CN107071769B - Information synchronization security authentication device and method - Google Patents

Information synchronization security authentication device and method Download PDF

Info

Publication number
CN107071769B
CN107071769B CN201710286553.1A CN201710286553A CN107071769B CN 107071769 B CN107071769 B CN 107071769B CN 201710286553 A CN201710286553 A CN 201710286553A CN 107071769 B CN107071769 B CN 107071769B
Authority
CN
China
Prior art keywords
application
authentication
information
request
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710286553.1A
Other languages
Chinese (zh)
Other versions
CN107071769A (en
Inventor
吴启军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yinglian Intelligent Technology Co ltd
Original Assignee
Shanghai Yinglian Telecom Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yinglian Telecom Technology Co ltd filed Critical Shanghai Yinglian Telecom Technology Co ltd
Priority to CN202010410113.4A priority Critical patent/CN111542061B/en
Priority to CN202010410110.0A priority patent/CN111542060B/en
Priority to CN201710286553.1A priority patent/CN107071769B/en
Publication of CN107071769A publication Critical patent/CN107071769A/en
Application granted granted Critical
Publication of CN107071769B publication Critical patent/CN107071769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications

Abstract

The invention discloses a safety certification device for information synchronization, which comprises: the mobile terminal comprises a first judgment module and a second judgment module, wherein the first judgment module is used for judging whether the application is a preset safety application or not when the mobile terminal detects an information synchronization request of the application; the detection module is used for detecting whether the application sends authentication request information or not if the application is not a preset safety application; the display module is used for displaying an authentication interface if the application does not send the authentication request information; and the authentication module is used for receiving an authentication instruction triggered by a user based on the authentication interface and carrying out safety authentication on the application according to the authentication instruction. The invention also discloses a safety authentication method for information synchronization. The invention can improve the safety of information synchronization of the mobile terminal.

Description

Information synchronization security authentication device and method
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a safety authentication device and method for information synchronization.
Background
The mobile phone information synchronization means that a user writes local information of a mobile phone into a cloud server, a computer, an SD card or other terminals by means of related applications to achieve data synchronization, and then the purpose of data backup or sharing is achieved.
Taking a mobile phone backup as an example, the mobile phone backup process generally involves reading privacy information such as an address book and short messages of a user by related applications, for a type of legal applications, the mobile phone may request the user for the reading authority of information such as mobile phone contacts and short messages in a frame flipping manner to obtain user authorization, and for some malicious applications, the mobile phone does not flip frames but directly steals personal information of the user by a special means (such as Trojan horse), so that a great privacy disclosure risk is brought to the user.
Disclosure of Invention
The invention mainly aims to provide a security authentication device and a security authentication method for information synchronization, aiming at improving the security of information synchronization of a mobile terminal.
In order to achieve the above object, the present invention provides a security authentication apparatus for information synchronization, the apparatus comprising:
the mobile terminal comprises a first judgment module and a second judgment module, wherein the first judgment module is used for judging whether the application is a preset safety application or not when the mobile terminal detects an information synchronization request of the application;
the detection module is used for detecting whether the application sends authentication request information or not if the application is not a preset safety application;
the display module is used for displaying an authentication interface if the application does not send the authentication request information;
and the authentication module is used for receiving an authentication instruction triggered by a user based on the authentication interface and carrying out safety authentication on the application according to the authentication instruction.
Optionally, the detecting module is further configured to:
detecting whether the mobile terminal pops up a dialog box of the authentication request information of the application;
if not, the application is judged not to send the authentication request information.
Optionally, the authentication module is further configured to receive an authentication password or an authentication fingerprint input by a user based on the authentication interface, and perform security authentication on the application according to the authentication password or the authentication fingerprint.
Optionally, the apparatus further comprises:
the forbidding module is used for forbidding the application to read the request data corresponding to the information synchronization request and encrypting the request data corresponding to the information synchronization request if the application fails the security authentication;
and the marking module is used for allowing the application to read the request data corresponding to the information synchronization request if the application passes the security authentication, and marking the application as the application which passes the security authentication.
Optionally, the apparatus further comprises:
the second judgment module is used for judging whether the application is a marked application which passes the security authentication;
and the allowing module is used for allowing the application to read the request data corresponding to the information synchronization request if the application is marked as the application which passes the security authentication.
The detection module is further used for detecting whether the application sends out authentication request information or not if the application is not the marked application which passes the security authentication.
In addition, in order to achieve the above object, the present invention further provides a security authentication method for information synchronization, including the following steps:
when the mobile terminal detects an information synchronization request of an application, judging whether the application is a preset safety application;
if the application is not a preset safety application, detecting whether the application sends authentication request information or not;
if the application does not send authentication request information, displaying an authentication interface;
and receiving an authentication instruction triggered by a user based on the authentication interface, and performing safety authentication on the application according to the authentication instruction.
Optionally, the step of detecting whether the application sends the authentication request information includes:
detecting whether the mobile terminal pops up a dialog box of the authentication request information of the application;
if not, the application is judged not to send the authentication request information.
Optionally, the receiving an authentication instruction triggered by the user based on the authentication interface, and the step of performing security authentication on the application according to the authentication instruction includes:
and receiving an authentication password or an authentication fingerprint input by a user based on the authentication interface, and performing security authentication on the application according to the authentication password or the authentication fingerprint.
Optionally, the method further comprises:
if the application fails the security authentication, prohibiting the application from reading the request data corresponding to the information synchronization request, and encrypting the request data corresponding to the information synchronization request;
and if the application passes the security authentication, allowing the application to read the request data corresponding to the information synchronization request, and marking the application as the application passing the security authentication.
Optionally, before the step of detecting whether the application sends the authentication request information, the method further includes:
judging whether the application is marked application which passes the safety certification;
and if so, allowing the application to read the request data corresponding to the information synchronization request.
If not, executing the following steps: and detecting whether the application sends authentication request information.
When the mobile terminal detects an information synchronization request of an application, judging whether the application is a preset safety application; if the application is not a preset safety application, detecting whether the application sends authentication request information or not; if the application does not send authentication request information, displaying an authentication interface; and receiving an authentication instruction triggered by a user based on the authentication interface, and performing safety authentication on the application according to the authentication instruction. Through the mode, the mobile terminal actively displays the authentication interface to request the user to perform security authentication on the application when the application does not send the authentication request information, so that the security authentication is performed from the source authorized by the user privacy information, the risk of leakage of the user privacy information is reduced, and the security of information synchronization of the mobile terminal is improved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an alternative mobile terminal for implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal shown in FIG. 1;
FIG. 3 is a block diagram of a first embodiment of a security authentication device for information synchronization according to the present invention;
FIG. 4 is a schematic diagram of a display interface of a dialog box for popping up application authentication request information by a mobile terminal according to the present invention;
FIG. 5 is a schematic diagram of an authentication interface of the mobile terminal according to the present invention;
FIG. 6 is a schematic diagram illustrating another authentication interface of the mobile terminal according to the present invention;
FIG. 7 is a block diagram of a security authentication device for information synchronization according to a second embodiment of the present invention;
FIG. 8 is a block diagram of a security authentication device for information synchronization according to a third embodiment of the present invention;
FIG. 9 is a flowchart illustrating a first embodiment of a security authentication method for information synchronization according to the present invention;
FIG. 10 is a flowchart illustrating a second embodiment of the information synchronization security authentication method according to the present invention;
fig. 11 is a flowchart illustrating a security authentication method for information synchronization according to a third embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
The mobile terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a navigation device, and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present invention.
The mobile terminal 100 may include a wireless communication unit 110, a user input unit 130, a sensing unit 140, an output unit 150, a memory 160, an interface unit 170, a controller 180, and a power supply unit 190, etc. Fig. 1 illustrates a mobile terminal having various components, but it is to be understood that not all illustrated components are required to be implemented. More or fewer components may alternatively be implemented. Elements of the mobile terminal will be described in detail below.
The wireless communication unit 110 typically includes one or more components that allow radio communication between the mobile terminal 100 and a wireless communication device or network. For example, the wireless communication unit may include at least one of a mobile communication module 112, a wireless internet module 113, and a short-range communication module 114.
The mobile communication module 112 transmits and/or receives radio signals to and/or from at least one of a base station (e.g., access point, node B, etc.), an external terminal, and a server. Such radio signals may include voice call signals, video call signals, or various types of data transmitted and/or received according to text and/or multimedia messages.
The wireless internet module 113 supports wireless internet access of the mobile terminal. The module may be internally or externally coupled to the terminal. The wireless internet access technology to which the module relates may include WLAN (wireless LAN) (Wi-Fi), Wibro (wireless broadband), Wimax (worldwide interoperability for microwave access), HSDPA (high speed downlink packet access), and the like.
The short-range communication module 114 is a module for supporting short-range communication. Some examples of short-range communication technologies include bluetoothTMRadio Frequency Identification (RFID), infrared data association (IrDA), Ultra Wideband (UWB), zigbeeTMAnd so on.
The user input unit 130 may generate key input data according to a command input by a user to control various operations of the mobile terminal. The user input unit 130 allows a user to input various types of information, and may include a keyboard, dome sheet, touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), scroll wheel, joystick, and the like. In particular, when the touch pad is superimposed on the display unit 151 in the form of a layer, a touch screen may be formed.
The sensing unit 140 detects a current state of the mobile terminal 100 (e.g., an open or closed state of the mobile terminal 100), a position of the mobile terminal 100, presence or absence of contact (i.e., touch input) by a user with the mobile terminal 100, an orientation of the mobile terminal 100, acceleration or jerky movement and direction of the mobile terminal 100, and the like, and generates a command or signal for controlling an operation of the mobile terminal 100. For example, when the mobile terminal 100 is implemented as a slide-type mobile phone, the sensing unit 140 may sense whether the slide-type phone is opened or closed. In addition, the sensing unit 140 can detect whether the power supply unit 190 supplies power or whether the interface unit 170 is coupled with an external device. The sensing unit 140 may include a proximity sensor 141 as will be described below in connection with a touch screen.
The interface unit 170 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The identification module may store various information for authenticating a user using the mobile terminal 100 and may include a User Identity Module (UIM), a Subscriber Identity Module (SIM), a Universal Subscriber Identity Module (USIM), and the like. In addition, a device having an identification module (hereinafter, referred to as an "identification device") may take the form of a smart card, and thus, the identification device may be connected with the mobile terminal 100 via a port or other connection means. The interface unit 170 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal and the external device.
In addition, when the mobile terminal 100 is connected with an external cradle, the interface unit 170 may serve as a path through which power is supplied from the cradle to the mobile terminal 100 or may serve as a path through which various command signals input from the cradle are transmitted to the mobile terminal. Various command signals or power input from the cradle may be used as signals for recognizing whether the mobile terminal is accurately mounted on the cradle. The output unit 150 is configured to provide output signals (e.g., audio signals, video signals, alarm signals, vibration signals, etc.) in a visual, audio, and/or tactile manner. The output unit 150 may include a display unit 151, an audio output module 152, an alarm unit 153, and the like.
The display unit 151 may display information processed in the mobile terminal 100. For example, when the mobile terminal 100 is in a phone call mode, the display unit 151 may display a User Interface (UI) or a Graphical User Interface (GUI) related to a call or other communication (e.g., text messaging, multimedia file downloading, etc.). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display unit 151 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display unit 151 and the touch pad are overlapped with each other in the form of a layer to form a touch screen, the display unit 151 may serve as an input device and an output device. The display unit 151 may include at least one of a Liquid Crystal Display (LCD), a thin film transistor LCD (TFT-LCD), an Organic Light Emitting Diode (OLED) display, a flexible display, a three-dimensional (3D) display, and the like. Some of these displays may be configured to be transparent to allow a user to view from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a TOLED (transparent organic light emitting diode) display or the like. Depending on the particular desired implementation, the mobile terminal 100 may include two or more display units (or other display devices), for example, the mobile terminal may include an external display unit (not shown) and an internal display unit (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The audio output module 152 may convert audio data received by the wireless communication unit 110 or stored in the memory 160 into an audio signal and output as sound when the mobile terminal is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output module 152 may provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output module 152 may include a microphone, a buzzer, and the like.
The alarm unit 153 may provide an output to notify the mobile terminal 100 of the occurrence of an event. Typical events may include call reception, message reception, key signal input, touch input, and the like. In addition to audio or video output, the alarm unit 153 may provide output in different ways to notify the occurrence of an event. For example, the alarm unit 153 may provide an output in the form of vibration, and when a call, a message, or some other incoming communication (communicating communication) is received, the alarm unit 153 may provide a tactile output (i.e., vibration) to inform the user thereof. By providing such a tactile output, the user can recognize the occurrence of various events even when the user's mobile phone is in the user's pocket. The alarm unit 153 may also provide an output notifying the occurrence of an event via the display unit 151 or the audio output module 152.
The memory 160 may store software programs and the like for processing and controlling operations performed by the controller 180, or may temporarily store data (e.g., a phonebook, messages, still images, videos, and the like) that has been or will be output. Also, the memory 160 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The memory 160 may include at least one type of storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the memory 160 through a network connection.
The controller 180 generally controls the overall operation of the mobile terminal. For example, the controller 180 performs control and processing related to voice calls, data communications, video calls, and the like. In addition, the controller 180 may include a multimedia module 181 for reproducing (or playing back) multimedia data, and the multimedia module 181 may be constructed within the controller 180 or may be constructed separately from the controller 180. The controller 180 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image.
The power supply unit 190 receives external power or internal power and provides appropriate power required to operate various elements and components under the control of the controller 180.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the controller 180. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in the memory 160 and executed by the controller 180.
Up to this point, mobile terminals have been described in terms of their functionality. Hereinafter, a slide-type mobile terminal among various types of mobile terminals, such as a folder-type, bar-type, swing-type, slide-type mobile terminal, and the like, will be described as an example for the sake of brevity. Accordingly, the present invention can be applied to any type of mobile terminal, and is not limited to a slide type mobile terminal.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which a mobile terminal according to the present invention is operable will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication system includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global system for mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of mobile terminals 100, a plurality of Base Stations (BSs) 270, Base Station Controllers (BSCs) 275, and a Mobile Switching Center (MSC) 280. The MSC280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC280 is also configured to interface with a BSC275, which may be coupled to the base station 270 via a backhaul. The backhaul may be constructed according to any of several known interfaces including, for example, E1/T1, ATM, IP, PPP, frame Relay, HDSL, ADSL, or xDSL. It will be understood that a system as shown in fig. 2 may include multiple BSCs 275.
Each BS270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz,5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each sector of a particular BS270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT)295 transmits a broadcast signal to the mobile terminal 100 operating within the system. In fig. 2, several Global Positioning System (GPS) satellites 300 are shown. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is to be understood that useful positioning information may be obtained with any number of satellites. Other techniques that can track the location of the mobile terminal may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station 270 is processed within the particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC provides call resource allocation and mobility management functions including coordination of soft handoff procedures between BSs 270. The BSCs 275 also route the received data to the MSC280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC280, the MSC interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS270 to transmit forward link signals to the mobile terminal 100.
Based on the above mobile terminal hardware structure and communication system, various embodiments of the present invention are proposed.
The invention provides a safety certification device for information synchronization.
Referring to fig. 3, fig. 3 is a block diagram of a security authentication device for information synchronization according to a first embodiment of the present invention. The device comprises:
the first judging module 10 is configured to judge whether an application is a preset security application when the mobile terminal detects an information synchronization request of the application;
the mobile terminal in this embodiment includes a smart phone, a tablet computer, and the like, and the smart phone is taken as an example for description. The mobile phone information synchronization means that a user writes local information of a mobile phone into a cloud server, a computer, an SD card or other terminals by means of related applications to achieve data synchronization, so as to achieve the purpose of data backup or sharing, wherein the mobile phone information to be synchronized comprises mobile phone contacts, short messages, documents, mails, pictures, videos, audios, mobile phone geographic positions and the like, and the corresponding information synchronization request comprises a backup request, a sharing request, a data synchronization request and the like.
Taking a mobile phone backup as an example, the application scenario of this embodiment may be: the user uses the backup application to backup the mobile phone information such as contacts, short messages and the like at a certain moment, the user triggers a backup instruction to enable the application to send out an information synchronization request, namely, a backup request, and the mobile terminal starts a safety authentication function when detecting the backup request of the backup application.
First, the first determining module 10 determines whether an application sending an information synchronization request is a preset security application, as an implementation manner, a user may set some applications installed in the mobile terminal as trusted applications in advance, that is, security applications, for example, applications preset by a system when the mobile phone leaves a factory may be set as security applications, such as WeChat, Paibao, Google boot guide, and the like, and the applications have passed security detection when leaving the factory, so that the security coefficient is high.
If the first judging module 10 judges that the application sending the information synchronization request is the preset security application, the mobile terminal can use the application as a trusted application and allow the application to read subsequent mobile phone information by default.
A detecting module 20, configured to detect whether the application sends an authentication request message if the application is not a preset security application;
if the first determining module 10 determines that the application sending the information synchronization request is not a predetermined security application, such as a third-party software installed by a user through self-downloading, the detecting module 20 detects whether the application sends the authentication request information.
As an embodiment, the detecting module 20 is further configured to: detecting whether the mobile terminal pops up a dialog box of the authentication request information of the application; if not, the application is judged not to send the authentication request information.
For a type of legal application, before reading information such as mobile phone contacts, short messages and the like, the mobile terminal generally pops up a dialog box of application authentication request information so that a user can perform security authentication and authorization on the application. In this embodiment, the detecting module 20 records a dialog box of the authentication request message of whether the mobile terminal pops up the application.
If the mobile terminal pops up a dialog box of the authentication request information of the application, it can be determined that the application has sent the authentication request information, referring to fig. 4, fig. 4 is a display interface schematic diagram of a dialog box of the mobile terminal popping up the authentication request information of the application according to the present invention, and "is the application requesting to read information such as a mobile phone contact, a short message, and please confirm whether to authorize? "the user may now authorize the application or abort the authorization, etc., as indicated by the dialog box.
A display module 30, configured to display an authentication interface if the application does not send authentication request information;
for a malicious application, the authentication request information is not sent out, and the personal information of the user is directly stolen by special means (such as Trojan horse). In this embodiment, if the application does not send the authentication request message, it indicates that the application is most likely to be a malicious application, and at this time, the display module 30 displays an authentication interface.
Specifically, if the detecting module 20 detects that the mobile terminal does not pop up the dialog box of the authentication request information of the application, it is determined that the application does not send the authentication request information, and at this time, the display module 30 displays the authentication interface. Referring to fig. 5, fig. 5 is a schematic diagram showing an authentication interface of a mobile terminal according to the present invention, because an application does not send authentication request information, the application is most likely to be a malicious application, and in order to achieve an alert function, a dialog box of the authentication interface of the mobile terminal may display "is the application requesting to read information such as contacts and short messages of a mobile phone, but the application is detected to be untrusted, and if authorization may cause leakage or loss of personal information of a user? "the user can authorize the application or give up authorization based on the prompt.
And the authentication module 40 is used for receiving an authentication instruction triggered by the user based on the authentication interface and performing security authentication on the application according to the authentication instruction.
The authentication module 40 receives an authentication instruction triggered by a user based on the displayed authentication interface, and performs security authentication on the application sending the information synchronization request according to the authentication instruction.
Specifically, with continued reference to fig. 5, if the user selects "ok" based on the authentication interface of fig. 5, the authentication module 40 authorizes the application that issued the information synchronization request accordingly according to the instruction, and if the user selects "cancel" based on the authentication interface of fig. 5, the authentication module 40 does not authorize the application that issued the information synchronization request according to the instruction, so that the application cannot read the personal information of the user, and the related backup or synchronization process is terminated accordingly.
In this embodiment, when the mobile terminal detects an information synchronization request of an application, the first determining module 10 determines whether the application is a preset security application; if the application is not a preset security application, the detection module 20 detects whether the application sends an authentication request message; if the application does not send the authentication request information, the display module 30 displays an authentication interface; and the authentication module 40 receives an authentication instruction triggered by the user based on the authentication interface, and performs security authentication on the application according to the authentication instruction. Through the mode, the mobile terminal actively displays the authentication interface to request the user to perform security authentication on the application when the application does not send the authentication request information, so that the security authentication is performed from the source authorized by the user privacy information, the risk of leakage of the user privacy information is reduced, and the information synchronization security of the mobile terminal is improved.
Further, based on the embodiment shown in fig. 3, the authentication module 40 is further configured to receive an authentication password or an authentication fingerprint input by a user based on the authentication interface, and perform security authentication on the application according to the authentication password or the authentication fingerprint.
Referring to fig. 6, fig. 6 is a schematic view illustrating another authentication interface of the mobile terminal according to the present invention. In this embodiment, since the mobile terminal may not be the owner, for example, the mobile phone of the user is stolen by an illegal person and attempts to acquire the privacy information on the mobile phone of the user, when the display module 30 displays the authentication interface, the display module may display a password input box or a fingerprint input box and acquire the password or the fingerprint input by the user based on the displayed password input box or fingerprint input box, the authentication module 40 matches the acquired password or fingerprint with the preset password or fingerprint, if the matching is successful, it is determined that the current application passes the security authentication, and the application is allowed to read the corresponding user information, and if the matching is failed, it is determined that the current application does not pass the security authentication, and at this time, the application is prohibited from reading the corresponding user information.
According to the embodiment, through password authentication or fingerprint authentication, a non-owner can be prevented from randomly reading the user privacy information through related applications, and the information synchronization safety of the mobile terminal is further improved.
Further, referring to fig. 7, fig. 7 is a block diagram illustrating a security authentication device for information synchronization according to a second embodiment of the present invention. Based on the embodiment shown in fig. 3, the apparatus may further include:
a forbidding module 50, configured to forbid the application from reading the request data corresponding to the information synchronization request and encrypting the request data corresponding to the information synchronization request if the application fails to pass the security authentication;
a marking module 60, configured to allow the application to read request data corresponding to the information synchronization request if the application passes the security authentication, and mark the application as an application that has passed the security authentication.
In this embodiment, if the application sending the information synchronization request is not a preset security application, and does not pass the security authentication, the prohibition module 50 prohibits the application from reading the request data corresponding to the information synchronization request, and encrypts the request data corresponding to the information synchronization request.
Specifically, when the mobile terminal performs password authentication or fingerprint authentication, if it is detected that the number of times of continuous password input or fingerprint error of the user reaches a preset number, the mobile terminal is likely to be stolen, and at this time, the prohibition module 50 may encrypt the request data corresponding to the information synchronization request while determining that the current application fails to pass the security authentication and prohibiting the application from reading the request data corresponding to the information synchronization request, where a specific encryption manner may refer to the prior art, and is not limited herein. For example, if the application requests to read information such as a contact person and a short message, the mobile terminal encrypts the information such as the contact person and the short message, so that the information such as the contact person and the short message cannot be viewed on the mobile terminal by the illegal share, and even if the information such as the contact person and the short message on the mobile terminal is transferred to another mobile terminal by other means (such as detaching the SD card), the information such as the contact person and the short message cannot be viewed.
If the mobile terminal detects that the password or fingerprint input by the user is correct, the current application is determined to pass the security authentication, and at this time, the marking module 60 allows the application to read the request data corresponding to the information synchronization request of the application, and marks the application as the application which passes the security authentication. Therefore, when the application sends the same information synchronization request again, the application can be regarded as the safe application by default, so that the user does not need to perform safe authentication on the application again, and the user operation is simplified.
Further, referring to fig. 8, fig. 8 is a block diagram illustrating a security authentication device for information synchronization according to a third embodiment of the present invention. Based on the above embodiment, the apparatus may further include:
a second judging module 70, configured to judge whether the application is a marked application that has passed the security authentication;
an allowing module 80, configured to allow the application to read request data corresponding to the information synchronization request if the application is a marked application that has passed security authentication;
the detecting module 20 is further configured to detect whether the application sends an authentication request message if the application is not a marked application that has passed the security authentication.
Specifically, for an application sending an information synchronization request, the first determining module 10 first determines whether the application is a preset security application, if the application is not the preset security application, the second determining module 70 determines whether the application is a marked application that has passed the security authentication, if the application is not the application that has passed the security authentication, the mobile terminal starts a subsequent authentication function to perform the security authentication on the application, and if the application is the application that has passed the security authentication, the allowing module 80 directly performs the related authorization on the application and allows the application to read the request data corresponding to the information synchronization request.
When the application that has passed the security authentication is marked, the marking may be performed automatically by the system or manually by the user. In order to reduce the risk of revealing the privacy information of the user when the mobile terminal is stolen, the user does not mark any application, so that the system can carry out safety certification on the application when the application sends out an information synchronization request every time, and the user can flexibly set the information when the system is implemented specifically.
The invention also provides a safety authentication method for information synchronization.
Referring to fig. 9, fig. 9 is a flowchart illustrating a first embodiment of the information synchronization security authentication method according to the present invention. The method comprises the following steps:
step S10, when the mobile terminal detects the information synchronization request of the application, judging whether the application is a preset safety application;
the mobile terminal in this embodiment includes a smart phone, a tablet computer, and the like, and the smart phone is taken as an example for description. The mobile phone information synchronization means that a user writes local information of a mobile phone into a cloud server, a computer, an SD card or other terminals by means of related applications to achieve data synchronization, so as to achieve the purpose of data backup or sharing, wherein the mobile phone information to be synchronized comprises mobile phone contacts, short messages, documents, mails, pictures, videos, audios, mobile phone geographic positions and the like, and the corresponding information synchronization request comprises a backup request, a sharing request, a data synchronization request and the like.
Taking a mobile phone backup as an example, the application scenario of this embodiment may be: the user uses the backup application to backup the mobile phone information such as contacts, short messages and the like at a certain moment, the user triggers a backup instruction to enable the application to send out an information synchronization request, namely, a backup request, and the mobile terminal starts a safety authentication function when detecting the backup request of the backup application.
Firstly, the mobile terminal determines whether an application sending an information synchronization request is a preset security application, as an implementation manner, a user may set some applications installed in the mobile terminal as trusted applications in advance, that is, security applications, for example, applications preset by a system when the mobile phone leaves a factory may be set as security applications, such as WeChat, Paibao, Google boot guide, and the like, and the applications have passed security detection when leaving the factory, so that the security coefficient is high.
If the mobile terminal judges that the application sending the information synchronization request is the preset safety application, the application can be used as a trusted application, and the application is allowed to read the subsequent mobile phone information by default.
Step S20, if the application is not the preset safety application, detecting whether the application sends out the authentication request information;
if the mobile terminal determines that the application sending the information synchronization request is not a preset security application, such as third-party software installed by a user through self-downloading, the mobile terminal detects whether the application sends authentication request information.
As an embodiment, the step S20 may include:
step S21, detecting whether the mobile terminal pops up the dialog box of the authentication request information of the application;
step S22, if the mobile terminal does not pop up the dialog box of the authentication request information of the application, it is determined that the application does not send the authentication request information.
For a type of legal application, before reading information such as mobile phone contacts, short messages and the like, the mobile terminal generally pops up a dialog box of application authentication request information so that a user can perform security authentication and authorization on the application. In this embodiment, the system records a dialog box of authentication request information whether the mobile terminal pops up an application.
If the mobile terminal pops up a dialog box of the authentication request information of the application, it can be determined that the application has sent the authentication request information, referring to fig. 4, fig. 4 is a display interface schematic diagram of a dialog box of the mobile terminal popping up the authentication request information of the application according to the present invention, and "is the application requesting to read information such as a mobile phone contact, a short message, and please confirm whether to authorize? "the user may now authorize the application or abort the authorization, etc., as indicated by the dialog box.
Step S30, if the application does not send the authentication request information, displaying an authentication interface;
for a malicious application, the authentication request information is not sent out, and the personal information of the user is directly stolen by special means (such as Trojan horse). In this embodiment, if the application does not send the authentication request message, it indicates that the application is most likely to be a malicious application, and at this time, the mobile terminal displays an authentication interface.
Specifically, if the mobile terminal does not pop up a dialog box of the authentication request information of the application, it is determined that the application does not issue the authentication request information, and the mobile terminal displays an authentication interface at this time. Referring to fig. 5, fig. 5 is a schematic view of a display interface of an authentication interface of a mobile terminal according to the present invention, since an application does not send authentication request information, the application is most likely to be a malicious application, and in order to achieve an alert function, a dialog box of the authentication interface of the mobile terminal may display "is the application requesting to read information such as contacts and short messages of a mobile phone, but it is detected that the application is not trusted, and if authorization may cause personal information of a user to be leaked or lost, please confirm whether to authorize? "the user can authorize the application or give up authorization based on the prompt.
And step S40, receiving an authentication instruction triggered by the user based on the authentication interface, and performing security authentication on the application according to the authentication instruction.
In the step, the mobile terminal receives an authentication instruction triggered by a user based on a displayed authentication interface, and performs security authentication on the application sending the information synchronization request according to the authentication instruction.
Specifically, with continued reference to fig. 5, if the user selects "ok" based on the authentication interface of fig. 5, the mobile terminal authorizes the application that issued the information synchronization request accordingly according to the instruction, and if the user selects "cancel" based on the authentication interface of fig. 5, the mobile terminal does not authorize the application that issued the information synchronization request according to the instruction, so that the application cannot read the personal information of the user, and the related backup or synchronization process is terminated accordingly.
In this embodiment, when the mobile terminal detects an information synchronization request of an application, it is determined whether the application is a preset security application; if the application is not a preset safety application, detecting whether the application sends authentication request information or not; if the application does not send authentication request information, displaying an authentication interface; and receiving an authentication instruction triggered by a user based on the authentication interface, and performing safety authentication on the application according to the authentication instruction. Through the mode, the mobile terminal actively displays the authentication interface to request the user to perform security authentication on the application when the application does not send the authentication request information, so that the security authentication is performed from the source authorized by the user privacy information, the risk of leakage of the user privacy information is reduced, and the information synchronization security of the mobile terminal is improved.
Further, referring to fig. 10, fig. 10 is a flowchart illustrating a security authentication method for information synchronization according to a second embodiment of the present invention. Based on the above-described embodiment shown in fig. 9, step S40 may include:
and step S41, receiving an authentication password or an authentication fingerprint input by a user based on the authentication interface, and performing security authentication on the application according to the authentication password or the authentication fingerprint.
Referring to fig. 6, fig. 6 is a schematic view of another display interface of the authentication interface of the mobile terminal according to the present invention. In this embodiment, because the mobile terminal may not be the owner, if the mobile terminal is stolen by an unauthorized person and attempts to acquire the privacy information on the mobile terminal, when the mobile terminal displays the authentication interface, the mobile terminal may display a password input box or a fingerprint input box, acquire a password or a fingerprint input by the user based on the displayed password input box or fingerprint input box, match the acquired password or fingerprint with a preset password or fingerprint, if the matching is successful, determine that the current application passes the security authentication, allow the application to read the corresponding user information, if the matching is failed, determine that the current application does not pass the security authentication, and at this time, prohibit the application from reading the corresponding user information.
According to the embodiment, through password authentication or fingerprint authentication, a non-owner can be prevented from randomly reading the user privacy information through related applications, and the information synchronization safety of the mobile terminal is further improved.
Further, referring to fig. 11, fig. 11 is a flowchart illustrating a security authentication method for information synchronization according to a third embodiment of the present invention. Based on the above-mentioned embodiment shown in fig. 10, after step S40, the method may further include:
step S50, if the application fails the security authentication, prohibiting the application from reading the request data corresponding to the information synchronization request, and encrypting the request data corresponding to the information synchronization request;
step S60, if the application passes the security authentication, allowing the application to read the request data corresponding to the information synchronization request, and marking the application as an application that has passed the security authentication.
In this embodiment, if the application sending the information synchronization request is not a preset security application, and does not pass the security authentication, at this time, the mobile terminal prohibits the application from reading the request data corresponding to the information synchronization request, and encrypts the request data corresponding to the information synchronization request.
Specifically, when the mobile terminal performs password authentication or fingerprint authentication, if it is detected that the number of times of password or fingerprint error continuously input by the user reaches a preset number of times, the mobile terminal is likely to be stolen, and at this time, the mobile terminal may encrypt the request data corresponding to the information synchronization request while determining that the current application fails to pass the security authentication and prohibiting the application from reading the request data corresponding to the information synchronization request, where a specific encryption manner may refer to the prior art, and is not limited herein. For example, if the application requests to read information such as a contact person and a short message, the mobile terminal encrypts the information such as the contact person and the short message, so that the information such as the contact person and the short message cannot be viewed on the mobile terminal by the illegal share, and even if the information such as the contact person and the short message on the mobile terminal is transferred to another mobile terminal by other means (such as detaching the SD card), the information such as the contact person and the short message cannot be viewed.
If the mobile terminal detects that the password or the fingerprint input by the user is correct, the current application is judged to pass the security authentication, at the moment, the mobile terminal allows the application to read the request data corresponding to the information synchronization request, and simultaneously marks the application as the application passing the security authentication. Therefore, when the application sends the same information synchronization request again, the application can be regarded as the safe application by default, so that the user does not need to perform safe authentication on the application again, and the user operation is simplified.
Further, with reference to fig. 11, before the step of detecting whether the application issues the authentication request message, the method may further include:
judging whether the application is marked application which passes the safety certification; if so, allowing the application to read the request data corresponding to the information synchronization request; if not, executing the following steps: and detecting whether the application sends authentication request information.
Specifically, for an application sending an information synchronization request, the mobile terminal first determines whether the application is a preset security application, if the application is not the preset security application, the mobile terminal determines whether the application is a marked application that has passed the security authentication, if the application is not the application that has passed the security authentication, the mobile terminal then enables a subsequent authentication function to perform the security authentication on the application, and if the application is the application that has passed the security authentication, the mobile terminal can directly perform related authorization on the application and allow the application to read request data corresponding to the information synchronization request.
When the application that has passed the security authentication is marked, the marking may be performed automatically by the system or manually by the user. In order to reduce the risk of revealing the privacy information of the user when the mobile terminal is stolen, the user does not mark any application, so that the system can carry out safety certification on the application when the application sends out an information synchronization request every time, and the user can flexibly set the information when the system is implemented specifically.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. An information-synchronized security authentication apparatus, the apparatus comprising:
the mobile terminal comprises a first judgment module and a second judgment module, wherein the first judgment module is used for judging whether the application is a preset safety application or not when the mobile terminal detects an information synchronization request of the application;
the detection module is used for detecting whether the application sends authentication request information or not if the application is not a preset safety application;
the display module is used for displaying an authentication interface if the application does not send the authentication request information;
the authentication module is used for receiving an authentication instruction triggered by a user based on the authentication interface and carrying out safety authentication on the application according to the authentication instruction;
wherein, the device still includes:
the second judgment module is used for judging whether the application is a marked application which passes the security authentication;
the permission module is used for allowing the application to read the request data corresponding to the information synchronization request if the application is marked as the application which passes the security authentication;
the detection module is further used for detecting whether the application sends out authentication request information or not if the application is not the marked application which passes the security authentication.
2. The apparatus of claim 1, wherein the detection module is further configured to:
detecting whether the mobile terminal pops up a dialog box of the authentication request information of the application;
if not, the application is judged not to send the authentication request information.
3. The apparatus of claim 2, wherein the authentication module is further configured to receive an authentication password or an authentication fingerprint input by a user based on the authentication interface, and perform secure authentication on the application according to the authentication password or the authentication fingerprint.
4. The apparatus of claim 3, wherein the apparatus further comprises:
the forbidding module is used for forbidding the application to read the request data corresponding to the information synchronization request and encrypting the request data corresponding to the information synchronization request if the application fails the security authentication;
and the marking module is used for allowing the application to read the request data corresponding to the information synchronization request if the application passes the security authentication, and marking the application as the application which passes the security authentication.
5. A safety authentication method for information synchronization is characterized by comprising the following steps:
when the mobile terminal detects an information synchronization request of an application, judging whether the application is a preset safety application;
if the application is not a preset safety application, detecting whether the application sends authentication request information or not;
if the application does not send authentication request information, displaying an authentication interface;
receiving an authentication instruction triggered by a user based on the authentication interface, and performing security authentication on the application according to the authentication instruction;
wherein, the method further comprises:
judging whether the application is marked application which passes the safety certification;
if so, allowing the application to read the request data corresponding to the information synchronization request;
if not, executing the following steps: and detecting whether the application sends authentication request information.
6. The method of claim 5, wherein the detecting whether the application issues the authentication request message comprises:
detecting whether the mobile terminal pops up a dialog box of the authentication request information of the application;
if not, the application is judged not to send the authentication request information.
7. The method of claim 6, wherein the step of receiving an authentication instruction triggered by a user based on the authentication interface, and performing secure authentication on the application according to the authentication instruction comprises:
and receiving an authentication password or an authentication fingerprint input by a user based on the authentication interface, and performing security authentication on the application according to the authentication password or the authentication fingerprint.
8. The method of claim 7, wherein the method further comprises:
if the application fails the security authentication, prohibiting the application from reading the request data corresponding to the information synchronization request, and encrypting the request data corresponding to the information synchronization request;
and if the application passes the security authentication, allowing the application to read the request data corresponding to the information synchronization request, and marking the application as the application passing the security authentication.
CN201710286553.1A 2017-04-25 2017-04-25 Information synchronization security authentication device and method Active CN107071769B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202010410113.4A CN111542061B (en) 2017-04-25 2017-04-25 Information synchronization security authentication method
CN202010410110.0A CN111542060B (en) 2017-04-25 2017-04-25 Working method of information synchronous safety authentication device
CN201710286553.1A CN107071769B (en) 2017-04-25 2017-04-25 Information synchronization security authentication device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710286553.1A CN107071769B (en) 2017-04-25 2017-04-25 Information synchronization security authentication device and method

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202010410110.0A Division CN111542060B (en) 2017-04-25 2017-04-25 Working method of information synchronous safety authentication device
CN202010410113.4A Division CN111542061B (en) 2017-04-25 2017-04-25 Information synchronization security authentication method

Publications (2)

Publication Number Publication Date
CN107071769A CN107071769A (en) 2017-08-18
CN107071769B true CN107071769B (en) 2020-10-27

Family

ID=59605095

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202010410110.0A Active CN111542060B (en) 2017-04-25 2017-04-25 Working method of information synchronous safety authentication device
CN202010410113.4A Active CN111542061B (en) 2017-04-25 2017-04-25 Information synchronization security authentication method
CN201710286553.1A Active CN107071769B (en) 2017-04-25 2017-04-25 Information synchronization security authentication device and method

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN202010410110.0A Active CN111542060B (en) 2017-04-25 2017-04-25 Working method of information synchronous safety authentication device
CN202010410113.4A Active CN111542061B (en) 2017-04-25 2017-04-25 Information synchronization security authentication method

Country Status (1)

Country Link
CN (3) CN111542060B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340398A (en) * 2010-07-27 2012-02-01 中国移动通信有限公司 Security policy setting and determining method, and method and device for executing operation by application program
CN104239804A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 Data protecting method and device
CN104683336A (en) * 2015-02-12 2015-06-03 中国科学院信息工程研究所 Security-region-based method and system for protecting Android private data

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7827602B2 (en) * 2003-06-30 2010-11-02 At&T Intellectual Property I, L.P. Network firewall host application identification and authentication
CN102073598A (en) * 2010-12-28 2011-05-25 北京深思洛克软件技术股份有限公司 Method and device for protecting disc data security
CN102880820B (en) * 2012-08-14 2017-11-17 东莞宇龙通信科技有限公司 A kind of application program for mobile terminal access method and mobile terminal
CN103347116A (en) * 2012-11-09 2013-10-09 北京深思洛克软件技术股份有限公司 System and method for setting multi-security modes in smart phone
CN104951677B (en) * 2014-03-25 2021-01-15 联想(北京)有限公司 Information processing method and device
CN105207775B (en) * 2014-05-30 2019-03-01 北京奇虎科技有限公司 The read method and device of verification information
CN104392176A (en) * 2014-12-12 2015-03-04 北京奇虎科技有限公司 Mobile terminal and method for intercepting device manager authority thereof
CN104793929B (en) * 2015-02-15 2019-08-16 努比亚技术有限公司 Application interface shows the customizing method and device of information
CN104951715A (en) * 2015-06-11 2015-09-30 联想(北京)有限公司 Information processing method and electronic equipment
CN106341369A (en) * 2015-07-06 2017-01-18 深圳市中兴微电子技术有限公司 Security control method and device
US9826083B2 (en) * 2015-09-29 2017-11-21 Google Inc. Automatic delegation control for device sharing
CN106022101B (en) * 2016-05-17 2019-12-06 Oppo广东移动通信有限公司 application management method and terminal
CN106529270B (en) * 2016-09-22 2020-04-07 南京酷派软件技术有限公司 Application program authorization method and device
CN106529275A (en) * 2016-09-30 2017-03-22 维沃移动通信有限公司 A method for application program operating mode switching and a mobile terminal
CN106572266A (en) * 2016-11-16 2017-04-19 努比亚技术有限公司 Display processing method, device and terminal
CN106507334A (en) * 2016-12-30 2017-03-15 维沃移动通信有限公司 A kind of identity identifying method and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340398A (en) * 2010-07-27 2012-02-01 中国移动通信有限公司 Security policy setting and determining method, and method and device for executing operation by application program
CN104239804A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 Data protecting method and device
CN104683336A (en) * 2015-02-12 2015-06-03 中国科学院信息工程研究所 Security-region-based method and system for protecting Android private data

Also Published As

Publication number Publication date
CN111542060A (en) 2020-08-14
CN111542061A (en) 2020-08-14
CN111542060B (en) 2023-12-19
CN111542061B (en) 2023-07-18
CN107071769A (en) 2017-08-18

Similar Documents

Publication Publication Date Title
CN104902463B (en) Mobile terminal, multi-card management method of virtual card terminal of mobile terminal and server
US9344882B2 (en) Apparatus and methods for preventing information disclosure
CN106027804B (en) Unlocking method and unlocking device of mobile terminal
CN105208011B (en) A kind of verifying system and method
CN105740008B (en) Device and method for forbidding chained start of application program
CN104636030B (en) Method and device for starting application programs and mobile terminal
CN104932697B (en) Gesture unlocking method and device
CN106250734A (en) Double screen terminal and unlocking screen verification method
CN106778176B (en) Information processing method and mobile terminal
CN105898703B (en) Management method and device for identified pseudo base station
WO2016188319A1 (en) Virtual sim card information management method, apparatus and mobile terminal
CN105096107B (en) Method and system for carrying out safe transfer through fingerprint identification
CN106534560B (en) Mobile terminal control device and method
WO2017201896A1 (en) Method and apparatus for secure storage of password of mobile terminal
CN104618382B (en) A kind of method and device realizing the seamless access of information
CN105282155B (en) Authority control method, device and system for interaction between terminals
CN107133508B (en) Application management method and mobile terminal
CN106484534B (en) Control method and control device for displayed mobile terminal
WO2016015643A1 (en) Call encryption method, communication terminal, base station and computer storage medium
CN106507343A (en) A kind of information processing method, mobile terminal and server
CN106682897B (en) Device and method for determining NFC payment
US9854444B2 (en) Apparatus and methods for preventing information disclosure
CN106412877B (en) Activation method and activation device for mobile terminal SIM card
CN105740728B (en) Mobile terminal, data encryption or decryption method
CN106846562B (en) Verification device and method for sending verification information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200514

Address after: 518057 Room 601, floor 6, block a, Han nationality innovation building, No. 9018, Beihuan Avenue, high tech Zone, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Wu Hongping

Address before: 518057 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor

Applicant before: NUBIA TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200928

Address after: Yangpu District State Road 200433 Shanghai City No. 233 building 304 room 3

Applicant after: SHANGHAI YINGLIAN TELECOM TECHNOLOGY Co.,Ltd.

Address before: 518057 Room 601, floor 6, block a, Han nationality innovation building, No. 9018, Beihuan Avenue, high tech Zone, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Wu Hongping

GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 200433 room 304, 3rd floor, 233 Guoding East Road, Yangpu District, Shanghai

Patentee after: Shanghai Yinglian Intelligent Technology Co.,Ltd.

Address before: 200433 room 304, 3rd floor, 233 Guoding East Road, Yangpu District, Shanghai

Patentee before: SHANGHAI YINGLIAN TELECOM TECHNOLOGY CO.,LTD.