CN107180201A - The creation method and device of private space - Google Patents

The creation method and device of private space Download PDF

Info

Publication number
CN107180201A
CN107180201A CN201710278566.4A CN201710278566A CN107180201A CN 107180201 A CN107180201 A CN 107180201A CN 201710278566 A CN201710278566 A CN 201710278566A CN 107180201 A CN107180201 A CN 107180201A
Authority
CN
China
Prior art keywords
private space
space
private
key
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710278566.4A
Other languages
Chinese (zh)
Inventor
程灏
陆洋
江宏魁
杨丽娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yude Technology Co Ltd
Original Assignee
Shanghai Yude Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yude Technology Co Ltd filed Critical Shanghai Yude Technology Co Ltd
Priority to CN201710278566.4A priority Critical patent/CN107180201A/en
Publication of CN107180201A publication Critical patent/CN107180201A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present embodiments relate to communication technique field, the creation method and device of a kind of private space are disclosed.The creation method of private space is applied to terminal, and it includes:When choosing operation of entrance is created to private space detecting user, the space of default size is divided from the read-only storage of terminal as private space, and generate the key for accessing private space;Wherein, key packet contains the public key for unlocking private space and the private key for verification public key;According to predetermined manner, public key is informed into user.The creation method and device of private space provided in an embodiment of the present invention, by the private space for creating special storage privacy information and vital document, and by being hidden to private space, so that effective guarantee user is stored in the security of privacy information and vital document in terminal.

