, a fingerprint password, and a voiceprint password entered on the device lock setting interface.
14. The apparatus of claim 9, further comprising:
and the closing module is used for closing the equipment lock of the equipment when detecting that the equipment is unbound with the user identifier.
15. The apparatus according to claim 9, wherein the obtaining module is further configured to obtain that device locks are respectively set for a plurality of different devices or that device locks are set for a plurality of devices once when it is detected that a user identifier is bound to the plurality of different devices.
16. The apparatus of claim 9, wherein the obtaining module is further configured to obtain the selected device bound to the user identifier and obtain the input password;
and the comparison module is used for comparing the input password with the password of the equipment lock of the equipment, if the input password is the same as the password of the equipment lock, the verification is passed, the equipment is controlled, and if the input password is not the same as the password of the equipment lock, the verification fails, and the equipment cannot be controlled.
17. A computer-readable storage medium, storing a computer program which, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 8.
18. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method according to any one of claims 1 to 8.
CN201510628941.4A 2015-09-28 2015-09-28 Method and apparatus for enhancing device security Active CN106559390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510628941.4A CN106559390B (en) 2015-09-28 2015-09-28 Method and apparatus for enhancing device security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510628941.4A CN106559390B (en) 2015-09-28 2015-09-28 Method and apparatus for enhancing device security

Publications (2)

Publication Number Publication Date
CN106559390A CN106559390A (en) 2017-04-05
CN106559390B true CN106559390B (en) 2020-07-17

Family

ID=58415876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510628941.4A Active CN106559390B (en) 2015-09-28 2015-09-28 Method and apparatus for enhancing device security

Country Status (1)

Country Link
CN (1) CN106559390B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108335695B (en) * 2017-06-27 2020-10-30 腾讯科技(深圳)有限公司 Voice control method, device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699835A (en) * 2009-09-16 2010-04-28 中兴通讯股份有限公司 Method for realizing safe use of mobile phone through safe lock and corresponding device
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal
CN104144109A (en) * 2014-01-24 2014-11-12 腾讯科技(深圳)有限公司 Equipment control method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699835A (en) * 2009-09-16 2010-04-28 中兴通讯股份有限公司 Method for realizing safe use of mobile phone through safe lock and corresponding device
CN104144109A (en) * 2014-01-24 2014-11-12 腾讯科技(深圳)有限公司 Equipment control method, device and system
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal

Also Published As

Publication number Publication date
CN106559390A (en) 2017-04-05

Similar Documents

Publication Publication Date Title
US10867026B1 (en) Authentication and control interface of a security system
US9935928B2 (en) Method and apparatus for automated password entry
CN107077552B (en) Bio-identification verifying is distributed between the device in AD-HOC network
US9589399B2 (en) Credential quality assessment engine systems and methods
US10152581B2 (en) Methods and systems for data entry
WO2017197974A1 (en) Biometric characteristic-based security authentication method, device and electronic equipment
CN103024732B (en) Mobile terminal and provide it safe method
EP3147768B1 (en) Screen interface unlocking method and screen interface unlocking device
US10572639B2 (en) Selectively providing personal information and access to functionality on lock screen based on biometric user authentication
CN102880820B (en) A kind of application program for mobile terminal access method and mobile terminal
US8646060B1 (en) Method for adaptive authentication using a mobile device
CN104573479B (en) A kind of use control method and device of user equipment
CN101719955B (en) Intelligent terminal system with fingerprint identification and information processing method
US9325683B2 (en) Mobile application management framework
US20200007676A1 (en) Device locator disable authentication
US7616091B2 (en) Actuating a security system using a wireless device
TWI543012B (en) Identity verification method for mobile communication device and apparatus thereof
US20200043011A1 (en) Pro-Active Identity Verification For Authentication Of Transaction Initiated Via Non-Voice Channel
US7337466B2 (en) Information hiding through time synchronization
KR20150046766A (en) Unlocking process mehtod, apparatus and device for terminal
KR101296863B1 (en) Entry authentication system using nfc door lock
RU2676947C2 (en) Device and method of increasing security of terminal
AU2013245980B2 (en) Location-based access control for portable electronic device
US20130068837A1 (en) Mobile computing device authentication using scannable images
JP2015026357A (en) Method and apparatus for protection of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant