CN1622667A - Method cipher stealing information detecting mobile communication terminal set - Google Patents
Method cipher stealing information detecting mobile communication terminal set Download PDFInfo
- Publication number
- CN1622667A CN1622667A CNA2004100708153A CN200410070815A CN1622667A CN 1622667 A CN1622667 A CN 1622667A CN A2004100708153 A CNA2004100708153 A CN A2004100708153A CN 200410070815 A CN200410070815 A CN 200410070815A CN 1622667 A CN1622667 A CN 1622667A
- Authority
- CN
- China
- Prior art keywords
- cipher
- password
- input
- user
- stealing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/10—Scheduling measurement reports ; Arrangements for measurement reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Abstract
The invention relates to a method for detecting cipher stealing information of a mobile communication terminal set, relates to a mobile communication field. The invention is capable of preventing a cipher of a user terminal set from being stealed by others, and saving corresponding stealing record for being checked by the user, the method comprises following steps: setting a cipher stealing detection condition; inputting the cipher via a cipher input window in a screen menu; comparing the inputted cipher with the saved user's cipher, if they are not the same, judging whether the cipher is accorded with the set cipher stealing detection condition; if the cipher is accorded with the set cipher stealing detection condition, the system instantly outputting a detection information an an alarming voice related to lawless cipher stealing; selecting a hacker history menu, and when the cipher is accorded with the set cipher stealing detection condition, displaying the error inputted cipher and the error cipher inputting time data. With the invention, cipher of the user terminal set can be prevented from being stealed by others except for the user, and the cipher error input history can be checked.
Description
Technical field
The present invention relates to field of mobile terminals, particularly a kind of method of cipher stealing information detecting mobile communication terminal set, this method can prevent other people usurping the user terminal password.
Background technology
Provide the protection user terminal required lock function by mobile communication terminal machine; at this lock function after setting completed; in case system transfers the state that terminating machine is powered to from the state of powered-down,, just must import the user cipher that has been provided with for normal this terminating machine that uses.
That is to say, when the user dynamo-electric source of opening a terminal, during starting drive, what at first eject is the user cipher input window, when the user cipher of having preserved in password that the user inputs in this window and the system was consistent, the user promptly can enable this terminal function, if but when the inconsistent situation of password takes place, system will require the user to re-enter password, till the password of importing accurately.Certainly, for the project that requires to input password, for example when entering system, just must re-enter password one time with terminating machine management function.
Moreover, also be provided with the individual privacy protection project that to protect terminating machine major function (for example, terminating machine management function) and basic function in the system.In case the user has started this function, as long as use a terminating machine, the user will import user cipher one time.For example, the user needs the input user cipher in order to converse, and the character message that receives in order to confirm also needs to import user cipher.By this function, other people just can't arbitrarily use this user's terminating machine, have just guaranteed that also user's individual privacy is not let out.
But to existing mobile communication terminal machine, the number of times of input password will not be subjected to any restriction, only need to judge password that the user imports whether with user cipher consistent the getting final product whether that is kept in the system.For this user terminal, because the password input is not subjected to the restriction of number of times, other people just have an opportunity not limit number of times ground constantly to carry out the password input and attempt, till the password that has been provided with in the password of being inputed and system is consistent, and because this input is attempted can not leaving any record, the user also can't learn extraneous other people the use attempt to own terminating machine.
As mentioned above, because the restriction of number of times or not in the input of the password of existing mobile communication terminal machine, and only need judge that password that the user inputs is whether consistent with the user cipher preserved in the system.Thereby this mode exists and causes other people illegally to usurp user cipher easily and problem that the user knows nothing this behavior of usurping.
Summary of the invention
In order to solve the problems referred to above that prior art exists in actual mechanical process, the objective of the invention is to provide a kind of method of cipher stealing information detecting mobile communication terminal set for the user, this method with the input bad password and be kept at input time in the internal memory, when if the bad password of input meets the cipher stealing detecting condition that is provided with in advance by the user, system is about to this operation judges for the cipher stealing attempt is arranged, by display screen prompting user, show the people and just attempting to usurp the detecting information of user cipher, also send alarm sound simultaneously, thereby can prevent other people usurping effectively the user terminal password.
Simultaneously, aim of the present invention also is by a kind of method of cipher stealing information detecting mobile communication terminal set is provided, so that with the bad password of input be kept in chronological order input time in the internal memory, can confirm password mistake input history to guarantee the user.
In order to realize above purpose, the invention provides a kind of special mechanism, it is characterized in that: this mechanism comprises the steps: at first, and cipher stealing detecting condition is set; The user cipher of preserving in password and the system with input compares, and judges whether both are consistent, if there is inconsistent situation, judges further that then the cipher stealing whether this situation meets above setting detects condition; Through judging, if think that it meets the cipher stealing detecting condition of above setting, system promptly exports with this and illegally usurps password behavior relevant detecting information and alarm sound.
Described cipher stealing detecting condition has following feature: whether the number of times of judging input password mistake within the special time of system's setting has surpassed given number of times.
The preserving type of described bad password and time has following feature: if when the password of above-mentioned input there are differences with the user cipher preserved, system preserves the wrong password of input and the data such as input time of this bad password with form.
The bad password of above-mentioned input of preserving with form and the affirmation process of this password input time is characterized in that described process comprises the steps: to select hacker's history menu, and by shown password input window mouth input password; When the password of being inputed is consistent with the user cipher of having preserved, can show the password that above input is wrong and data input time of this bad password.
The data such as input time of above-mentioned preservable bad password and this bad password have following feature: above-mentioned bad password and this bad password data bulk input time (N) preserved can be set, after the data bulk of preserving has reached the described particular value that sets in advance, if import next (N+1) data again, holding time data the earliest are promptly deleted, and the data that will newly import are kept in the zone of the intact legacy data of firm deletion.
Described prompting user's cipher stealing detecting information and alarm sound have following feature: if user's input with preserved user cipher corresponding to, accurately during password, above error message demonstration and alarm sound can be removed immediately.
Beneficial effect of the present invention is, can prevent except that the user other people effectively to the usurping of user terminal password, and the password input error history of preserving in can the affirmation system.
Description of drawings
Fig. 1 is the embodiment flow chart of relevant in the present invention mobile communication terminal machine cipher stealing information method for detecting;
Fig. 2 is the operational flowchart that history is confirmed of usurping to having preserved in the present invention;
Fig. 3 be on display window, show among the present invention usurp history display interface schematic diagram.
Embodiment
Below, carry out following detailed description for the present invention in conjunction with the accompanying drawings.
Fig. 1 is the embodiment flow chart of relevant in the present invention mobile communication terminal machine cipher stealing information method for detecting.As shown in the figure, this method for detecting comprises the steps: at first, enters the hacker who is provided with and detect menu on terminating machine, input (setting) cipher stealing detecting condition; After the above cipher stealing detecting condition of input,, judge whether the password of input is consistent with the user cipher of preserving in advance by the password input field input password that on window, shows; If through judging, not consistent between the password of confirming input and the preset user password, and, within the time of appointment, when the number of times that the password input error occurs exceeded set numerical value (cipher stealing detecting condition), system promptly exports illegally to be usurped password with this and attempts corresponding detecting information and alarm sound; If within the time of appointment, the number of times that the password input error occurs does not exceed set numerical value, and system returns the step of re-entering password.
The input number of times of above-mentioned input error password, be included in the user as the data such as preset time of basis for estimation and detect within the cipher stealing detecting condition set behind the menu by entering the hacker, have only after inputing accurately password, could remove the cipher stealing detecting reminding information and the alarm sound that are produced.
And, for the wrong input password and the data such as input time of this password, be with the form of form by input time order be kept in the internal memory of terminating machine inside, the preservation state of these data and the on off state of power supply are irrelevant.
According to the above step that constitutes of the present invention, its operational mode is carried out system specialization below.
At first, the terminating machine user by the password hacker menu that is provided by terminal, is provided with cipher stealing detecting condition in order to detect the attempt that other users usurp password.For example, above cipher stealing detecting condition can be provided with by following mode: within the time (for example 1 minute) of appointment, input error password number of times can not exceed given number of times (for example 3 times), perhaps under the condition that is not subjected to restriction input time, the number of times of input password can not exceed predetermined number of times (for example 10 times) etc.And, before entering above related menu, the corresponding to password of user cipher that must input Yu in system, preserve.
After above cipher stealing detecting condition setting is finished; in case the situation of input password needing to occur; for example; in the time of under above-mentioned terminating machine has been in the lock function that sets in advance or the protection of individual privacy defencive function; the user is for other functions of using terminating machine or in order to enter the terminating machine manager system; just need import corresponding password within the password input window mouth in display screen; after the password input was finished, system will judge also whether this password is consistent with the user cipher that is kept in the system.
Through above deterministic process, if confirm two password unanimities, can carry out function corresponding, if find to exist between the two when inconsistent, system will compare with the cipher stealing detecting condition that sets in advance.For example, suppose that cipher stealing detecting condition is " occurring password input error more than 3 times within 1 minute? " at this moment, if when can only password input error frequency being no more than more than 3 times in one minute, before inputing accurately password, can repeat the display password input window on the screen always; In case satisfy above cipher stealing detecting condition, when the password input error promptly within 1 minute, occurring more than 3 times, detecting information (for example " hacker finds Hacking Detection ") is usurped by system's output password immediately, and the alarm sound that sets in advance (the tinkle of bells), and will there be the people attempting to usurp the advisory user of password.
If above-mentioned cipher stealing detecting reminding information and alarm sound that deactivation system produced must be inputed password accurately.Simultaneously, the password that relevant input is wrong and the data such as input time of this password will be stored in the internal memory with form, and the user can confirm to be kept at intrasystem password input error history (history).
Fig. 2 has represented to confirm above password input error (cipher stealing) historical process, for cipher stealing history is confirmed, need at first input password, have only when the input password be kept at user cipher in the system when consistent, just have the right to carry out the historical affirmation process of password input error (cipher stealing).
For the menu of above affirmation cipher stealing history, both can it be set to subordinate's menu that the hacker detects menu, also can be set to independently menu.If confirm that menu setting for the hacker detects subordinate's menu of menu, then enters menu and also must input password, and detect menu in case enter this hacker with above cipher stealing is historical, just can directly enter the historical affirmation of cipher stealing menu.
After entering that above-mentioned cipher stealing is historical and confirming menu, as shown in Figure 3, be stored in the wrong password of input in the internal memory and the data such as input time of this password and all can be presented on the display screen according to the sequencing of input time.That is to say, show to the such order of data of preserving at first by data from up-to-date preservation.The quantity (N) of the cipher stealing history that allows to be kept in the internal memory can be set by terminal system, after preservation quantity reaches this value of setting (N), the data of follow-up input will cover the longest data of holding time, that is preserve the data of this new input in this deletion zone.
As described in above detailed description, can produce following effect by the present invention: if the password input error, system can and be saved in the internal memory with this bad password input time, if this password input error situation meets when detecting condition by the cipher stealing of user's setting in advance, system will think that it has the attempt of usurping password, existing side by side soon, cipher stealing detecting information is presented on the display screen, produce alarm sound simultaneously, thereby can prevent other people the usurping except that the user effectively the user terminal password.
Simultaneously, the present invention can also produce following effect: be stored in the internal memory password input error history that the user preserves in promptly can the affirmation system by the information such as input time that order will be inputed wrong password and this password data input time.
Above embodiment only is used to illustrate the present invention, but not is used to limit the present invention.
Claims (8)
1. the method for a cipher stealing information detecting mobile communication terminal set is characterized in that, described method comprises the steps: step 1, and cipher stealing detecting condition is set; Whether the user cipher of preservation is consistent in the step 2, the password of relatively being inputed and system, if exist when inconsistent, judges further whether it meets by the cipher stealing of described condition setting to detect condition; Step 3 is through above deterministic process, if system thinks that output was about illegally usurping the detecting information and the alarm sound of password immediately when it met above cipher stealing detecting condition.
2. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 1, it is characterized in that: utilize described cipher stealing detecting condition, judge whether password mistake input number of times has surpassed given number of times within set certain hour.
3. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 1, it is characterized in that:, preserve the wrong password of input and the data such as input time of this bad password with form if when the user cipher of having preserved in the password of described input and the system there are differences.
4. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 3, it is characterized in that: confirm the password that described input of preserving with form is wrong and the step of this password input time, comprise and select hacker's history menu, and by shown password input window mouth input password; When the user cipher of preserving in this password of being inputed and the system is consistent, can show data such as password that above input is wrong and this bad password input time.
5. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 4 is characterized in that: being stored in data such as the wrong password of input in the internal memory and the input time of this password is to show for order to the data of preserving at first according to the data from nearest preservation.
6. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 3, it is characterized in that: the quantity of the data such as input time of preservable wrong password and this bad password can not surpass the data bulk (N) that pre-sets, after the data bulk of preserving has reached this value of setting, if when importing the next one (N+1) data again, be about to delete holding time data the earliest, and the data that will newly import are kept in the zone of the intact legacy data of firm deletion.
7. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 1, it is characterized in that: when the user inputed with system in the user cipher preserved corresponding to, accurately during password, can remove detecting information and the alarm sound relevant with illegally usurping password.
8. the method for a kind of cipher stealing information detecting mobile communication terminal set according to claim 1, it is characterized in that also comprising the steps: through described deterministic process, when if described operation does not meet the cipher stealing detecting condition of above setting, system will continue the display password input window, and the chance of re-entering password is provided for the user.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020030084648A KR20050050976A (en) | 2003-11-26 | 2003-11-26 | Method for detecting password's hacking of mobile communication terminal |
KR1020030084648 | 2003-11-26 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1622667A true CN1622667A (en) | 2005-06-01 |
CN100459757C CN100459757C (en) | 2009-02-04 |
Family
ID=34793117
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004100708153A Expired - Fee Related CN100459757C (en) | 2003-11-26 | 2004-07-20 | Method cipher stealing information detecting mobile communication terminal set |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20050050976A (en) |
CN (1) | CN100459757C (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103413081A (en) * | 2013-08-29 | 2013-11-27 | 惠州Tcl移动通信有限公司 | After-password-input prompt method, password modifying method and electronic equipment |
CN105094664A (en) * | 2015-06-10 | 2015-11-25 | 小米科技有限责任公司 | Terminal device privacy protection method and apparatus |
CN106295276A (en) * | 2016-08-09 | 2017-01-04 | 浪潮电子信息产业股份有限公司 | A kind of user of record inputs the method that BIOS password enters system |
CN112419627A (en) * | 2020-11-20 | 2021-02-26 | 深圳市捷诚技术服务有限公司 | POS machine PIN input protection method and device, storage medium and POS machine |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110225648A1 (en) * | 2010-03-15 | 2011-09-15 | Intuit Inc. | Method and apparatus for reducing the use of insecure passwords |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE60132962T2 (en) * | 2000-01-21 | 2009-02-26 | Sony Corp. | DATA PROCESSING DEVICE AND DATA PROCESSING METHOD |
CN100401734C (en) * | 2001-09-08 | 2008-07-09 | 中兴通讯股份有限公司 | Self-alarming and anti-theft method for mobile terminals |
-
2003
- 2003-11-26 KR KR1020030084648A patent/KR20050050976A/en not_active Application Discontinuation
-
2004
- 2004-07-20 CN CNB2004100708153A patent/CN100459757C/en not_active Expired - Fee Related
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103413081A (en) * | 2013-08-29 | 2013-11-27 | 惠州Tcl移动通信有限公司 | After-password-input prompt method, password modifying method and electronic equipment |
CN103413081B (en) * | 2013-08-29 | 2016-08-31 | 惠州Tcl移动通信有限公司 | A kind of input reminding method, password amending method and electronic equipment after password |
CN105094664A (en) * | 2015-06-10 | 2015-11-25 | 小米科技有限责任公司 | Terminal device privacy protection method and apparatus |
CN106295276A (en) * | 2016-08-09 | 2017-01-04 | 浪潮电子信息产业股份有限公司 | A kind of user of record inputs the method that BIOS password enters system |
CN112419627A (en) * | 2020-11-20 | 2021-02-26 | 深圳市捷诚技术服务有限公司 | POS machine PIN input protection method and device, storage medium and POS machine |
CN112419627B (en) * | 2020-11-20 | 2021-10-08 | 深圳市捷诚技术服务有限公司 | POS machine PIN input protection method and device, storage medium and POS machine |
Also Published As
Publication number | Publication date |
---|---|
CN100459757C (en) | 2009-02-04 |
KR20050050976A (en) | 2005-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103077356B (en) | Protecting and tracking method for primary information of mobile terminal based on user behavior pattern | |
US20190334721A1 (en) | Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal | |
US20140245457A1 (en) | Method and device for initiating privacy mode of data processing apparatus | |
CN109979047B (en) | Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock | |
CN104794405A (en) | Method and system for achieving private storage of messages | |
CN105827817A (en) | Alarm method and mobile terminal | |
US7409563B2 (en) | Method and apparatus for preventing un-authorized attachment of computer peripherals | |
CN109407663B (en) | Unmanned information safety guarantee method and system based on block chain | |
CN105577911A (en) | Terminal management method and terminal | |
CN106021010A (en) | Processing method and device for anomaly of proximity detector | |
CN105184184A (en) | Anti-theft method for terminal data | |
CN100459757C (en) | Method cipher stealing information detecting mobile communication terminal set | |
CN1731408A (en) | A restoration method for loss of embedded security protection equipment manager password | |
WO2016072833A1 (en) | System and method to disable factory reset | |
CN103618834A (en) | Displaying method for short message reminding and mobile terminal | |
CN106874795B (en) | Mobile terminal and machine disassembly prevention method and device thereof | |
CN104796885A (en) | Method and system for realizing private conversation in conversation process | |
CN106127034B (en) | A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment | |
CN112507308A (en) | Identity recognition and authentication method | |
CN106303371A (en) | Take pictures monitoring system, method and mobile terminal | |
CN103118361A (en) | Recording method and device based on signaling detection system | |
CN113449269B (en) | Core module activation method and device and storage medium | |
CN115437346A (en) | Diagnosis method and device of vehicle-mounted system and electronic equipment | |
CN115794469A (en) | Data asset processing method and device | |
KR101560402B1 (en) | Apparatus and method of providing automatic lock function in mobile communication terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090204 |