CN107392006B - Implementation method of security application and mobile terminal - Google Patents

Implementation method of security application and mobile terminal Download PDF

Info

Publication number
CN107392006B
CN107392006B CN201710547838.6A CN201710547838A CN107392006B CN 107392006 B CN107392006 B CN 107392006B CN 201710547838 A CN201710547838 A CN 201710547838A CN 107392006 B CN107392006 B CN 107392006B
Authority
CN
China
Prior art keywords
mobile terminal
space
user
nfc
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710547838.6A
Other languages
Chinese (zh)
Other versions
CN107392006A (en
Inventor
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Genius Technology Co Ltd
Original Assignee
Guangdong Genius Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Genius Technology Co Ltd filed Critical Guangdong Genius Technology Co Ltd
Priority to CN201710547838.6A priority Critical patent/CN107392006B/en
Publication of CN107392006A publication Critical patent/CN107392006A/en
Application granted granted Critical
Publication of CN107392006B publication Critical patent/CN107392006B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention relates to the technical field of communication, and discloses a method for realizing security application and a mobile terminal, wherein the method comprises the following steps: detecting an NFC label outside the mobile terminal through an NFC module built in the mobile terminal; after the NFC label is detected, popping up prompt information for inquiring whether a security space is established in the mobile terminal on a user interface of the mobile terminal; acquiring a setup instruction which is input by a user on a user interface of the mobile terminal and responds to the prompt message; according to the establishment instruction, unsealing the reserved storage space of the mobile terminal, taking the reserved storage space as a security space, and acquiring and storing the basic information of the NFC label as a verification key of the security space; detecting a target application program selected by a user from application programs of the mobile terminal, and storing the target application program in the safe space; by establishing a hidden security space for privacy preserving applications, the purpose of protecting personal privacy and property security is achieved.

Description

Implementation method of security application and mobile terminal
Technical Field
The invention relates to the technical field of communication, in particular to a method for realizing security application and a mobile terminal.
Background
With the popularization and use of smart phones, smart phones can realize more and more functions by downloading and installing some Application programs (Application), and related personal privacy is more and more, for example, after a mobile phone bank Application client is installed on the smart phone, information such as account passwords and the like can be related, and after other Application clients capable of realizing mobile payment are installed, mobile payment can be simply and quickly carried out, but the mobile payment is also easily operated by non-users. For example, for some parents who have children at home, the parents' smart phones may be played by the children, and since the children have weak recognition ability, misoperation such as mobile payment may be unconsciously caused, so that personal privacy information is leaked, and property loss is caused in severe cases.
Disclosure of Invention
The embodiment of the invention discloses a method for realizing security application and a mobile terminal, which are used for solving the problem of insecurity of an application program in the prior art so as to improve the operation security of the application program and protect the personal privacy or property security of a user.
The embodiment of the invention discloses a method for realizing safety application, wherein a Near Field Communication (NFC) module is arranged in a mobile terminal, and the method comprises the following steps:
detecting an NFC tag outside the mobile terminal through the NFC module;
after the NFC label is detected, popping up prompt information for inquiring whether a security space is established in the mobile terminal on a user interface of the mobile terminal;
acquiring a setup instruction which is input by a user on the user interface of the mobile terminal and responds to the prompt message;
according to the establishment instruction, unsealing a reserved storage space of the mobile terminal, taking the reserved storage space as the secure space, and acquiring and storing basic information of the NFC label as a verification key of the secure space;
and detecting a target application program selected by a user from the application programs of the mobile terminal, and storing the target application program in the secure space.
As an optional implementation manner, in the first aspect of the present invention, after the unsealing, according to the establishment instruction, the reserved storage space of the mobile terminal, taking the reserved storage space as the secure space, and acquiring and storing the basic information of the NFC tag as the verification key of the secure space, the method further includes:
displaying the secure space on the mobile terminal user interface;
the detecting a target application program selected by a user from application programs of the mobile terminal and storing the target application program in the secure space includes:
receiving an opening instruction of a user to the safe space, and responding to the opening instruction to open the safe space so as to enter an operation interaction interface of the safe space;
detecting selection operation of a user on an application program adding function on the operation interaction interface, and presenting an application program list based on the operation interaction interface, wherein the application program list comprises all application programs of the mobile terminal;
and monitoring the selection operation of a user on the target application program on the application program list, and saving the target application program to the safe space.
As an optional implementation manner, in the first aspect of the present invention, after detecting a target application selected by a user from applications of the mobile terminal, and saving the target application to the secure space, the method further includes:
hiding the secure space on the mobile terminal user interface upon detecting exit from the secure space.
As an optional implementation manner, in the first aspect of the present invention, while acquiring a setup instruction, which is input by a user at the user interface of the mobile terminal and is in response to the prompt information, and before the decapsulating the reserved storage space of the mobile terminal according to the setup instruction, taking the reserved storage space as the secure space, and acquiring and storing basic information of the NFC tag as a verification key of the secure space, the method further includes:
acquiring a fingerprint image of a user while acquiring a setup instruction which is input by the user on the user interface of the mobile terminal and responds to the prompt message;
identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and if so, executing the steps of unsealing the reserved storage space of the mobile terminal according to the establishment instruction, taking the reserved storage space as the secure space, and acquiring and storing the basic information of the NFC label as the verification key of the secure space.
The second aspect of the invention discloses a method for realizing security application, wherein a Near Field Communication (NFC) module is arranged in a mobile terminal, and the method comprises the following steps:
detecting an NFC tag outside the mobile terminal through the NFC module;
after the NFC tag is detected, reading basic information of the NFC tag;
judging whether the basic information of the NFC label is matched with a stored verification key; the verification key is basic information of a target NFC label used for establishing a secure space;
and when the basic information of the NFC tag is matched with the verification key, displaying the secure space on the user interface of the mobile terminal, wherein the secure space stores a target application program, and the target application program is selected from the application programs of the mobile terminal.
As an optional implementation manner, in the second aspect of the present invention, after displaying the secure space on the mobile terminal user interface when the basic information of the NFC tag matches the authentication key, the method further includes:
receiving an opening instruction of a user to the safe space;
an operation interaction interface for responding to the opening instruction to open the safe space so as to enter the safe space;
and displaying the target application program on the operation interactive interface.
As an optional implementation manner, in the second aspect of the present invention, after displaying the secure space on the user interface of the mobile terminal, the method further includes:
hiding the secure space on the mobile terminal user interface upon detecting exit from the secure space.
As an optional implementation manner, in the second aspect of the present invention, when the basic information of the NFC tag matches the authentication key and before displaying the secure space on the user interface of the mobile terminal, the method further includes:
when the basic information of the NFC label is matched with the verification key, fingerprint images of the user are collected;
identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and if the security space is matched with the security space, displaying the security space on the user interface of the mobile terminal.
The third aspect of the present invention discloses a mobile terminal, in which a Near Field Communication (NFC) module is built, the mobile terminal including:
a first tag detection unit, configured to detect, by the NFC module, an NFC tag outside the mobile terminal;
a setup prompting unit, configured to pop up, on the user interface of the mobile terminal, a prompting message for inquiring whether to setup a security space in the mobile terminal after the first tag detection unit detects the NFC tag;
the first instruction response unit is used for acquiring a setup instruction which is input by a user on the user interface of the mobile terminal and responds to the prompt message;
a space establishing unit, configured to unseal a reserved storage space of the mobile terminal according to the establishment instruction, use the reserved storage space as the secure space, and obtain and store basic information of the NFC tag as a verification key of the secure space;
and the application selection unit is used for detecting a target application program selected by a user from the application programs of the mobile terminal and storing the target application program in the safe space.
As an optional implementation manner, in the third aspect of the present invention, the mobile terminal further includes:
the first display unit is used for unsealing the reserved storage space of the mobile terminal according to the establishment instruction by the space establishment unit, using the reserved storage space as the secure space, acquiring and storing the basic information of the NFC label as the verification key of the secure space, and displaying the secure space on the user interface of the mobile terminal;
the application selection unit specifically includes:
the first opening unit is used for receiving an opening instruction of a user for the safe space and responding to the opening instruction to open the safe space so as to enter an operation interaction interface of the safe space;
the list presentation unit is used for detecting the selection operation of a user on the application program adding function on the operation interaction interface and presenting an application program list based on the operation interaction interface, wherein the application program list comprises all application programs of the mobile terminal;
and the saving unit is used for monitoring the selection operation of the user on the target application program on the application program list and saving the target application program to the safe space.
As an optional implementation manner, in the third aspect of the present invention, the mobile terminal further includes:
the first hiding unit is used for hiding the secure space on the user interface of the mobile terminal after the application selecting unit detects the target application program selected by the user from the application programs of the mobile terminal and stores the target application program in the secure space and detects that the user exits the secure space.
As an optional implementation manner, in the third aspect of the present invention, the mobile terminal further includes:
the first acquisition unit is used for acquiring a fingerprint image of the user before the first instruction response unit acquires a setup instruction which is input by the user at the user interface of the mobile terminal and responds to the prompt information, the space setup unit unpacks the reserved storage space of the mobile terminal according to the setup instruction, the reserved storage space is used as the safety space, and the basic information of the NFC label is acquired and used as a verification key of the safety space and is stored;
the first fingerprint identification unit is used for identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and the space establishing unit is used for unsealing the reserved storage space of the mobile terminal according to the establishing instruction when the first fingerprint identification unit identifies that the fingerprint image is matched with the pre-stored fingerprint image, taking the reserved storage space as the safety space, and acquiring and storing the basic information of the NFC label as the verification key of the safety space.
The fourth aspect of the present invention discloses a mobile terminal, in which a Near Field Communication (NFC) module is built, the mobile terminal including:
the second tag detection unit is used for detecting an NFC tag outside the mobile terminal through the NFC module;
a reading unit, configured to read basic information of the NFC tag after the second tag detection unit detects the NFC tag;
the key judgment unit is used for judging whether the basic information of the NFC label is matched with the stored verification key or not; the verification key is basic information of a target NFC label used for establishing a secure space;
and the second display unit is used for displaying the secure space on the user interface of the mobile terminal when the key judgment unit determines that the basic information of the NFC tag is matched with the verification key, wherein the secure space stores a target application program, and the target application program is selected from the application programs of the mobile terminal.
As an optional implementation manner, in the fourth aspect of the present invention, the mobile terminal further includes:
the receiving unit is used for receiving an opening instruction of a user to the secure space when the key judging unit determines that the basic information of the NFC tag is matched with the verification key and the second display unit displays the secure space on the user interface of the mobile terminal;
the second response unit is used for responding to the opening instruction to open the safe space so as to enter the operation interaction interface of the safe space;
and the third display unit is used for displaying the target application program on the operation interaction interface.
As an optional implementation manner, in the fourth aspect of the present invention, the mobile terminal further includes:
and the second hiding unit is used for hiding the safety space on the user interface of the mobile terminal after the second display unit displays the safety space on the user interface of the mobile terminal and detects that the safety space exits from the safety space.
As an optional implementation manner, in the fourth aspect of the present invention, the mobile terminal further includes:
the second acquisition unit is used for acquiring a fingerprint image of a user when the key judgment unit determines that the basic information of the NFC tag is matched with the verification key and before the second display unit displays the security space on the user interface of the mobile terminal;
the second fingerprint identification unit is used for identifying whether the fingerprint image is matched with a prestored fingerprint image of the authorized user of the mobile terminal;
and the second display unit is used for displaying the safety space on the user interface of the mobile terminal when the second fingerprint identification unit identifies that the fingerprint image is matched with the pre-stored fingerprint image.
A fifth aspect of the present invention discloses a mobile terminal, which may include:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the implementation method of the security application as disclosed in the first aspect of the invention or to execute the implementation method of the security application as disclosed in the second aspect of the invention.
A sixth aspect of the present invention discloses a computer-readable storage medium storing a computer program for electronic data exchange, wherein the computer program causes a computer to execute the implementation method of a security application as disclosed in the first aspect of the present invention or the implementation method of a security application as disclosed in the second aspect of the present invention.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, an NFC module is arranged in a mobile terminal, an NFC label outside the mobile terminal is detected through the NFC module of the mobile terminal, after the NFC label is detected, prompt information for inquiring whether a safe space is established in the mobile terminal is popped up on a user interface of the mobile terminal, after a user is obtained to respond to the prompt information and input an establishment instruction, a reserved storage space of the mobile terminal is unsealed according to the establishment instruction, the reserved storage space is used as the safe space, then basic information of the NFC label is obtained and used as a verification key of the safe space and is stored, and finally a target application program selected by the user is stored in the safe space. It can be seen that, by implementing the embodiment of the present invention, a secure space is established in the mobile terminal by deactivating the NFC tag, and the basic information of the NFC tag is used as the verification key of the secure space to store the target application program, so as to protect the target application program, prevent others from operating the target application program, improve the security of the target application program, and thus achieve the purposes of protecting personal privacy and protecting personal property;
in another aspect, after the secure space is established and the target application program is stored in the secure space, an NFC module of the mobile terminal detects an external NFC tag, if the external NFC tag is detected, basic information of the NFC tag is acquired, and if the basic information of the NFC tag matches a stored verification key, the secure space is displayed on a user interface of the mobile terminal, so that the user can use the target application program stored in the secure space; it can be seen that after the secure space is established, the basic information of the NFC tag used for establishing the secure space is used as the verification key of the secure space, and then the secure space can be displayed on the user interface of the mobile terminal only by using the NFC tag, so that the target application program in the secure space is used, thereby preventing others from operating the target application program, improving the security of the target application program, and achieving the purposes of protecting personal privacy and personal property.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method for implementing a security application disclosed in an embodiment of the present invention;
FIG. 2 is another schematic flow chart of a method for implementing a security application according to an embodiment of the present invention;
FIG. 3 is another schematic flow chart of a method for implementing a security application according to an embodiment of the present invention;
FIG. 4 is another schematic flow chart of a method for implementing a security application according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a mobile terminal disclosed in the embodiment of the present invention;
fig. 6 is another schematic structural diagram of a mobile terminal according to the embodiment of the present disclosure;
fig. 7 is another schematic structural diagram of a mobile terminal according to the embodiment of the present disclosure;
fig. 8 is another schematic structural diagram of a mobile terminal according to the embodiment of the present disclosure;
fig. 9 is another schematic structural diagram of the mobile terminal disclosed in the embodiment of the present invention;
fig. 10 is another schematic structural diagram of a mobile terminal according to the embodiment of the disclosure;
fig. 11 is another schematic structural diagram of the mobile terminal disclosed in the embodiment of the present invention;
fig. 12 is another schematic structural diagram of a mobile terminal according to the disclosure of the present invention;
fig. 13 is another schematic structural diagram of the mobile terminal disclosed in the embodiment of the present invention;
fig. 14 is another schematic structural diagram of the mobile terminal disclosed in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first", "second", "third", and the like in the description and the claims of the present invention are used for distinguishing different objects, and are not used for describing a specific order. The terms "comprises," "comprising," and any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The embodiment of the invention discloses a method for realizing security application, which is used for preventing other people from using an application program and improving the security of the application program, thereby achieving the purposes of protecting personal privacy and personal property. The embodiment of the invention also correspondingly discloses the mobile terminal.
The mobile terminal disclosed by the embodiment of the invention can be a smart phone, a smart watch and the like. The technical solution of the present invention will be described in detail with reference to specific embodiments from the perspective of a mobile terminal.
Example one
Referring to fig. 1, fig. 1 is a schematic flow chart of a method for implementing a security application according to an embodiment of the present invention; as shown in fig. 1, a method for implementing a security application may include:
101. the mobile terminal detects an external NFC tag through a built-in NFC module.
The NFC module is built in the mobile terminal, the NFC is integrated by a non-contact Radio frequency identification (RFID for short) and an interconnection technology, and the NFC module can perform identification and data exchange with compatible equipment in a short distance by combining an induction type card reader, an induction type card and a point-to-point function. The NFC tag provided by the embodiment of the invention can be a smart phone, a smart watch, a card or an NFC tag with an NFC function.
After the NFC function is started, the NFC tag within a certain distance of the mobile terminal is detected through the NFC module.
102. After the mobile terminal detects the NFC label, prompt information for inquiring whether a security space is established is popped up on a user interface.
It is to be understood that the mobile terminal pops up a window on the user interface for inquiring whether to establish a secure space, and may also display a "confirm" button and a "cancel" button on the window for providing the user with a choice of whether to establish a secure space.
103. The mobile terminal acquires a setup instruction which is input by a user on the user interface and responds to the prompt message.
The mobile terminal monitors the selection operation of the user on the button, and when the monitoring user selects the 'confirm' button, a building instruction used by the user to respond to the prompt information is obtained; when the monitoring user selects the "cancel" button, indicating that the user has not given a setup instruction, the flow ends.
104. And the mobile terminal unseals the reserved storage space according to the establishment instruction, takes the reserved storage space as a security space, and acquires and stores the basic information of the NFC label as a verification key of the security space.
A storage space may be reserved in the mobile terminal for the user to use as a secure space. It is understood that a plurality of memory space regions can be reserved in the mobile terminal, and the user can establish different security spaces by classification, for example, a plurality of security spaces are established according to the classification of the target application to be saved.
And then, the mobile terminal unseals one of the reserved storage spaces according to the establishment instruction, and uses the reserved storage space as a security space. And if another NFC label is detected, after the user agrees to establish the security space, unsealing another reserved storage space to be used as another security space.
As an optional implementation manner, the mobile terminal establishes an association relationship between the established security space and the NFC tag, so that the corresponding security space can be quickly and accurately found through the NFC tag in the following.
105. The mobile terminal detects a target application program selected by the user from the application programs, and stores the target application program in the safe space.
For example, the application programs such as the mobile payment application program and the photo album can be saved in the secure space, and except that the user with the NFC tag can view the target application program of the secure space through the NFC tag, other people cannot view the target application program in the secure space, so that the purposes of protecting the personal privacy of the user and protecting the property security of the user are achieved.
In the embodiment of the invention, an NFC module is arranged in a mobile terminal, an NFC label outside the mobile terminal is detected through the NFC module of the mobile terminal, after the NFC label is detected, prompt information for inquiring whether a safe space is established in the mobile terminal is popped up on a user interface of the mobile terminal, after a user is obtained to respond to the prompt information and input an establishment instruction, a reserved storage space of the mobile terminal is unsealed according to the establishment instruction, the reserved storage space is used as the safe space, then basic information of the NFC label is obtained and used as a verification key of the safe space and is stored, and finally a target application program selected by the user is stored in the safe space. It can be seen that, by implementing the embodiment of the present invention, a secure space is established in the mobile terminal by deactivating the NFC tag, and the basic information of the NFC tag is used as the verification key of the secure space to store the target application program, so that the target application program is protected, the target application program is prevented from being operated by others, the security of the target application program is improved, and the purposes of protecting personal privacy and protecting personal property are achieved.
Example two
Referring to fig. 2, fig. 2 is another schematic flow chart of a method for implementing a security application according to an embodiment of the present invention; as shown in fig. 2, a method for implementing a security application may include:
201. the mobile terminal detects an external NFC tag through a built-in NFC module.
202. After the mobile terminal detects the NFC label, prompt information for inquiring whether a security space is established is popped up on a user interface.
As an optional implementation manner, after the mobile terminal detects the NFC tag, the mobile terminal outputs information on the user interface to request the user to input an account and a password for logging in the mobile terminal, the mobile terminal obtains the account and the password input by the user on the user interface, further determines whether the account and the password are matched with a registered account and a registered password, and if the account and the password are matched with the registered account and the registered password, the mobile terminal pops up prompt information for inquiring whether a secure space is established on the user interface. Otherwise, the mobile terminal ends the flow. With this embodiment, only legitimate users are allowed to establish a secure space on the mobile terminal.
203. The mobile terminal acquires a setup instruction which is input by a user on the user interface and responds to the prompt message.
204. And the mobile terminal unseals the reserved storage space according to the establishment instruction, takes the reserved storage space as a security space, and acquires and stores the basic information of the NFC label as a verification key of the security space.
As an optional implementation manner, the mobile terminal acquires a fingerprint image of the user while acquiring a setup instruction which is input by the user on the user interface and responds to the prompt message; further identifying whether the fingerprint image is matched with a pre-stored fingerprint image of an authorized user of the mobile terminal; if so, go to step 204; if not, the user authentication is failed, and the flow is ended. By the embodiment, after the user identity authentication is successful, that is, the user is an authorized user of the mobile terminal, a security space can be established on the mobile terminal based on the NFC tag so as to store the application program which needs to be subjected to security protection.
Further, if the fingerprint image is matched with a pre-stored fingerprint image of an authorized user of the mobile terminal, reading the basic information of the NFC tag, identifying the type of the NFC tag according to the basic information of the NFC tag, and if the type of the NFC tag is a type set by the user and allowed to be used for establishing a secure space, executing step 204; otherwise, the flow ends. For example, the user may set the type of NFC tag to a smart watch carrying NFC functionality.
Further, if the type of the NFC tag is a type set by the user and allowed to be used for establishing a secure space, further identifying whether a device where the NFC tag is located is bound with the mobile terminal, and if the device is a bound device, executing step 204; otherwise, the flow ends. For example, the type of the NFC tag is a smart watch carrying an NFC function, and then only after the smart watch is bound with the mobile terminal, a security space can be established according to the NFC tag on the smart watch, so as to prevent operations by others.
205. The mobile terminal displays the secure space on a user interface.
206. The mobile terminal receives an opening instruction of a user to the safe space, and responds to the opening instruction to open the safe space so as to enter an operation interaction interface of the safe space.
207. The mobile terminal detects the selection operation of a user on the application program adding function on the operation interactive interface, and presents an application program list based on the operation interactive interface, wherein the application program list comprises all application programs of the mobile terminal.
208. The mobile terminal monitors the selection operation of the user on the target application program on the application program list, and stores the target application program in the safe space.
As an alternative embodiment, after the mobile terminal saves the target application program to the secure space, after detecting that the secure space is exited, the secure space is hidden on the user interface of the mobile terminal, that is, the secure space is not displayed on the user interface. With this embodiment, after exiting the secure space, the secure space is not visible on the user interface, and other users cannot use the applications. For example, parents save some mobile payment application programs into a safe space by establishing the safe space, so as to prevent students from misoperation of the mobile payment application programs when using the mobile phones of the parents, which causes property loss and the like. For example, if the mobile terminal authorizes the user to save some important applications into the secure space by establishing the secure space, the applications cannot be seen from the user interface by a person who steals the mobile terminal or a person who picks up the mobile terminal, and there is no way to steal personal privacy from the applications.
In this embodiment, after the mobile terminal establishes the secure space according to the NFC tag, the secure space is opened according to an opening instruction of the user, and then the operation interaction interface is displayed, so that the user can store the target application program in the secure space on the operation interaction interface.
EXAMPLE III
Referring to fig. 3, fig. 3 is another schematic flow chart of a method for implementing a security application according to an embodiment of the present invention; as shown in fig. 3, a method for implementing a security application may include:
301. the mobile terminal detects an external NFC tag through the NFC module.
302. And after the mobile terminal detects the NFC label, reading the basic information of the NFC label.
303. The mobile terminal judges whether the basic information of the NFC label is matched with the stored verification key; the verification key is basic information of a target NFC tag used for establishing a secure space. Wherein, upon matching, a transition is made to step 304; when there is no match, the flow ends.
304. The mobile terminal displays the safe space on the user interface, the safe space stores target application programs, and the target application programs are selected from the application programs of the mobile terminal.
As an optional implementation manner, after the basic information of the NFC tag is matched with a stored verification key (any verification key), the corresponding security space is found according to the association relationship between the NFC tag and the security space, and then the corresponding security space is displayed on the user interface.
In the embodiment of the invention, after a security space is established and a target application program is stored in the security space, an NFC module of a mobile terminal is used for detecting an external NFC label, if the NFC label is detected, basic information of the NFC label is acquired, and if the basic information of the NFC label is matched with a stored verification key, the security space is displayed on a user interface of the mobile terminal, so that a user can use the target application program stored in the security space; it can be seen that after the secure space is established, the basic information of the NFC tag used for establishing the secure space is used as the verification key of the secure space, and then the secure space can be displayed on the user interface of the mobile terminal only by using the NFC tag, so that the target application program in the secure space is used, thereby preventing others from operating the target application program, improving the security of the target application program, and achieving the purposes of protecting personal privacy and personal property.
Example four
Referring to fig. 4, fig. 4 is another schematic flow chart of a method for implementing a security application according to an embodiment of the present invention; as shown in fig. 4, a method for implementing a security application may include:
401. the mobile terminal detects an external NFC tag through the NFC module.
402. And after the mobile terminal detects the NFC label, reading the basic information of the NFC label.
403. The mobile terminal judges whether the basic information of the NFC label is matched with the stored verification key; the verification key is basic information of a target NFC tag used for establishing a secure space. Wherein, upon matching, go to step 404; when there is no match, the flow ends.
404. The mobile terminal displays the secure space on a user interface.
As an optional implementation manner, when the basic information of the NFC tag matches with the stored authentication key, the mobile terminal collects a fingerprint image of the user; identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal; if so, go to step 404; otherwise, the user identity authentication is failed, and the process is ended. By the implementation method, after the user identity authentication is successful, namely the user is an authorized user of the mobile terminal, the mobile terminal can display the security space for the user to operate.
As an optional implementation manner, the displaying, by the mobile terminal, the secure space on the user interface specifically includes: and the mobile terminal displays the shortcut icon of the safety space on a user interface, and the shortcut icon and the safety space have a link corresponding relation.
405. And the mobile terminal receives an opening instruction of the user to the safe space.
The mobile terminal receives an opening instruction (including clicking, double clicking, touching or sliding and the like) of a shortcut icon of a safe space on a user interface from a user, and opens the safe space according to the link corresponding relation of the shortcut icon and the safe space.
406. And the mobile terminal responds to the opening instruction to open the safe space so as to enter the operation interaction interface of the safe space.
407. And the mobile terminal displays the target application program on the operation interactive interface.
As an optional implementation manner, after the mobile terminal displays the target application on the operation interaction interface, after detecting that the secure space is exited, the secure space is hidden on the user interface. With this embodiment, after exiting the secure space, the secure space is not visible on the user interface, and other users cannot use the applications.
In the embodiment, the mobile terminal acquires the security space according to the NFC tag, then displays the security space on the user interface, and further displays the target application program for the user to operate.
EXAMPLE five
Referring to fig. 5, fig. 5 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention; in the mobile terminal shown in fig. 5, an NFC module is built in the mobile terminal, and specifically includes:
a first tag detection unit 510 for detecting an NFC tag outside the mobile terminal through an NFC module;
a setup prompting unit 520, configured to pop up, on a user interface of the mobile terminal, prompting information for inquiring whether to setup a security space in the mobile terminal after the first tag detecting unit 510 detects the NFC tag;
a first instruction response unit 530, configured to obtain a setup instruction, which is input by a user at a user interface of the mobile terminal and responds to the prompt information;
a space establishing unit 540, configured to unseal the reserved storage space of the mobile terminal according to the establishment instruction, use the reserved storage space as a security space in the mobile terminal, and obtain and store the basic information of the NFC tag as a verification key of the security space;
an application selection unit 550, configured to detect a target application selected by a user from the applications of the mobile terminal, and save the target application to the secure space.
In the embodiment of the invention, an NFC module is arranged in the mobile terminal. The first tag detection unit 510 detects an NFC tag outside the mobile terminal through an NFC module, after the NFC tag is detected, the establishment prompt unit 520 pops up prompt information for inquiring whether to establish a secure space in the mobile terminal on a user interface of the mobile terminal, after the first instruction response unit 530 obtains a user response to the prompt information and inputs an establishment instruction, the space establishment unit 540 unseals a reserved storage space of the mobile terminal according to the establishment instruction, uses the reserved storage space as a secure space, then obtains basic information of the NFC tag as a verification key of the secure space and stores the basic information, and finally the application selection unit 550 stores a target application program selected by the user into the secure space. It can be seen that, by implementing the embodiment of the present invention, a secure space is established in the mobile terminal by deactivating the NFC tag, and the basic information of the NFC tag is used as the verification key of the secure space to store the target application program, so as to protect the target application program, prevent others from operating the target application program, improve the security of the target application program, and thus achieve the purposes of protecting personal privacy and protecting personal property;
as an alternative embodiment, the setup prompt unit 520 is used to pop up a window on the user interface, and a "confirm" button and a "cancel" button for displaying whether to setup the secure space are displayed on the window for providing the user with a selection. Further, the first instruction response unit 530 is configured to monitor a selection operation of the button by the user, and when the monitoring user selects the "confirm" button, acquire a setup instruction used by the user to respond to the prompt information.
As an optional implementation manner, the space establishing unit 540 is further configured to establish an association relationship between the established security space and the NFC tag, so that the corresponding security space can be quickly and accurately found through the NFC tag in the following.
It is understood that the mobile terminal shown in fig. 5 can be used to execute the implementation method of the security application shown in steps 101-105.
Referring to the mobile terminal shown in fig. 5, in the mobile terminal shown in fig. 6, the mobile terminal further includes:
a first display unit 610, configured to display the reserved storage space of the mobile terminal on a user interface of the mobile terminal after the space establishing unit 540 unseals the reserved storage space according to the establishment instruction, uses the reserved storage space as a secure space, and obtains and stores basic information of the NFC tag as a verification key of the secure space;
further, the application selection unit 550 specifically includes:
a first opening unit 620, configured to receive an opening instruction of the secure space from a user, and to open the secure space in response to the opening instruction to enter an operation interaction interface of the secure space;
the list presenting unit 620 is configured to detect a selection operation of a user on an application adding function on the operation interaction interface, and present an application list based on the operation interaction interface, where the application list includes all applications of the mobile terminal;
the saving unit 630 is configured to monitor a user's selection operation of a target application program on the application program sequence list, and save the target application program to the secure space.
It is understood that the mobile terminal shown in fig. 6 can be used to execute the implementation method of the security application shown in steps 201 to 208.
Referring to fig. 5, the mobile terminal shown in fig. 7 further includes:
the first hiding unit 710 is configured to, after the application selecting unit 550 detects a target application selected by a user from the applications of the mobile terminal, and stores the target application in the secure space, after detecting that the secure space exits, hide the secure space on the user interface of the mobile terminal.
Referring to fig. 5, the mobile terminal shown in fig. 8 further includes:
the first collecting unit 810 is configured to collect a fingerprint image of the user while the first instruction responding unit 530 obtains a setup instruction, which is input by the user at the user interface of the mobile terminal and responds to the prompt information, and the space setup unit 540 unseals the reserved storage space of the mobile terminal according to the setup instruction, takes the reserved storage space as a secure space, and obtains basic information of the NFC tag as a verification key of the secure space and stores the basic information;
a first fingerprint recognition unit 820 for recognizing whether the fingerprint image matches a pre-stored fingerprint image of an authorized user of the mobile terminal;
the space establishing unit 540 is configured to unseal the reserved storage space of the mobile terminal according to the establishment instruction when the first fingerprint identifying unit 820 identifies that the fingerprint image matches a pre-stored fingerprint image, use the reserved storage space as a secure space, and obtain and store the basic information of the NFC tag as a verification key of the secure space.
EXAMPLE six
Referring to fig. 9, fig. 9 is another schematic structural diagram of a mobile terminal according to an embodiment of the disclosure; as shown in fig. 9, a mobile terminal may include:
a second tag detection unit 910, configured to detect an NFC tag outside the mobile terminal through an NFC module;
a reading unit 920, configured to read basic information of the NFC tag after the second tag detecting unit 910 detects the NFC tag;
a key determining unit 930 configured to determine whether the basic information of the NFC tag matches the stored authentication key; the verification key is basic information of a target NFC label used for establishing a secure space;
a second display unit 940, configured to display the secure space on the user interface of the mobile terminal when the key determination unit 930 determines that the basic information of the NFC tag matches the verification key, where the secure space stores a target application program selected from the applications of the mobile terminal.
In the embodiment of the present invention, after the mobile terminal establishes the security space and stores the target application program in the security space, the second tag detecting unit 910 detects an external NFC tag through an NFC module of the mobile terminal, if the external NFC tag is detected, the reading unit 920 obtains basic information of the NFC tag, and if the key determining unit 930 determines that the basic information of the NFC tag matches the stored verification key, the second display unit 940 displays the security space on the user interface of the mobile terminal, so that the user can use the target application program stored in the security space; it can be seen that after the secure space is established, the basic information of the NFC tag used for establishing the secure space is used as the verification key of the secure space, and then the secure space can be displayed on the user interface of the mobile terminal only by using the NFC tag, so that the target application program in the secure space is used, thereby preventing others from operating the target application program, improving the security of the target application program, and achieving the purposes of protecting personal privacy and personal property.
It is understood that the mobile terminal shown in fig. 9 can be used to execute the implementation method of the security application shown in steps 301 to 304.
Referring to fig. 9, the mobile terminal shown in fig. 10 further includes:
a receiving unit 1010 configured to receive an opening instruction of the secure space by the user when the key judgment unit 930 determines that the basic information of the NFC tag matches the verification key and after the second display unit 940 displays the secure space on the user interface of the mobile terminal;
a second response unit 1020 for opening the secure space in response to the open instruction to access the operation interaction interface of the secure space;
and a third display unit 1030, configured to display the target application on the operation interaction interface.
It is understood that the mobile terminal shown in fig. 10 can be used to execute the implementation method of the security application shown in steps 401 to 407.
Referring to fig. 9, the mobile terminal shown in fig. 11 further includes:
a second hiding unit 1110 for hiding the security space on the user interface of the mobile terminal after the second display unit 940 displays the security space on the user interface of the mobile terminal and after detecting that the security space is exited.
Referring to fig. 9, the mobile terminal shown in fig. 12 further includes:
a second collecting unit 1210, configured to collect a fingerprint image of the user when the key determining unit 930 determines that the basic information of the NFC tag matches the verification key and before the second display unit 940 displays the security space on the user interface of the mobile terminal;
a second fingerprint identification unit 1220, configured to identify whether the fingerprint image matches a pre-stored fingerprint image of an authorized user of the mobile terminal;
the second display unit 940 is configured to display the security space on the user interface of the mobile terminal when the second fingerprint identification unit 1220 identifies that the fingerprint image matches the pre-stored fingerprint image.
EXAMPLE seven
Referring to fig. 13, fig. 13 is another schematic structural diagram of a mobile terminal according to an embodiment of the disclosure; the mobile terminal shown in fig. 13 may include: at least one processor 1310, such as a CPU, a memory 1320, at least one communication bus 1330, an input device 1340, an output device 1350. Communication bus 1330 is used to enable, among other things, communication connections between these components. The memory 1320 may be a high speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1320 may optionally be at least one memory device located remotely from the processor 1310. Wherein the processor 1310 may be combined with the mobile terminal described in fig. 5 to 12, the memory 1320 stores a set of program codes, and the processor 1310 calls the program codes stored in the memory 1320 to perform the following operations:
detecting an NFC tag outside the mobile terminal through the NFC module; after the NFC label is detected, popping up prompt information for inquiring whether a security space is established in the mobile terminal on a user interface of the mobile terminal; acquiring a setup instruction which is input by a user on the user interface of the mobile terminal and responds to the prompt message; according to the establishment instruction, unsealing a reserved storage space of the mobile terminal, taking the reserved storage space as the secure space, and acquiring and storing basic information of the NFC label as a verification key of the secure space; detecting a target application program selected by a user from application programs of the mobile terminal, and storing the target application program in the secure space; or
Detecting an NFC tag outside the mobile terminal through the NFC module; after the NFC tag is detected, reading basic information of the NFC tag; judging whether the basic information of the NFC label is matched with a stored verification key; the verification key is basic information of a target NFC label used for establishing a secure space; and when the basic information of the NFC tag is matched with the verification key, displaying the secure space on the user interface of the mobile terminal, wherein the secure space stores a target application program, and the target application program is selected from the application programs of the mobile terminal.
Optionally, the processor 1310 may be further configured to perform the following steps:
after the reserved storage space of the mobile terminal is unpacked according to the establishing instruction, the reserved storage space is used as the safety space, the basic information of the NFC label is obtained and used as a verification key of the safety space and is stored, and the safety space is displayed on a user interface of the mobile terminal;
further, the processor 1310 may be further configured to perform the following steps: receiving an opening instruction of a user to the safe space, and responding to the opening instruction to open the safe space so as to enter an operation interaction interface of the safe space;
detecting selection operation of a user on an application program adding function on the operation interaction interface, and presenting an application program list based on the operation interaction interface, wherein the application program list comprises all application programs of the mobile terminal;
and monitoring the selection operation of a user on the target application program on the application program list, and saving the target application program to the safe space.
Optionally, the processor 1310 may be further configured to perform the following steps:
after detecting a target application program selected by a user from application programs of the mobile terminal and storing the target application program in the secure space, hiding the secure space on a user interface of the mobile terminal after detecting that the user exits the secure space.
Optionally, the processor 1310 may be further configured to perform the following steps:
acquiring a fingerprint image of a user while acquiring a setup instruction which is input by the user on the user interface of the mobile terminal and responds to the prompt message;
identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and if so, unsealing the reserved storage space of the mobile terminal according to the establishment instruction, taking the reserved storage space as the secure space, and acquiring and storing the basic information of the NFC label as the verification key of the secure space.
Optionally, the processor 1310 may be further configured to perform the following steps:
when the basic information of the NFC tag is matched with the verification key, receiving an opening instruction of a user to the secure space after the secure space is displayed on the user interface of the mobile terminal; an operation interaction interface for responding to the opening instruction to open the safe space so as to enter the safe space; and displaying the target application program on the operation interactive interface.
Optionally, the processor 1310 may be further configured to perform the following steps:
after the secure space is displayed on the mobile terminal user interface, hiding the secure space on the mobile terminal user interface after detecting that the secure space is exited.
Optionally, the processor 1310 may be further configured to perform the following steps:
when the basic information of the NFC label is matched with the verification key, fingerprint images of the user are collected; identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal; and if the security space is matched with the security space, displaying the security space on the user interface of the mobile terminal.
Example eight
Referring to fig. 14, fig. 14 is a block diagram of a part of a structure related to a mobile terminal according to an embodiment of the disclosure. Referring to fig. 14, the mobile terminal includes: a Radio Frequency (RF) circuit 10, a memory 20, an input unit 30, a display unit 40, a sensor 50, an audio circuit 60, a Wireless Fidelity (WiFi) module 70, a processor 80, and a power supply 90. Those skilled in the art will appreciate that the mobile terminal configuration shown in fig. 14 is not intended to be limiting of mobile terminals and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each constituent element of the mobile terminal in detail with reference to fig. 14:
the RF circuit 10 may be used for the reception and transmission of information. In general, the RF circuit 10 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 10 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol including, but not limited to, GSM, GPRS, CDMA, WCDMA, LTE, email, Short Messaging Service (SMS), etc.
The memory 20 may be used to store software programs and modules, and the processor 80 executes various functional applications and data processing of the mobile terminal by operating the software programs and modules stored in the memory 20. The memory 20 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as an application interface display function, a telephone dialing function, etc.), and the like; the storage data area may store data created according to the use of the mobile terminal, such as a contact identification, a preset operation mode, etc. Further, the memory 20 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 30 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the input unit 30 may include a fingerprint recognition module 31 and other input devices 32. Fingerprint identification module 31, the fingerprint data that can gather the user on it. Optionally, the fingerprint recognition module 31 may include an optical fingerprint module, a capacitive fingerprint module, and a radio frequency fingerprint module. Taking the fingerprint identification module 31 as an example of a capacitive fingerprint identification module, the fingerprint identification module specifically includes sensing electrodes (n1 abnormal sensing electrodes and n2 normal sensing electrodes) and a signal processing circuit (such as an amplifying circuit, a noise suppression circuit, an analog-to-digital conversion circuit, etc.) connected to the sensing electrodes. The input unit 30 may comprise other input devices 32 in addition to the fingerprint recognition module 31. In particular, other input devices 32 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 40 may be used to display information input by a user or information provided to the user and various menus with the mobile terminal. The display unit 40 may include a display screen 41, and optionally, the display screen 41 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Although in fig. 14, the fingerprint identification module 31 and the display 41 are two independent components to implement the input and output functions of the mobile terminal, in some embodiments, the fingerprint identification module 31 and the display 41 may be integrated to implement the input and output functions of the mobile terminal.
The mobile terminal may also include at least one sensor 50, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display screen 41 according to the brightness of ambient light, and a proximity sensor that turns off the display screen 41 and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration) for recognizing the attitude of the mobile terminal, and related functions (such as pedometer and tapping) for vibration recognition; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile terminal, further description is omitted here.
Audio circuitry 60, speaker 61, microphone 62 may provide an audio interface between the user and the mobile terminal. The audio circuit 60 may transmit the electrical signal converted from the received audio data to the speaker 61, and the electrical signal is converted into a sound signal by the speaker 61 and output; on the other hand, the microphone 62 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 60, and then outputs the audio data to the processor 80 for processing, via the RF circuit 10, to be transmitted to, for example, another mobile terminal, or outputs the audio data to the memory 20 for further processing.
WiFi belongs to a short-distance wireless transmission technology, and the mobile terminal can help a user to send and receive e-mails, browse webpages, access streaming media and the like through the WiFi module 70, and provides wireless broadband internet access for the user. Although fig. 12 shows the WiFi module 70, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 80 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 20 and calling data stored in the memory 20, thereby performing overall monitoring of the mobile terminal. Alternatively, processor 80 may include one or more processing units; preferably, the processor 80 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 80.
The mobile terminal also includes a power supply 90 (e.g., a battery) for powering the various components, which may preferably be logically connected to the processor 80 via a power management system that may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile terminal may further include a camera, a bluetooth module, and the like, which will not be described herein.
In the foregoing embodiments shown in fig. 1 and fig. 4, the method flows of the steps may be implemented based on the structure of the mobile terminal.
In the embodiments shown in fig. 5 to 12, the functions of the units may be implemented based on the structure of the mobile terminal.
By implementing the mobile terminal, the hidden security space can be established to protect application programs which need to be protected by a user, the security of some application operations on the mobile terminal is enhanced, and the purpose of protecting the personal privacy and property security of the user is achieved.
It will be understood by those skilled in the art that all or part of the steps in the methods of the embodiments described above may be implemented by instructions associated with a program, which may be stored in a computer-readable storage medium, where the storage medium includes Read-Only Memory (ROM), Random Access Memory (RAM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), One-time Programmable Read-Only Memory (OTPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), compact disc-Read-Only Memory (CD-ROM), or other Memory, magnetic disk, magnetic tape, or magnetic tape, Or any other medium which can be used to carry or store data and which can be read by a computer.
The above detailed description is provided for the implementation method of the security application and the mobile terminal disclosed in the embodiments of the present invention, and a specific example is applied in the detailed description to explain the principle and the implementation manner of the present invention, and the description of the above embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (18)

1. A method for realizing security application is characterized in that a Near Field Communication (NFC) module is arranged in a mobile terminal, and the method comprises the following steps:
detecting an NFC tag outside the mobile terminal through the NFC module;
after the NFC label is detected, popping up prompt information for inquiring whether a security space is established in the mobile terminal on a user interface of the mobile terminal;
acquiring a setup instruction which is input by a user on the user interface of the mobile terminal and responds to the prompt message;
acquiring a fingerprint image of the user while acquiring a setup instruction which is input by the user on the user interface of the mobile terminal and responds to the prompt message;
identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
if so, reading the basic information of the NFC tag, and identifying whether the type of the NFC tag is a type which is allowed to be used for establishing a security space and is set by a user according to the basic information of the NFC tag;
if so, judging whether the equipment where the NFC label is located is bound with the mobile terminal;
if the NFC label is bound, according to the establishment instruction, the reserved storage space of the mobile terminal is unsealed, the reserved storage space is used as the safe space, and the basic information of the NFC label is obtained and used as a verification key of the safe space and is stored;
and detecting a target application program selected by a user from the application programs of the mobile terminal, and storing the target application program in the secure space.
2. The method according to claim 1, wherein after the unsealing of the reserved memory space of the mobile terminal according to the establishment instruction, taking the reserved memory space as the secure space, and obtaining and saving the basic information of the NFC tag as the authentication key of the secure space, the method further comprises:
displaying the secure space on the mobile terminal user interface;
the detecting a target application program selected by a user from application programs of the mobile terminal and storing the target application program in the secure space includes:
receiving an opening instruction of a user to the safe space, and responding to the opening instruction to open the safe space so as to enter an operation interaction interface of the safe space;
detecting selection operation of a user on an application program adding function on the operation interaction interface, and presenting an application program list based on the operation interaction interface, wherein the application program list comprises all application programs of the mobile terminal;
and monitoring the selection operation of a user on the target application program on the application program list, and saving the target application program to the safe space.
3. The method according to claim 2, wherein after detecting a target application selected by a user from applications of the mobile terminal and saving the target application to the secure space, the method further comprises:
hiding the secure space on the mobile terminal user interface upon detecting exit from the secure space.
4. The method according to claim 1, wherein while the obtaining of the setup instruction in response to the prompt message, which is input by the user at the user interface of the mobile terminal, and before the unsealing of the reserved storage space of the mobile terminal, taking the reserved storage space as the secure space, and obtaining and saving the basic information of the NFC tag as the verification key of the secure space, the method further comprises:
acquiring a fingerprint image of a user while acquiring a setup instruction which is input by the user on the user interface of the mobile terminal and responds to the prompt message;
identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and if so, executing the steps of unsealing the reserved storage space of the mobile terminal according to the establishment instruction, taking the reserved storage space as the secure space, and acquiring and storing the basic information of the NFC label as the verification key of the secure space.
5. A method for realizing security application is characterized in that a Near Field Communication (NFC) module is arranged in a mobile terminal, and the method comprises the following steps:
detecting an NFC tag outside the mobile terminal through the NFC module;
after the NFC tag is detected, reading basic information of the NFC tag;
identifying whether the type of the NFC tag is a type which is allowed to be used for establishing a security space and is set by a user according to the basic information of the NFC tag;
if so, judging whether the equipment where the NFC label is located is bound with the mobile terminal;
if so, judging whether the basic information of the NFC label is matched with a stored verification key; the verification key is basic information of a target NFC label used for establishing a secure space;
when the basic information of the NFC label is matched with the verification key, fingerprint images of the user are collected;
identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and if so, displaying the safe space on the user interface of the mobile terminal, wherein the safe space stores target application programs, and the target application programs are selected from the application programs of the mobile terminal.
6. The method of claim 5, wherein after displaying the secure space on the mobile terminal user interface when the basic information of the NFC tag matches the authentication key, the method further comprises:
receiving an opening instruction of a user to the safe space;
an operation interaction interface for responding to the opening instruction to open the safe space so as to enter the safe space;
and displaying the target application program on the operation interactive interface.
7. The method according to claim 5 or 6, wherein after displaying the secure space on the mobile terminal user interface, the method further comprises:
hiding the secure space on the mobile terminal user interface upon detecting exit from the secure space.
8. The method of claim 5, wherein when the basic information of the NFC tag matches the authentication key and before displaying the secure space on the mobile terminal user interface, the method further comprises:
when the basic information of the NFC label is matched with the verification key, fingerprint images of the user are collected;
identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and if the security space is matched with the security space, displaying the security space on the user interface of the mobile terminal.
9. A mobile terminal is characterized in that a Near Field Communication (NFC) module is arranged in the mobile terminal, and the mobile terminal comprises:
a first tag detection unit, configured to detect, by the NFC module, an NFC tag outside the mobile terminal;
a setup prompting unit, configured to pop up, on the user interface of the mobile terminal, a prompting message for inquiring whether to setup a security space in the mobile terminal after the first tag detection unit detects the NFC tag;
the first instruction response unit is used for acquiring a setup instruction which is input by a user on the user interface of the mobile terminal and responds to the prompt message;
the first acquisition unit is used for acquiring a fingerprint image of the user while the first instruction response unit acquires a setup instruction which is input by the user on a user interface of the mobile terminal and responds to the prompt information;
the first fingerprint identification unit is used for identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
the space establishing unit is used for reading the basic information of the NFC tag when the first fingerprint identification unit identifies that the fingerprint image is matched with a prestored fingerprint image, and identifying whether the type of the NFC tag is the type which is allowed to be used for establishing a safety space and is set by a user according to the basic information of the NFC tag; if so, unsealing the reserved storage space of the mobile terminal according to the establishment instruction, taking the reserved storage space as the secure space, and acquiring and storing the basic information of the NFC label as a verification key of the secure space;
and the application selection unit is used for detecting a target application program selected by a user from the application programs of the mobile terminal and storing the target application program in the safe space.
10. The mobile terminal of claim 9, wherein the mobile terminal further comprises:
the first display unit is used for unsealing the reserved storage space of the mobile terminal according to the establishment instruction by the space establishment unit, using the reserved storage space as the secure space, acquiring and storing the basic information of the NFC label as the verification key of the secure space, and displaying the secure space on the user interface of the mobile terminal;
the application selection unit specifically includes:
the first opening unit is used for receiving an opening instruction of a user for the safe space and responding to the opening instruction to open the safe space so as to enter an operation interaction interface of the safe space;
the list presentation unit is used for detecting the selection operation of a user on the application program adding function on the operation interaction interface and presenting an application program list based on the operation interaction interface, wherein the application program list comprises all application programs of the mobile terminal;
and the saving unit is used for monitoring the selection operation of the user on the target application program on the application program list and saving the target application program to the safe space.
11. The mobile terminal of claim 10, wherein the mobile terminal further comprises:
the first hiding unit is used for hiding the secure space on the user interface of the mobile terminal after the application selecting unit detects the target application program selected by the user from the application programs of the mobile terminal and stores the target application program in the secure space and detects that the user exits the secure space.
12. The mobile terminal of claim 9, wherein the mobile terminal further comprises:
the first acquisition unit is used for acquiring a fingerprint image of the user before the first instruction response unit acquires a setup instruction which is input by the user at the user interface of the mobile terminal and responds to the prompt information, the space setup unit unpacks the reserved storage space of the mobile terminal according to the setup instruction, the reserved storage space is used as the safety space, and the basic information of the NFC label is acquired and used as a verification key of the safety space and is stored;
the first fingerprint identification unit is used for identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and the space establishing unit is used for unsealing the reserved storage space of the mobile terminal according to the establishing instruction when the first fingerprint identification unit identifies that the fingerprint image is matched with the pre-stored fingerprint image, taking the reserved storage space as the safety space, and acquiring and storing the basic information of the NFC label as the verification key of the safety space.
13. A mobile terminal is characterized in that a Near Field Communication (NFC) module is arranged in the mobile terminal, and the mobile terminal comprises:
the second tag detection unit is used for detecting an NFC tag outside the mobile terminal through the NFC module;
a reading unit, configured to read basic information of the NFC tag after the second tag detection unit detects the NFC tag; identifying whether the type of the NFC tag is a type which is allowed to be used for establishing a security space and is set by a user according to the basic information of the NFC tag;
a key judgment unit, configured to judge whether the basic information of the NFC tag matches a stored verification key if the reading unit identifies whether the type of the NFC tag is a type that is set by a user and allowed to be used for establishing a secure space; the verification key is basic information of a target NFC label used for establishing a secure space;
the second fingerprint identification unit is used for acquiring a fingerprint image of the user when the key judgment unit determines that the basic information of the NFC label is matched with the verification key; identifying whether the fingerprint image is matched with a prestored fingerprint image of an authorized user of the mobile terminal;
and the second display unit is configured to display the secure space on the user interface of the mobile terminal if the key determination unit determines that the basic information of the NFC tag matches the verification key if the second fingerprint identification unit identifies a match, where the secure space stores a target application program, and the target application program is selected from application programs of the mobile terminal.
14. The mobile terminal of claim 13, wherein the mobile terminal further comprises:
the receiving unit is used for receiving an opening instruction of a user to the secure space when the key judging unit determines that the basic information of the NFC tag is matched with the verification key and the second display unit displays the secure space on the user interface of the mobile terminal;
the second response unit is used for responding to the opening instruction to open the safe space so as to enter the operation interaction interface of the safe space;
and the third display unit is used for displaying the target application program on the operation interaction interface.
15. The mobile terminal according to claim 13 or 14, characterized in that the mobile terminal further comprises:
and the second hiding unit is used for hiding the safety space on the user interface of the mobile terminal after the second display unit displays the safety space on the user interface of the mobile terminal and detects that the safety space exits from the safety space.
16. The mobile terminal of claim 13, wherein the mobile terminal further comprises:
the second acquisition unit is used for acquiring a fingerprint image of a user when the key judgment unit determines that the basic information of the NFC tag is matched with the verification key and before the second display unit displays the security space on the user interface of the mobile terminal;
the second fingerprint identification unit is used for identifying whether the fingerprint image is matched with a prestored fingerprint image of the authorized user of the mobile terminal;
and the second display unit is used for displaying the safety space on the user interface of the mobile terminal when the second fingerprint identification unit identifies that the fingerprint image is matched with the pre-stored fingerprint image.
17. A mobile terminal, comprising:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the implementation method of the security application according to any one of claims 1 to 4 or the implementation method of the security application according to any one of claims 5 to 8.
18. A computer-readable storage medium, characterized in that it stores a computer program for electronic data exchange, wherein the computer program causes a computer to execute a method of implementing a secure application according to any one of claims 1 to 4 or a method of implementing a secure application according to any one of claims 5 to 8.
CN201710547838.6A 2017-07-06 2017-07-06 Implementation method of security application and mobile terminal Active CN107392006B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710547838.6A CN107392006B (en) 2017-07-06 2017-07-06 Implementation method of security application and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710547838.6A CN107392006B (en) 2017-07-06 2017-07-06 Implementation method of security application and mobile terminal