Description

The creation method and device of private space
Technical field
The present embodiments relate to the creation method and device of communication technique field, more particularly to private space.
Background technology
With the development of mobile terminal, the mobile terminal such as mobile phone, tablet personal computer have become life in, work in can not or Scarce instrument.Become stronger day by day with the function of mobile terminal, its adjoint information content also increasingly increases comprising being related to makes The information and capsule information of user's privacy are also more and more, for the privacy information and the safety of capsule information being stored in terminal Sex chromosome mosaicism turns into the problem that people are extremely concerned about and paid attention to instantly.
At present, in order to ensure the securities of storage privacy information and capsule information on the mobile terminal device, generally pass through It is encrypted to deposit the application program or file that have privacy information and capsule information, the mode that locks ensures not obtained by other people Privacy information and capsule information are taken, needs to input password ability when user launches application or opening vital document Into so as to access the privacy information and vital document stored in terminal between avoiding unauthorized user.
But inventor has found there are problems that in the prior art:It is adopted as application program and file encryption, locks Mode, although reach the safety for ensureing the privacy information that is stored in terminal of user and capsule information, but individual can only be ensured Use, if household, colleague, friend want interim to be operated and entertained using mobile phone, it is necessary to inform user's password, this When user can face and the awkward condition do not said.Also, due to the encryption to application program and vital document progress, locking side Formula, generally uses conventional cipher mode (cipher mode such as numeral, image), and its password set is usually to have mark to follow , other people can by way of continuously attempting to decryption, which adds risk, can equally be brought safety to user it is hidden Suffer from.
The content of the invention
The purpose of embodiment of the present invention is the creation method and device for providing a kind of private space, special by creating The private space of privacy information and vital document is stored, and by being hidden to private space, so that effective guarantee user deposits The privacy information and the security of vital document being stored in terminal.
In order to solve the above technical problems, embodiments of the present invention provide a kind of creation method of private space, application In terminal.The creation method of the private space includes:When choosing operation of entrance is created to private space detecting user, from The space of default size is divided in the read-only storage of terminal as private space, and generates the key for accessing private space;Wherein, Key packet contains the public key for unlocking private space and the private key for verification public key;According to predetermined manner, public key is informed into use Family;Wherein, the data of private space are individually managed, and when calculating the remaining space of read-only storage, private space is calculated Within free space;When the remaining space of read-only storage is not enough, the data stored in private space are removed, and discharge privacy The space of space hold.
Embodiments of the present invention, which additionally provide a kind of creating device of private space, to be included:Display module, the first detection Module, memory management module, generation module and notification module;Display module is used to show that private space creates entrance;First inspection Surveying module is used to detect that the private space that display module is shown creates whether entrance is chosen by user, and is detecting user to hidden Private space creates when choosing operation of entrance, and triggering memory management module divides the sky of default size from the read-only storage of terminal Between be used as private space;Generation module is used for the space for dividing default size from the read-only storage of terminal in memory management module After private space, generation accesses the key of private space;Wherein, the key packet of generation module generation, which contains, is used to unlock privacy The public key in space and the private key for verification public key;Notification module is used for according to predetermined manner, the key that generation module is generated In public key inform user;Wherein, the data for the private space that memory management module is divided individually are managed, and read-only calculating During the remaining space of storage, private space is calculated within free space;When the remaining space of read-only storage is not enough, remove The data stored in private space, and discharge the space of private space occupancy.
Embodiment of the present invention in terms of existing technologies, by creating the private space that data are individually managed, and is The private space of establishment is distributed for unlocking the key into the private space, in the public key verifications success of unblock, just may be used To enter private space, the data stored in private space are accessed, so as to ensure that the security of private data and vital document. In addition, by setting the private space created to be present in the form of hiding in the read-only storage of terminal, that is, calculating read-only deposit During the remaining space of storage, private space is calculated within free space, and when the remaining space of read-only storage is not enough, led to The data directly removed and stored in private space, the space that release private space takes are crossed, so that avoiding other people passes through malice Read-only memory space is occupied to terminal storage data, the read-only storage real surplus space of present terminal is known, finally knows end There is private space in end, further ensured the security of the private data being stored in terminal and vital document.
In addition, according to predetermined manner, public key is informed after user, the creation method of private space also includes:Utilize private The data of the corresponding private space of key are encrypted key;Private key includes:Verification portion, encryption part and storage part;Its In, verification portion is the data in the precalculated position extracted from public key;When encryption unit is divided into the key of generation access private space, The data of the predetermined figure of system distribution;Storage part is divided into physical address of the private space in read-only storage.By using pre- If the private key of form, the data of private space corresponding to the key are encrypted so that be stored in the data of private space i.e. Make after being exported, also can not crack and check, so as to further ensure the security for the data being stored in private space.
In addition, according to predetermined manner, public key is informed after user, the creation method of private space also includes:There is provided public Key gives entrance for change;Detect user public key is given for change entrance there is provided account inputting interface when choosing operation;User is obtained to exist The account of account inputting interface input;Detect public key of the account with prestoring give for change account it is consistent when, will according to predetermined manner Public key informs user again.Give entrance for change by providing public key, checking touch input public key give for change account with it is default always When, the public key for unlocking the private space is informed into user again, so as to be created first in user, founder does not know the public affairs in time Key or in the case of forgetting public key, still can give public key for change, open private space, check that oneself is stored in private space Information.
In addition, detect user private space is created entrance choose operation after, from the read-only storage of terminal Before the space for presetting size is divided as privacy sky, the creation method of private space also includes:Detect in read-only storage whether There is untapped private space;Wherein, untapped private space is that no accessed or data storage is in preset time Empty private space;When there is untapped private space in detecting read-only storage, untapped private space is reclaimed, and Destroy the key for accessing private space.User create private space when, in the read-only storage by detecting present terminal whether There is untapped private space, and according to testing result, interior to long-time is empty privacy without accessed or data storage Key is reclaimed and destroyed in space, so that the read-only storage for avoiding terminal is taken by unreasonable, has ensured the normal of terminal Use.
In addition, predetermined manner includes following any one or any combination:Public key is shown in the display interface of terminal, with short The phone number that the phone number that letter mode is inputted to user issues public key, inputted in voice call mode to user issues public affairs Key.By with above-mentioned any or any combination predetermined manner, the public key for unlocking private space being informed into user, not only enriched User's selection, has also ensured the security that public key is issued.
In addition, the digit of public key is more than the digit of non-private space unlocking pin;Wherein, the first place of public key is predetermined ginseng Number, the digit of non-private space unlocking pin is fixed value.By the digit for the unlocking pin for limiting non-private space, and set The public key digit for unlocking private space is more than the unlocking pin of non-private space, so that when user inputs password, terminal can be with The first data of password are inputted according to user and the digit of input password quickly determines that current password is the public affairs of unblock private space Key still unlocks the unlocking pin of non-private space, so as to unlock corresponding space according to password so that user can be according to close Code accesses the corresponding data being stored in terminal.
Brief description of the drawings
One or more embodiments are illustrative by the picture in corresponding accompanying drawing, these exemplary theorys The element with same reference numbers label is expressed as similar element in the bright restriction not constituted to embodiment, accompanying drawing, removes Composition is not limited the non-figure having in special statement, accompanying drawing.
Fig. 1 is the flow chart of the creation method of the private space of first embodiment of the invention;
Fig. 2 is the flow chart of the creation method of the private space of second embodiment of the invention;
Fig. 3 is the flow chart of the creation method of the private space of third embodiment of the invention;
Fig. 4 is the flow chart of the creation method of the private space of four embodiment of the invention;
Fig. 5 is the structured flowchart of the creating device of the private space of fifth embodiment of the invention;
Fig. 6 is the structured flowchart of the creating device of the private space of sixth embodiment of the invention;
Fig. 7 is the structured flowchart of the creating device of the private space of seventh embodiment of the invention;
Fig. 8 is the structured flowchart of the creating device of the private space of eighth embodiment of the invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with each reality of the accompanying drawing to the present invention The mode of applying is explained in detail.However, it will be understood by those skilled in the art that in each embodiment of the invention, In order that reader more fully understands the application and proposes many ins and outs.But, even if without these ins and outs and base Many variations and modification in following embodiment, can also realize the application technical scheme claimed.
The first embodiment of the present invention is related to a kind of creation method of private space, and idiographic flow is as shown in Figure 1.
The creation method of private space shown in Fig. 1 can be used in the user terminal, and wherein the user terminal can be Such as smart mobile phone, tablet personal computer, personal digital assistant etc..Specifically, the creation method of the private space that Fig. 1 is related to Flow can include:
In a step 101, detect whether that user chooses operation to private space establishment entrance.
Specifically, user is being detected to private space when choosing operation of entrance of establishment, into step 102;Otherwise Continue to detect whether that user chooses operation to private space establishment entrance, untill entering step 102.
Such as create and operated into confession user there is provided private space in the setting interface of terminal, when user needs , specifically can be according to practical application by the establishment chosen operation, realize private space to the entrance when creating private space Setting, is not limited herein.
In a step 102, the space for dividing default size is used as private space.
Specifically, the space that default size is divided from the read-only storage of terminal is used as private space.
It should be noted that when choosing operation of entrance is created to private space detecting user, from the read-only of terminal The space of the default size divided in storage, the fixed value that can be set for system, i.e., the private space created every time is all solid Determine size;The value that can also be arranged as required to for user, the size of the private file such as stored as needed creates suitable The private space of size, can specifically select suitable mode to be set, is not limited herein according to the actual requirements.
Such as, needed in user to the relevant information for the designated contact being stored in mobile phone, such as telephone number, therewith Message registration, the short message content of correlation, or during specified file progress secrecy, entrance is created by triggering private space, it would be desirable to Private space of the content storage maintained secrecy to generation.
It is noted that user can use non-private space (general spatial not store privacy number in private space According to the space with significant data) all application programs, the application journey for being specific to this space can also be installed in private space Sequence.
In addition, in order to ensure that the data that user is produced under private space using application program will not be obtained in normal system , the private space created in present embodiment, its data are independent management, that is to say, that user operates hidden in private space The data that all data and user that private application program is produced are produced in application program of the private space using normal system It will be stored in the privately owned internal memory of private space, user can not check this data in normal system.
In addition, it is noted that in the safety of the private space in order to further improve user's establishment, present embodiment Private space is created by using internal memory camouflage mechanism, private space is hidden so as to reach, i.e.,:Created in present embodiment Private space, when calculating the remaining space of read-only storage, private space is calculated within free space.Further, since The space of the private space meeting read-only storage of occupied terminal, the consumption of memory space can expose the presence of private space, therefore, only Read storage remaining space it is not enough when, data stored by removing in private space, and discharge the space of private space occupancy, So as to avoid private space from being exposed.According to this establishment mode so that private space knows that other people are basic except founder It can not know.
Such as, the read-only storage ROM of terminal space is 10G, and the data that user stores in general spatial have made With 3G, after user creates the private space of 1G size, ROM remaining spaces are 6G, now, because 1G spaces are special Different sign, can be calculated within free space, therefore the ROM remaining free space that system is shown remains as 7G.Work as user When writing 6.5G data into ROM in normal system, because the data to be write are more than the remaining available skies of ROM Between, it is now, automatic to remove the data of 0.5G in private space, and discharge the space of the 0.5G, residue used in private space 0.5G can be still calculated within free space.
Limited it should be noted that these are only for example, not constituted to technical scheme.
In actual applications, the remote server that the data timing in private space is synchronized to and specified can also be set, The privacy server of such as special storage private data, so in user's changes terminal, or other people are deposited by malice to terminal Storage data occupy read-only memory space, know the read-only storage real surplus space of present terminal, finally obtaining causes private space When the data of middle storage are eliminated, the founder of private space can be reacquired to private data from privacy server, it is to avoid The loss of user and trouble, specifically can according to actual needs set, not be limited herein.
User uses for convenience, the private space created in the terminal in present embodiment, is not limited to one, user Can be as needed, multiple private spaces are created in the terminal, and multiple private spaces can be used simultaneously, and each privacy is empty Between be individually present, preserve data in the inner and be independent of each other.
In addition, in order to further facilitate user, the user for creating private space using same terminal is also not limited to one, Such as the test machine that company uses, possess each employee of access right and can be created as needed in the test machine and belong to The private space of oneself, can specifically set according to practical application, not be limited herein.
In step 103, generation accesses the key of private space.
Specifically, key packet contains the public key for unlocking private space and the private key for verification public key.
It should be noted that the access private space generated in the security in order to ensure private space, present embodiment Key automatically generated by system, such as by terminal inner Key generating unit generate, or by with terminal set up communicate to connect Remote server generation.
In addition, in actual applications, user uses for convenience, the key for accessing private space can be by user certainly Row setting, so as to facilitate user to remember the public key for unlocking private space, naturally it is also possible to which the entrance for setting public key is only provided, The public key that private key is set according to user is allocated by system, thus further lifted key security, in be used for unlock it is hidden The public key in private space can be by user's sets itself.
On the generating mode for the key for accessing private space, it can specifically be set, do not limited herein according to practical application System.
At step 104, public key is informed into user, terminates the establishment operation of this private space.
Specifically, according to predetermined manner, public key is informed into user.
Can be after key generation, directly to exist it should be noted that public key to be informed to the predetermined manner of user institute foundation The display interface of present terminal shows the public key for unlocking private space, or in order to point out security, can provide one Account sets interface, allows user's input to receive the account of checking information, the phone number of such as founder, mailbox, QQ number code, Wechat number etc., is then handed down to user, and for security, can also set the public affairs for being issued to user account by public key Key information is burn-after-reading attribute, i.e., the information, or auto-destruct in the given time are automatically deleted after user checks, is closed In burn-after-reading or the implementation of timed destroying, those skilled in the art can realize according to prior art, not make herein Specifically repeat.
Compared with prior art, the creation method of the private space provided in present embodiment, it is independent by creating data The private space of management, and distributed for the private space created for unlocking the key into the private space, in unblock During public key verifications success, it can just enter private space, the data stored in private space be accessed, so as to ensure that private data With the security of vital document.In addition, being deposited by setting the private space created to be present in the read-only of terminal in the form of hiding Chu Zhong, i.e., when calculating the remaining space of read-only storage, private space is calculated within free space, and in read-only storage Remaining space it is not enough when, the data stored by directly removing in private space, the space that release private space takes so that Avoid other people and read-only memory space is occupied to terminal storage data by malice, know that the read-only storage of present terminal is actual surplus Complementary space, finally knows there is private space in terminal, has further ensured the private data and important text being stored in terminal The security of part.
Second embodiment of the present invention is related to a kind of creation method of private space.Present embodiment is in the first embodiment party Further improvement is done on the basis of formula, specific improvements are:According to predetermined manner, public key is informed after user, also profit The data of private space are encrypted with private key, idiographic flow is as shown in Figure 2.
In step 201, detect whether that user chooses operation to private space establishment entrance.Detecting user couple Private space creates when choosing operation of entrance, into step 202;Otherwise continue to have detected whether that user creates private space Entrance chooses operation, untill entering step 202.
In step 202., the space for dividing default size is used as private space.
In step 203, generation accesses the key of private space.
It should be noted that terminal can quickly recognize the solution that user inputs when terminal is in the lock state for convenience Lock cipher is to enter non-private space, i.e. general spatial, still enters private space, it will usually will be used to unlock private space public affairs The first place of key is set to preset parameter, such as " 0 ", and in order to avoid unlocking the public key of private space and the solution of unblock general spatial The first parameter of lock cipher is identical, and which space is system can not be recognized quickly into, in present embodiment, defines the position of public key Number is more than the digit of unblock general spatial unlocking pin, and limits the digit of unblock general spatial PUK as fixed value.Separately Outside, in order to ensure that public key has enough securities, it will usually by public key setting be 7 Arabic numerals.
In actual applications, the digit of public key is not limited to 7, is also not limited to Arabic numerals, in order to further Ensure private space and be stored in the securities of data in private space, can be by improving the complexity of public key, such as by public key It is set to be made up of any one in capitalization, lowercase, Arabic numerals, special symbol or any combination, and The first place of public key can also provide authority and be set by user, specifically can according to actual needs select, not be limited herein.
, can also be by when generation accesses the key of private space in addition, the security in order to be further ensured that private space System or user's setting unblock private space allow error number of times and more than after the errors of setting to the guarantor of private space Protect facility.
Such as, when terminal is in the lock state, there is user to input public key, now system travels through private key from private key storehouse Matched with public key, if the private key not matched, " key is not present " is shown in the display interface of terminal, if currently Any key (private space is not present in present terminal) is not present in terminal, similarly " key is not present " is pointed out.Work as user The public key errors number of input exceedes number of times set in advance, and such as 20 times, then system judgement has intrusion behavior, automatically turns on and protects Private space pattern is protected, such as within 24 hours, any public key is inputted and all points out " key is not present ".If the private of matching Key, the then physical address carried by private key finds corresponding private space in the ROM of terminal, reads in private space storage Data storage reason so that do not influence user input unlocking pin on the premise of, it is to avoid unblock private space public key by him People's Brute Force.
In step 204, public key is informed into user.
Specifically, according to predetermined manner, public key is informed into user.
It should be noted that predetermined manner can include following any one or any combination:In the display interface of terminal Display public key, the phone number inputted with short message mode to user issue public key, the hand inputted in voice call mode to user Machine number issues public key, specifically can select suitable mode that public key is informed into user according to practical application, not be limited specifically.
In addition, the security in order to ensure private space, can set the public key for unlocking private space and only create Success private space, generation is accessed after the key of the control, informs user once.
Because step 201 to step 204 and the step 101 in first embodiment are to 104 roughly the same, it is intended to:In inspection Measure user and when choosing operation of entrance is created to private space, the space that default size is divided from the read-only storage of terminal is made For private space, and the key for accessing private space is generated, then according to predetermined manner, public key is informed into user, herein no longer Repeat.
In step 205, the data of private space are encrypted using private key, terminate the establishment behaviour of this private space Make.
It should be noted that being specifically included for the private key that the data to the corresponding private space of key are encrypted:Test Card part, encryption part and storage part.
Wherein, verification portion is the data in the precalculated position extracted from public key, and such as setting is tested from rear 6 conducts of public key Demonstrate,prove part.
Encryption unit be divided into generation access private space key when, system distribution predetermined figure data, such as 4 I Uncle's numeral.
Storage part is divided into physical address of the private space in read-only storage.
Compared with prior art, the creation method of the private space provided in present embodiment, in private space and access After the key of the private space is created successfully, the data of private space are encrypted by using the private key in key, deposited After the data being stored in private space are exported by him by instrument, also it can not crack and check, so as to further ensure user It is stored in the security of data in private space.
Third embodiment of the present invention is related to a kind of creation method of private space.Present embodiment is first or second Further improvement is done on the basis of embodiment, specific improvements are:Entrance is given for change by providing public key, so as to side Just founder knows the public key of the private space again, and idiographic flow is as shown in Figure 3.
In step 301, detect whether that user chooses operation to private space establishment entrance.Detecting user couple Private space creates when choosing operation of entrance, into step 302;Otherwise continue to have detected whether that user creates private space Entrance chooses operation, untill entering step 302.
In step 302, the space for dividing default size is used as private space.
In step 303, generation accesses the key of private space.
In step 304, public key is informed into user.
Because step 301 to step 304 and the step 101 in first embodiment are to 104 roughly the same, it is intended to:In inspection Measure user and when choosing operation of entrance is created to private space, the space that default size is divided from the read-only storage of terminal is made For private space, and the key for accessing private space is generated, then according to predetermined manner, public key is informed into user, herein no longer Repeat.
In step 305 entrance is given for change there is provided public key.
Within step 306, detect whether that what user gave entrance for change to public key chooses operation.
Specifically, when choosing operation of entrance is given for change to public key detecting user, into step 307;Otherwise, directly Terminate the establishment operation of this private space.
There is provided account inputting interface in step 307.
In step 308, the account that user inputs in account inputting interface is obtained.
In a step 309, it is consistent whether the account that detection is obtained with the public key prestored gives account for change.
Specifically, detect public key of the account with prestoring give for change account it is consistent when, into step 310;Otherwise, directly Terminate the establishment operation of this private space.
It should be noted that it can be when private space is created, for input that default public key, which gives account for change, Mailbox number, ID card No., phone number etc., can also be set when creating private space when giving public key for change the problem of, Answer etc., will not enumerate herein, can specifically set according to actual needs.
In addition, in actual applications, in order to avoid knowing that the default public key of private space founder gives other of account for change User, in the case where not obtaining founder's permission, gives entrance for change by public key privately, knows that the unblock of the private space is public Key, so as to check the data of storage in the inner, when private space is created, default public key account account can also be wound The specific biological characteristic for the person of building, such as face feature, biological information, so when giving public key for change, the biology only collected is special Levy and public key is informed into user again with the ability that matches that founder prestores, so that security is further lifted, concrete implementation mode Here is omitted.
Explanation is needed, founder of the user of entrance for current privacy space is given for change in order to ensure to trigger public key, in wound , can be by allowing user to set the information of identity, such as mailbox number, ID card No., cell-phone number when building private space Code etc., the problem of can also being set when creating private space when giving public key for change, answer etc., will not enumerate, has herein Body can be set according to actual needs.
In the step 310, public key is informed into user again, terminates the establishment operation of this private space.
Compared with prior art, the creation method of the private space provided in present embodiment, is given for change by providing public key Entrance, when the user that checking triggers the entrance is the founder of private space, again accuses the public key for unlocking the private space Know user, so as to be created first in user, in the case that founder does not know the public key or forgets public key in time, still can look for Public key is returned, private space is opened, checks the information oneself being stored in private space.
The 4th embodiment of the present invention is related to a kind of creation method of private space.Present embodiment is first or second Further improvement is done on the basis of embodiment, specific improvements are:When user creates private space, by judging to work as It whether there is untapped private space in the read-only storage of preceding terminal, and when being determined with untapped private space, reclaim Untapped private space simultaneously destroys the corresponding key of private space, so that the occupancy to the read-only storage of terminal is reduced, specific stream Journey is as shown in Figure 4.
In step 401, detect whether that user chooses operation to private space establishment entrance.Detecting user couple Private space creates when choosing operation of entrance, into step 402;Otherwise continue to have detected whether that user creates private space Entrance chooses operation, untill entering step 402.
In step 402, it whether there is untapped private space in the read-only storage of detection terminal.
Specifically, when there is untapped private space in detecting read-only storage, into step 403;Otherwise, enter Enter step 404.
It should be noted that to avoid user from creating useless private space repeatedly, creating a new privacy in user empty Between when, by whether there is untapped private space in the read-only storage of searching terminal, without accessed in such as preset time Or data storage is empty private space, if so, then performing step 403, the untapped private space is reclaimed, so as to avoid The waste in space, saves the space of the read-only storage of terminal, while destroying the key for accessing the private space, that is, deletes and is stored in end It is used for the private key for verifying client public key, and related data in end so that corresponding public key failure in user's hand, it is impossible to unlock terminal Present in other private spaces.
In addition, it is noted that setting private space is accessed in the scheduled time is then considered as unused privacy sky Between time setting, the size of data that can specifically have system be stored according to user in private space calculates, and such as data are bigger, The time that can be set is longer, can also be by user's sets itself as needed, or deletes the privacy sky of oneself establishment manually Between.
In step 403, untapped private space is reclaimed, the key for accessing private space is destroyed.
In step 404, the space for dividing default size is used as private space.
In step 405, generation accesses the key of private space.
In a step 406, public key is informed into user.
Because step 403 to step 406 and the step 102 in first embodiment are to 104 roughly the same, it is intended to:From end The space of default size is divided in the read-only storage at end as private space, and generates the key for accessing private space, Ran Hougen According to predetermined manner, public key is informed into user, here is omitted.
Compared with prior art, the creation method of the private space provided in present embodiment, creates privacy empty in user Between when, whether there is untapped private space in the read-only storage by detecting present terminal, and according to testing result, to length There is no accessed or data storage to be reclaimed and destroyed key for empty private space in time, so as to avoid of terminal Read storage to be taken by unreasonable, save the space of the read-only storage of terminal, ensured that the normal of terminal is used.
The step of various methods are divided above, be intended merely to description it is clear, can be merged into when realizing a step or Some steps are split, multiple steps are decomposed into, as long as including identical logical relation, all protection domain in this patent It is interior;To adding inessential modification in algorithm or in flow or introducing inessential design, but its algorithm is not changed Core design with flow is all in the protection domain of the patent.
The 5th embodiment of the present invention is related to a kind of creating device of private space, as shown in Figure 5.
The creating device 500 of private space includes:Display module 501, first detection module 502, memory management module 503rd, generation module 504 and notification module 505.
Specifically, display module 501 is used to show that private space creates entrance.
First detection module 502 is used to detect that the private space that display module 501 is shown creates whether entrance is selected by user In, and when choosing operation of entrance, of the triggering memory management module 503 from terminal are created to private space detecting user The space for reading to divide default size in storage is used as private space.
Generation module 504 is used for the space for dividing default size from the read-only storage of terminal in memory management module 503 After private space, generation accesses the key of private space.
It is used to unlock the public key of private space and for testing it should be noted that the key packet that generation module 504 is generated contains Demonstrate,prove the private key of public key.
Notification module 505 is used for according to predetermined manner, and the public key in the key that generation module 504 is generated informs user.
In addition it is noted that the data for the private space that memory management module 503 is divided are single in present embodiment Solely management, and memory management module 503 is additionally operable to when calculating the remaining space of read-only storage, private space is calculated can Within space;When the remaining space of read-only storage is not enough, the data stored in private space are removed, and discharge private space The space of occupancy.
Compared with prior art, the creating device of the private space provided in present embodiment, it is independent by creating data The private space of management, and distributed for the private space created for unlocking the key into the private space, in unblock During public key verifications success, it can just enter private space, the data stored in private space be accessed, so as to ensure that private data With the security of vital document.In addition, being deposited by setting the private space created to be present in the read-only of terminal in the form of hiding Chu Zhong, i.e., when calculating the remaining space of read-only storage, private space is calculated within free space, and in read-only storage Remaining space it is not enough when, the data stored by directly removing in private space, the space that release private space takes so that Avoid other people and read-only memory space is occupied to terminal storage data by malice, know that the read-only storage of present terminal is actual surplus Complementary space, finally knows there is private space in terminal, has further ensured the private data and important text being stored in terminal The security of part.
It is seen that, present embodiment is the device embodiment corresponding with first embodiment, and present embodiment can be with First embodiment is worked in coordination implementation.The relevant technical details mentioned in first embodiment still have in the present embodiment Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in In first embodiment.
It is noted that each module involved in present embodiment is logic module, and in actual applications, one Individual logic unit can be a part for a physical location or a physical location, can also be with multiple physics lists The combination of member is realized.In addition, will not be with solving institute of the present invention in the innovative part in order to protrude the present invention, present embodiment The technical problem relation of proposition less close unit is introduced, but this be not intended that in present embodiment be not present it is other single Member.
The 6th embodiment of the present invention is related to a kind of privacy protection device.Base of the present embodiment in the 5th embodiment Further improvement is done on plinth, specific improvements are:According to predetermined manner, public key is informed after user, private key is also utilized Data to private space are encrypted.
As shown in fig. 6, the creating device 500 of private space is in addition to including the module shown in Fig. 5, in addition to:Encryption Module 506.The data of the corresponding private space of key are encrypted the private key that encrypting module 506 is used for basis.
It should be noted that being specifically included for the private key that the data to the corresponding private space of key are encrypted:Test Card part, encryption part and storage part.
Wherein, verification portion is the data in the precalculated position extracted from public key, and such as setting is tested from rear 6 conducts of public key Demonstrate,prove part.
Encryption unit be divided into generation access private space key when, system distribution predetermined figure data, such as 4 I Uncle's numeral.
Storage part is divided into physical address of the private space in read-only storage.
It is noted that notification module 505 is according to predetermined manner, the public key in the key that generation module 504 is generated When informing user, according to predetermined manner can include following any one or any combination:Shown in the display interface of terminal Public key, the phone number inputted with short message mode to user issue public key, the cell-phone number inputted in voice call mode to user Code issues public key, specifically can select suitable mode that public key is informed into user according to practical application, not be limited specifically.
In addition, the security in order to ensure private space, can set the public key for unlocking private space and only create Success private space, generation is accessed after the key of the control, informs user once.
Compared with prior art, the creating device of the private space provided in present embodiment, in private space and access After the key of the private space is created successfully, the data of private space are encrypted by using the private key in key, deposited After the data being stored in private space are exported by him by instrument, also it can not crack and check, so as to further ensure user It is stored in the security of data in private space.
Because second embodiment is mutually corresponding with present embodiment, therefore present embodiment can be mutual with second embodiment It is engaged implementation.The relevant technical details mentioned in second embodiment are still effective in the present embodiment, implement second The technique effect that can be reached in mode can similarly be realized in the present embodiment, in order to reduce repetition, no longer be gone to live in the household of one's in-laws on getting married here State.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in second embodiment.
The 7th embodiment of the present invention is related to a kind of privacy protection device.Present embodiment is in the 5th or the 6th embodiment party Further improvement is done on the basis of formula, specific improvements are:Entrance is given for change by providing public key, so as to convenient establishment Person knows the public key of the private space again.
As shown in fig. 7, the creating device 500 of private space is in addition to including the module shown in Fig. 5, in addition to:Second Detection module 507, the detection module 509 of acquisition module 508 and the 3rd.
Specifically, display module 501 is additionally operable to display public key and gives entrance for change.
Second detection module 507 is used to detect that the public key that display module 501 is shown gives whether entrance is chosen by user for change, and When choosing operation of entrance is given for change to public key detecting user, and triggering display module 501 shows account inputting interface.
Acquisition module 508 is used for the account for obtaining the account inputting interface input that user shows in display module 501.
3rd detection module 509 be used for detect acquisition module 508 obtain account whether the public key with prestoring gives account for change Unanimously, and detect public key of the account with prestoring give for change account it is consistent when, trigger notice module 505, will according to predetermined manner Public key informs user again.
Compared with prior art, the creating device of the private space provided in present embodiment, is given for change by providing public key Entrance, when the user that checking triggers the entrance is the founder of private space, again accuses the public key for unlocking the private space Know user, so as to be created first in user, in the case that founder does not know the public key or forgets public key in time, still can look for Public key is returned, private space is opened, checks the information oneself being stored in private space.
Because the 3rd embodiment is mutually corresponding with present embodiment, therefore present embodiment can be mutual with the 3rd embodiment It is engaged implementation.The relevant technical details mentioned in 3rd embodiment are still effective in the present embodiment, implement the 3rd The technique effect that can be reached in mode can similarly be realized in the present embodiment, in order to reduce repetition, no longer be gone to live in the household of one's in-laws on getting married here State.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in the 3rd embodiment.
The 8th embodiment of the present invention is related to a kind of privacy protection device.Present embodiment is in the 5th or six embodiments On the basis of done further improvement, specific improvements are:When user creates private space, by judging present terminal It whether there is untapped private space in read-only storage, and when being determined with untapped private space, reclaim untapped Private space simultaneously destroys the corresponding key of private space, so as to reduce the occupancy to the read-only storage of terminal.
As shown in figure 8, the creating device 500 of private space is in addition to including the module shown in Fig. 5, in addition to:4th Detection module 510, recycling module 511, destruction module 512.
Specifically, the 4th detection module 510 detects user in first detection module 502 and creates entrance to private space Choose operation after, the space that memory management module 503 divides default size from the read-only storage of terminal is empty as privacy Before, detect and whether there is untapped private space in read-only storage, and exist in read-only storage is detected untapped During private space, triggering recycling module 511 reclaims untapped private space.
Destroying module 512 is used for after recycling module 511 reclaims untapped private space, destroys and accesses private space Key.
It should be noted that untapped private space is not have accessed or data storage to be the hidden of sky in preset time Private space.
Compared with prior art, the creating device of the private space provided in present embodiment, creates privacy empty in user Between when, whether there is untapped private space in the read-only storage by detecting present terminal, and according to testing result, to length There is no accessed or data storage to be reclaimed and destroyed key for empty private space in time, so as to avoid of terminal Read storage to be taken by unreasonable, save the space of the read-only storage of terminal, ensured that the normal of terminal is used.
Because the 4th embodiment is mutually corresponding with present embodiment, therefore present embodiment can be mutual with the 4th embodiment It is engaged implementation.The relevant technical details mentioned in 4th embodiment are still effective in the present embodiment, implement the 4th The technique effect that can be reached in mode can similarly be realized in the present embodiment, in order to reduce repetition, no longer be gone to live in the household of one's in-laws on getting married here State.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in the 4th embodiment.
It will be appreciated by those skilled in the art that realizing that all or part of step in above-described embodiment method can be by Program instructs the hardware of correlation to complete, and the program storage is in a storage medium, including some instructions are to cause one Individual equipment (can be single-chip microcomputer, chip etc.) or processor (processor) perform the whole of each embodiment method of the application Or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize the specific embodiment of the present invention, And in actual applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.

Claims (10)

1. a kind of creation method of private space, it is characterised in that applied to terminal;The creation method bag of the private space Include:
When choosing operation of entrance is created to private space detecting user, divides default from the read-only storage of the terminal The space of size generates the key for accessing the private space as private space;Wherein, the key packet, which contains, is used to unlock The public key of the private space and the private key for verifying the public key;
According to predetermined manner, the public key is informed into user;
Wherein, the data of the private space are individually managed, and when calculating the remaining space of the read-only storage, will be described Private space is calculated within free space;When the remaining space of the read-only storage is not enough, remove in the private space The data of storage, and discharge the space that the private space takes.
2. the creation method of private space according to claim 1, it is characterised in that according to the predetermined manner, incite somebody to action The public key informs after user that the creation method of the private space also includes:
It is encrypted using the data of the private key private space corresponding to the key;
The private key includes:Verification portion, encryption part and storage part;Wherein, the verification portion is from the public key The data in the precalculated position of extraction;When the encryption unit is divided into the key of the generation access private space, system distribution Predetermined figure data;The storage part is divided into physical address of the private space in the read-only storage.
3. the creation method of private space according to claim 1 or 2, it is characterised in that according to the predetermined manner, The public key is informed after user, the creation method of the private space also includes:
Public key is provided and gives entrance for change;
Detect user the public key is given for change entrance there is provided account inputting interface when choosing operation;
Obtain the account that user inputs in the account inputting interface;
Detect public key of the account with prestoring give for change account it is consistent when, according to the predetermined manner, by the public key weight Newly inform user.
4. the creation method of private space according to claim 1 or 2, it is characterised in that detecting user to described Private space create entrance choose operation after, the space of default size is divided from the read-only storage of the terminal as hidden Before private sky, the creation method of the private space also includes:
Detect and whether there is untapped private space in the read-only storage;Wherein, the untapped private space is pre- If it is empty private space not have accessed or data storage in the time;
When there is the untapped private space in detecting the read-only storage, the untapped privacy is reclaimed empty Between, and destroy the key for accessing the private space.
5. the creation method of private space according to claim 1 or 2, it is characterised in that the predetermined manner include with Descend any one or any combination:
The phone number for the public key is shown in the display interface of the terminal, inputting with short message mode to user issues the public affairs Key, the phone number inputted in voice call mode to user issue the public key.
6. the creation method of private space according to claim 1 or 2, it is characterised in that the digit of the public key is more than The digit of non-private space unlocking pin;Wherein, the first place of the public key is predefined parameter, the non-private space unlocking pin Digit be fixed value.
7. a kind of creating device of private space, it is characterised in that including:Display module, first detection module, storage management mould Block, generation module and notification module;
The display module is used to show that private space creates entrance;
The first detection module is used to detect that whether the private space that the display module is shown creates entrance by user Choose, and when choosing operation of entrance created to the private space detecting user, trigger the memory management module from The space that default size is divided in the read-only storage of terminal is used as private space;
The generation module is used to divide default size from the read-only storage of the terminal in the memory management module Space as the private space after, generation accesses the key of the private space;Wherein, the institute of the generation module generation State key packet and contain the public key for unlocking the private space and the private key for verifying the public key;
The notification module is used for according to predetermined manner, and the public key in the key that the generation module is generated is informed User;
Wherein, the data for the private space that the memory management module is divided individually are managed, and the storage management mould Block is additionally operable to, when calculating the remaining space of the read-only storage, the private space be calculated within free space;Institute State read-only storage remaining space it is not enough when, remove the data stored in the private space, and discharge the private space and account for Space.
8. the creating device of private space according to claim 7, it is characterised in that the creating device of the private space Also include:Encrypting module;
The data that the encrypting module is used for the private key private space corresponding to the key of basis are encrypted;
Wherein, the private key includes:Verification portion, encryption part and storage part;Wherein, the verification portion is from the life The data in the precalculated position extracted in the public key in the key generated into module;The encryption unit is divided into the generation When module generation accesses the key of the private space, the data of the predetermined figure of system distribution;The storage part is divided into Physical address of the private space that the memory management module is divided in the read-only storage.
9. the creating device of the private space according to claim 7 or 8, it is characterised in that the establishment of the private space Device also includes:Second detection module, acquisition module and the 3rd detection module;
The display module is additionally operable to display public key and gives entrance for change;
Second detection module is used to detect that the public key that the display module is shown gives whether entrance is chosen by user for change, And give when choosing operation of entrance for change to the public key detecting user, trigger the display module and show account input circle Face;
The acquisition module is used for the account for obtaining the account inputting interface input that user shows in the display module;
3rd detection module is used to detecting whether the public key with prestoring to give account for change for the account that the acquisition module obtains It is number consistent, and detect the public key of the account with prestoring give for change account it is consistent when, the triggering notification module according to The predetermined manner, user is informed by the public key again.
10. the creating device of the private space according to claim 7 or 8, it is characterised in that the establishment of the private space Device also includes:4th detection module, recycling module, destruction module;
4th detection module detects user in the first detection module and private space establishment entrance is chosen After operation, the space that the memory management module divides default size from the read-only storage of the terminal is used as privacy sky Before, detect and whether there is untapped private space in the read-only storage, and there is institute in the read-only storage is detected When stating untapped private space, trigger the recycling module and reclaim the untapped private space;
The destruction module is used for after the recycling module reclaims the untapped private space, destroys and accesses the privacy The key in space;
Wherein, the untapped private space is not have accessed or data storage to be empty private space in preset time.
CN201710278566.4A 2017-04-25 2017-04-25 The creation method and device of private space Pending CN107180201A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710278566.4A CN107180201A (en) 2017-04-25 2017-04-25 The creation method and device of private space

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710278566.4A CN107180201A (en) 2017-04-25 2017-04-25 The creation method and device of private space

Publications (1)

Publication Number Publication Date
CN107180201A true CN107180201A (en) 2017-09-19

Family

ID=59831041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710278566.4A Pending CN107180201A (en) 2017-04-25 2017-04-25 The creation method and device of private space

Country Status (1)

Country Link
CN (1) CN107180201A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108574761A (en) * 2018-04-25 2018-09-25 瓦戈科技(上海)有限公司 A kind of method that mobile phone logs in privacy system
CN110798434A (en) * 2018-08-03 2020-02-14 Emc Ip控股有限公司 Access management to instances on a cloud
CN111709054A (en) * 2020-06-12 2020-09-25 腾讯科技(深圳)有限公司 Privacy space information access control method and device and computer equipment
CN114003880A (en) * 2021-10-27 2022-02-01 北京琥珀创想科技有限公司 Privacy protection method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340750A (en) * 2010-07-20 2012-02-01 上海酷吧信息技术有限公司 Method for retrieving password of mobile phone private space
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN104102882A (en) * 2013-04-12 2014-10-15 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program
CN105574018A (en) * 2014-10-14 2016-05-11 富泰华工业(深圳)有限公司 File managing system and method
CN106022152A (en) * 2016-06-01 2016-10-12 北京蓝光引力网络股份有限公司 Method and device for encrypting files in mobile device
CN106372536A (en) * 2016-10-13 2017-02-01 上海巍擎信息技术有限责任公司 Privacy information protection method and device, and creation method for device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340750A (en) * 2010-07-20 2012-02-01 上海酷吧信息技术有限公司 Method for retrieving password of mobile phone private space
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN104102882A (en) * 2013-04-12 2014-10-15 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program
CN105574018A (en) * 2014-10-14 2016-05-11 富泰华工业(深圳)有限公司 File managing system and method
CN106022152A (en) * 2016-06-01 2016-10-12 北京蓝光引力网络股份有限公司 Method and device for encrypting files in mobile device
CN106372536A (en) * 2016-10-13 2017-02-01 上海巍擎信息技术有限责任公司 Privacy information protection method and device, and creation method for device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108574761A (en) * 2018-04-25 2018-09-25 瓦戈科技(上海)有限公司 A kind of method that mobile phone logs in privacy system
CN110798434A (en) * 2018-08-03 2020-02-14 Emc Ip控股有限公司 Access management to instances on a cloud
CN110798434B (en) * 2018-08-03 2022-04-08 Emc Ip控股有限公司 Computer system, method performed by computing device, and storage medium
CN111709054A (en) * 2020-06-12 2020-09-25 腾讯科技(深圳)有限公司 Privacy space information access control method and device and computer equipment
CN114003880A (en) * 2021-10-27 2022-02-01 北京琥珀创想科技有限公司 Privacy protection method and system

Similar Documents

Publication Publication Date Title
CN101310286B (en) Improved single sign on
CN103902862B (en) A kind of mobile device management method, apparatus and a kind of mobile equipment
CN107180201A (en) The creation method and device of private space
CN107004080A (en) Environment sensing security token
US20080246584A1 (en) Locking digital pen
CN105701420B (en) A kind of management method and terminal of user data
CN104537300A (en) Safe password setting and verifying mode
US6173282B1 (en) Electronic sealed envelope
CN104408363A (en) Safe password system
CN1523809A (en) Password variable identification verification technique
CN105260657A (en) Privacy protection method and device
CN101950342A (en) Device and method for managing access control permission of integrated circuit card
CN106169052A (en) The processing method of application program, device and mobile terminal
CN107180173A (en) unlocking method and device
TWI534711B (en) Smart card and access method thereof
JP2000047987A (en) Method and device for outputting data, and storage medium
CN116579022A (en) Data security privacy protection method based on cloud service
CN105007267A (en) Privacy protection method and device
CN106570420B (en) Secret code-based intelligent equipment privacy protection implementation method and system
CN115935391A (en) Card manufacturing method, card issuing method, device, medium, and program product for IC card
CN110349301A (en) Gate inhibition's open method and device
CN109903442B (en) A kind of control method of seal system
CN108270735A (en) A kind of data leakage prevention method and equipment
CN110111103B (en) Password resetting method and system for digital currency wallet
Kaushik et al. A novel graphical password scheme to avoid shoulder-surfing attacks in android devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170919