Publications (2)

Publication Number Publication Date
CN107392006A CN107392006A (en) 2017-11-24
CN107392006B true CN107392006B (en) 2020-09-04

Family

ID=60335618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710547838.6A Active CN107392006B (en) 2017-07-06 2017-07-06 Implementation method of security application and mobile terminal

Country Status (1)

Country Link
CN (1) CN107392006B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881496B (en) * 2018-08-15 2021-06-08 广东小天才科技有限公司 Download management method of application program, telephone watch and mobile phone terminal
CN111093177A (en) * 2018-10-23 2020-05-01 上海博泰悦臻电子设备制造有限公司 Application account synchronization method, vehicle machine and vehicle

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105188016A (en) * 2015-08-11 2015-12-23 努比亚技术有限公司 Terminal privacy protection system and method
CN106886416A (en) * 2017-03-08 2017-06-23 北京小米移动软件有限公司 Multi-User Dimension processing method and processing device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105188016A (en) * 2015-08-11 2015-12-23 努比亚技术有限公司 Terminal privacy protection system and method
CN106886416A (en) * 2017-03-08 2017-06-23 北京小米移动软件有限公司 Multi-User Dimension processing method and processing device

Also Published As

Publication number Publication date
CN107392006A (en) 2017-11-24

Similar Documents

Publication Publication Date Title
CN106293751B (en) Method for displaying information on terminal equipment and terminal equipment
CN106778175B (en) Interface locking method and device and terminal equipment
CN108629580B (en) Screen-off payment method and mobile terminal
CN106658489B (en) Terminal application processing method and device and mobile terminal
CN106302653B (en) Control authority sharing method of access control terminal and related equipment
EP3644203B1 (en) Unlocking control method and related product
KR20140060757A (en) Apparatas and method for controlling a input means of payment function in an electronic device
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN108551521B (en) Login information prompting method and mobile terminal
CN105653220B (en) Screen data display method and device in remote control
CN113766672A (en) Connection establishing method and equipment
CN106469028B (en) A kind of data migration method and mobile terminal
CN107911818B (en) Method and device for data transmission between mobile terminals and mobile terminal
CN107704182B (en) Code scanning method and mobile terminal
CN111125770A (en) Privacy protection method and electronic equipment
CN107369017A (en) Quick payment implementation method and Related product
CN107272985B (en) Notification message processing method and related product
CN107480495B (en) Unlocking method of mobile terminal and related product
CN107392006B (en) Implementation method of security application and mobile terminal
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
CN108287738A (en) A kind of application control method and device
CN109151779B (en) Neighbor Awareness Network (NAN) access method and related product
CN108600492B (en) Screen unlocking method and terminal
CN107633161B (en) Terminal for access control of protected data and related product
CN110062929A (en) A kind of method, apparatus and terminal showing data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant