WO2017035943A1 - 一种连接外接设备的方法、装置及移动终端 - Google Patents

一种连接外接设备的方法、装置及移动终端 Download PDF

Info

Publication number
WO2017035943A1
WO2017035943A1 PCT/CN2015/093535 CN2015093535W WO2017035943A1 WO 2017035943 A1 WO2017035943 A1 WO 2017035943A1 CN 2015093535 W CN2015093535 W CN 2015093535W WO 2017035943 A1 WO2017035943 A1 WO 2017035943A1
Authority
WO
WIPO (PCT)
Prior art keywords
external device
user space
access
identification code
terminal
Prior art date
Application number
PCT/CN2015/093535
Other languages
English (en)
French (fr)
Inventor
刘亚鑫
叶瑞权
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017035943A1 publication Critical patent/WO2017035943A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a method, an apparatus, and a mobile terminal for connecting an external device.
  • the smart terminals it is possible to connect external devices, such as Bluetooth headsets, smart watches and other devices.
  • external devices such as Bluetooth headsets, smart watches and other devices.
  • the way in which the smart terminal connects to the external device is directly connected in the current user state, and the external device is directly enabled, and then the security of the external device is verified.
  • the external device Since the prior art is that the external device is first connected to the smart terminal and then the security is detected, the external device is directly connected to the normal user space of the smart terminal for access. If the external device has a security problem, the smart device is detected when the device has a problem. The data in the terminal may have been corrupted or stolen, and the user experience is low.
  • the invention provides a method, a device and a mobile terminal for connecting an external device, so as to at least solve the problem that the external device is connected to the intelligent terminal first and then the security is detected. If the external device has a security problem, the detection is detected. When the device has a problem, the data in the smart terminal may have been destroyed or stolen, and the user experience is low.
  • the present invention provides a method for connecting an external device, including: when receiving a connection request of an external device, allocating an independent user space by using a multi-domain space technology; and accepting a connection request of the external device Connecting the external device to the independent user space to detect security of the external device within the independent user space.
  • the method further includes: determining whether the external device has a unique identification code, wherein the unique identification code is that the terminal accesses the terminal for the first time in the external device And generating, in the absence of the unique identification code, a unique identification code corresponding to the external device according to the current detection time, to access the external device to the independent user by using the unique identification code Space; in the case of having the unique identification code, determining whether to access the independent user space according to the unique identification code.
  • determining whether to access the independent user space according to the unique identifier includes: determining, according to the unique identifier, whether a time difference between the connection and the last access to the terminal is within a preset time range; When the time difference is within the preset time range, connecting the external device to a normal user space of the terminal; if the time difference is not within the preset time range, connecting the external device to The independent user space.
  • the method further includes: connecting the external device to the normal user of the terminal if the security of the external device meets a preset standard Space to achieve normal access; disconnect the connection with the peripheral device if the security of the external device does not meet the preset criteria.
  • the method further includes: recording a unique identification code of the peripheral device, to block according to the unique identification code when the external device requests to access the terminal again The access operation of the external device.
  • the present invention provides an apparatus for connecting an external device, comprising: an allocation module, configured to allocate an independent user space by using a multi-domain space technology when receiving a connection request of the external device; And in the case of accepting the connection request of the external device, connecting the external device to the independent user space to detect the security of the external device in the independent user space.
  • the device further includes: a determining module, configured to determine whether the external device has a unique identification code, where the unique identification code is generated by the terminal when the external device accesses the terminal for the first time a generating module for using the current identification without the unique identification code Generating a unique identification code corresponding to the external device to access the external device through the unique identification code; the access module is configured to have the unique identifier And determining whether to access the independent user space according to the unique identifier.
  • a determining module configured to determine whether the external device has a unique identification code, where the unique identification code is generated by the terminal when the external device accesses the terminal for the first time a generating module for using the current identification without the unique identification code Generating a unique identification code corresponding to the external device to access the external device through the unique identification code
  • the access module is configured to have the unique identifier And determining whether to access the independent user space according to the unique identifier.
  • the access module includes: a determining unit, configured to determine, according to the unique identification code, whether a time difference between the connection and the last access to the terminal is within a preset time range; and the access unit is used in the When the time difference is within the preset time range, connecting the external device to a normal user space of the terminal; if the time difference is not within the preset time range, connecting the external device to The independent user space.
  • the access module is further configured to connect the external device to a normal user space of the terminal to achieve normal access when the security of the external device meets a preset standard; and the external device If the security does not meet the preset criteria, disconnect the peripheral device.
  • the device further includes: a recording module, configured to record a unique identifier of the peripheral device after disconnecting the connection with the peripheral device, to request access to the terminal again at the external device And blocking the access operation of the external device according to the unique identifier.
  • a recording module configured to record a unique identifier of the peripheral device after disconnecting the connection with the peripheral device, to request access to the terminal again at the external device And blocking the access operation of the external device according to the unique identifier.
  • the present invention provides a mobile terminal, comprising: the apparatus for connecting an external device according to any one of the above.
  • the present invention When receiving the connection request of the external device, the present invention allocates an independent user space through the multi-domain space technology, and accesses the external device to access the independent user space to detect the security of the external device. At this time, even if there is a security problem with the external device, since it is connected to an independent user space, it is not the normal user space of the terminal. Therefore, the data in the terminal is not destroyed or stolen, thereby improving the security of the system.
  • the prior art is that the external device is first connected to the smart terminal and then the security is detected. If the external device has a security problem, the data in the smart terminal may be destroyed or stolen when the device is detected to have a problem. Experience lower problems.
  • FIG. 1 is a flow chart of a method of connecting an external device in an embodiment of the present invention
  • FIG. 2 is a first structural diagram of an apparatus for connecting an external device according to an embodiment of the present invention
  • FIG. 3 is a second schematic structural diagram of an apparatus for connecting an external device according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a device access module for connecting an external device according to an embodiment of the present invention
  • FIG. 5 is a third schematic structural diagram of an apparatus for connecting an external device according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a connection structure of each functional module of a smart phone according to a preferred embodiment of the present invention.
  • the external device is first connected to the smart terminal and then the security is detected. If the external device has a security problem, the data in the smart terminal may be destroyed or stolen when the device is detected to have a problem.
  • the present invention provides a method, an apparatus, and a mobile terminal for connecting an external device. The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
  • the embodiment of the invention provides a method for connecting an external device.
  • the process of the method is as shown in FIG. 1 and includes steps S102 to S104:
  • the embodiment of the present invention allocates an independent user space through the multi-domain space technology, and accesses the external device to access the external user space to detect the external device.
  • Security at this time, even if there is a security problem with the external device, because it is connected to the independent user space, it is not the normal user space of the terminal. Therefore, the data in the terminal will not be destroyed or stolen, which improves the security of the system.
  • sexuality solves the problem that the external device first connects to the intelligent terminal and then detects the security. If the external device has a security problem, the data in the intelligent terminal may be destroyed or stolen when the device is detected to have a problem. , the user experience is lower.
  • the unique identification code is generated when the terminal accesses the terminal for the first time.
  • the unique identification code corresponding to the external device is generated according to the current detection time, and after the unique identification code is generated, the next time the external device wants to access the terminal, the identification can be passed.
  • the code confirms whether it can be accessed quickly.
  • the unique identification code is generated for the first time, it is necessary to connect the external device to the independent user space for security verification.
  • determining whether to access the independent user space according to the unique identification code includes: determining, according to the unique identification code, whether the time difference between the connection and the last access terminal is within a preset time range. If the time difference is within the preset time range, it means that the time to disconnect from the terminal is short, there is no security risk, and the external device can be directly connected to the normal user space of the terminal; if the time difference is not within the preset time range, It takes a long time to disconnect from the terminal, which may pose a security risk. Therefore, it is necessary to connect the external device to a separate user space for security detection.
  • the unique identification code of the peripheral device may be recorded first, when the external device requests the access terminal again, according to The unique identification code shields the access operation of the external device.
  • the embodiment of the present invention further provides an apparatus for connecting an external device.
  • the structure of the device is shown in FIG. 2, and includes: an allocating module 10, configured to allocate one by using a multi-domain space technology when receiving a connection request of the external device.
  • a separate user space the connection module 20 is coupled to the distribution module 10 for connecting the external device to the independent user space in the case of accepting the connection request of the external device, so as to detect the security of the external device in the independent user space. Sex.
  • FIG. 3 is a schematic diagram of still another structure of the foregoing device.
  • the device may further include: a determining module 30 coupled to the distribution module 10, configured to determine whether the external device has a unique identification code, wherein the unique identification code is external to the terminal.
  • the generating module 40 is configured to be coupled to the determining module 30, and configured to generate a unique identification code corresponding to the external device according to the current detection time without a unique identification code, so as to uniquely identify
  • the code accesses the external device to the independent user space; the access module 50 is coupled to the determining module 30 for determining whether to access the independent user space according to the unique identification code if the unique identification code is present.
  • the judging module 30 when the judging module 30 is coupled with the allocating module 10, the judging module 30 and the allocating module 10 are in an interactive relationship, and are not in the upper-lower relationship as shown in the figure, that is, when the allocating module 10 receives the external connection.
  • the determination module 30 determines the unique identification code, and determines whether the allocation module 10 allocates an independent user space according to the execution result of the generation module 40 and the access module 50.
  • the structure of the foregoing access module 50 is as shown in FIG. 4, and includes: a determining unit 501, configured to determine, according to the unique identifier, whether the time difference between the connection and the last access terminal is within a preset time range;
  • the unit 502 is coupled to the determining unit 501, configured to connect the external device to the normal user space of the terminal when the time difference is within the preset time range; and connect the external device if the time difference is not within the preset time range. To a separate user space.
  • the access module 50 is further configured to connect the external device to the normal user space of the terminal to achieve normal access when the security of the external device meets the preset standard; the security of the external device does not meet the pre-preparation. With the standard set, disconnect the peripheral device.
  • FIG. 5 further shows a schematic structural diagram of the above device.
  • the device may further include: a recording module 60 coupled to the access module 50 for After disconnecting the connection with the peripheral device, the unique identification code of the peripheral device is recorded to block the access operation of the external device according to the unique identification code when the external device requests the access terminal again.
  • the embodiment of the invention further provides a mobile terminal, which comprises the above device for connecting an external device.
  • a mobile terminal which comprises the above device for connecting an external device.
  • Embodiments of the present invention provide a smart phone, which is internally provided with a device for connecting an external device (also referred to as a peripheral device), which can be used in some situations where a user needs high security to connect an external device (such as a secure space of a mobile phone).
  • An external device connection method based on multi-domain technology is provided for detecting an external device that is accessed, and improving the security of the external device connected to the mobile phone.
  • connection structure of each functional module of the smart phone in the embodiment of the present invention is shown in FIG. 6, and includes: a peripheral judgment module, a user space management module, a peripheral connection processing module, and a peripheral detection module, and each module is also guided in FIG. The process of work. Next, the process of the smart phone operation will be described in conjunction with the modules in FIG. 6.
  • the peripheral judgment module When the mobile phone is to be connected to an external device, after the driver detects the external device, the peripheral judgment module first determines whether the connected external device is the first time the mobile phone is connected/the last connection time expires (whether the previous connection time exceeds the preset time) Value, if it needs to be re-detected). If yes, a corresponding judgment result is generated and transmitted to the user space management module and the peripheral connection processing module.
  • the user space management module temporarily generates a new user space according to the received judgment result, and the space is minimized, and is only used to detect the security of connecting the external device. Then processed by the peripheral connection The module connects the phone peripheral to this temporarily generated new space. Due to the characteristics of the multi-domain space technology, the peripherals connected to the mobile phone can only access/operate the data of the temporary space, thereby ensuring the security of the user data on the mobile phone.
  • the peripheral detecting module detects the external device connected to the mobile phone, and generates a unique identification code of the external device to the external device in combination with the current time, and the identification code is used to identify the external device and the upper device when connecting again in the future. Secondary connection time. When implemented, if it was previously generated, it will not be generated here.
  • the peripheral terminal determines the feedback result of the module to the peripheral connection processing module, so that it closes the connection between the mobile phone and the external device, and feeds the identification code to the peripheral judgment module.
  • the peripheral terminal determines the feedback result of the module to the peripheral connection processing module, so that the connection between the mobile phone and the external device is transferred to the normal user to access the normal user space, and at the same time The identification code is fed back to the peripheral judgment module.
  • the operation method of the embodiment of the invention is simple and fast, and does not require user participation; the external device with security risks can be effectively prevented from accessing and operating the mobile phone data, thereby improving the security performance of the system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种连接外接设备的方法、装置及移动终端,其中,该方法包括:在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间;在接受外接设备的连接请求的情况下,将外接设备连接至独立的用户空间,以在独立的用户空间内检测外接设备的安全性。本发明在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间,在接入外接设备时,将其接入到上述独立的用户空间内,以检测外接设备的安全性,此时,外接设备即使是存在安全问题,由于其连接的是独立的用户空间,并非终端正常的用户空间,因此,终端内的数据不会被破坏或者盗取,提升了系统的安全性,解决了现有技术的问题。

Description

一种连接外接设备的方法、装置及移动终端 技术领域
本发明涉及移动通讯领域,特别是涉及一种连接外接设备的方法、装置及移动终端。
背景技术
对于目前的智能终端,都是可以连接外接设备的,例如蓝牙耳机、智能手表等设备。然而,目前智能终端连接外接设备的方式都是直接在当前用户状态下连接,并直接启用外接设备,之后再对外接设备的安全性进行验证。
由于现有技术是外接设备先连接到智能终端然后再对安全性进行检测,外接设备直接连接到智能终端正常的用户空间进行访问,如果外接设备存在安全问题,则在检测到设备有问题时智能终端中的数据可能已被破坏或盗取,用户体验较低。
发明内容
本发明提供了一种连接外接设备的方法、装置及移动终端,以至少解决现有技术是外接设备先连接到智能终端然后再对安全性进行检测,如果外接设备存在安全问题,则在检测到设备有问题时智能终端中的数据可能已被破坏或盗取,用户体验较低的问题。
一方面,本发明提供一种连接外接设备的方法,包括:在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间;在接受所述外接设备的连接请求的情况下,将所述外接设备连接至所述独立的用户空间,以在所述独立的用户空间内检测所述外接设备的安全性。
进一步,在接收到外接设备的连接请求之后,还包括:判断所述外接设备是否具有唯一识别码,其中,所述唯一识别码为所述终端在所述外接设备第一次接入所述终端时生成的;在没有所述唯一识别码的情况下,根据当前检测时间生成一个所述外接设备对应的唯一识别码,以通过所述唯一识别码将所述外接设备接入所述独立的用户空间;在具有所述唯一识别码的情况下,根据所述唯一识别码确定是否接入所述独立的用户空间。
进一步,根据所述唯一识别码确定是否接入所述独立的用户空间包括:根据所述唯一识别码判断此次连接与上一次接入所述终端的时间差是否在预设时间范围内;在所述时间差在所述预设时间范围内的情况下,将所述外接设备连接至终端正常的用户空间;在所述时间差不在所述预设时间范围内的情况下,将所述外接设备连接至所述独立的用户空间。
进一步,在所述独立的用户空间内检测所述外接设备的安全性之后,还包括:在所述外接设备的安全性符合预设标准的情况下,将所述外接设备连接至终端正常的用户空间,以实现正常访问;在所述外接设备的安全性不符合预设标准的情况下,断开与所述外设设备的连接。
进一步,断开与所述外设设备的连接之后,还包括:记录所述外设设备的唯一识别码,以在所述外接设备再次请求接入所述终端时,根据所述唯一识别码屏蔽所述外接设备的接入操作。
另一方面,本发明还提供了一种连接外接设备的装置,包括:分配模块,用于在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间;连接模块,用于在接受所述外接设备的连接请求的情况下,将所述外接设备连接至所述独立的用户空间,以在所述独立的用户空间内检测所述外接设备的安全性。
进一步,所述装置还包括:判断模块,用于判断所述外接设备是否具有唯一识别码,其中,所述唯一识别码为所述终端在所述外接设备第一次接入所述终端时生成的;生成模块,用于在没有所述唯一识别码的情况下,根据当前检 测时间生成一个所述外接设备对应的唯一识别码,以通过所述唯一识别码将所述外接设备接入所述独立的用户空间;接入模块,用于在具有所述唯一识别码的情况下,根据所述唯一识别码确定是否接入所述独立的用户空间。
进一步,所述接入模块包括:判断单元,用于根据所述唯一识别码判断此次连接与上一次接入所述终端的时间差是否在预设时间范围内;接入单元,用于在所述时间差在所述预设时间范围内的情况下,将所述外接设备连接至终端正常的用户空间;在所述时间差不在所述预设时间范围内的情况下,将所述外接设备连接至所述独立的用户空间。
进一步,所述接入模块,还用于在所述外接设备的安全性符合预设标准的情况下,将所述外接设备连接至终端正常的用户空间,以实现正常访问;在所述外接设备的安全性不符合预设标准的情况下,断开与所述外设设备的连接。
进一步,所述装置还包括:记录模块,用于在断开与所述外设设备的连接之后,记录所述外设设备的唯一识别码,以在所述外接设备再次请求接入所述终端时,根据所述唯一识别码屏蔽所述外接设备的接入操作。
又一方面,本发明还提供了一种移动终端,包括:上述中任一项所述的连接外接设备的装置。
本发明在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间,在接入外接设备时,将其接入到上述独立的用户空间内,以检测外接设备的安全性,此时,外接设备即使是存在安全问题,由于其连接的是独立的用户空间,并非终端正常的用户空间,因此,终端内的数据不会被破坏或者盗取,提升了系统的安全性,解决了现有技术是外接设备先连接到智能终端然后再对安全性进行检测,如果外接设备存在安全问题,则在检测到设备有问题时智能终端中的数据可能已被破坏或盗取,用户体验较低的问题。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领 域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1是本发明实施例中连接外接设备的方法的流程图;
图2是本发明实施例中连接外接设备的装置的第一种结构示意图;
图3是本发明实施例中连接外接设备的装置的第二种结构示意图;
图4是本发明实施例中连接外接设备的装置接入模块的结构示意图;
图5是本发明实施例中连接外接设备的装置的第三种结构示意图;
图6是本发明优选实施例中智能手机各功能模块连接结构示意图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
为了解决现有技术是外接设备先连接到智能终端然后再对安全性进行检测,如果外接设备存在安全问题,则在检测到设备有问题时智能终端中的数据可能已被破坏或盗取,用户体验较低的问题,本发明提供了一种连接外接设备的方法、装置及移动终端,以下结合附图以及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不限定本发明。
本发明实施例提供一种连接外接设备的方法,该方法的流程如图1所示,包括步骤S102至S104:
S102,在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间;
S104,在接受外接设备的连接请求的情况下,将外接设备连接至独立的用 户空间,以在独立的用户空间内检测外接设备的安全性。
本发明实施例在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间,在接入外接设备时,将其接入到上述独立的用户空间内,以检测外接设备的安全性,此时,外接设备即使是存在安全问题,由于其连接的是独立的用户空间,并非终端正常的用户空间,因此,终端内的数据不会被破坏或者盗取,提升了系统的安全性,解决了现有技术是外接设备先连接到智能终端然后再对安全性进行检测,如果外接设备存在安全问题,则在检测到设备有问题时智能终端中的数据可能已被破坏或盗取,用户体验较低的问题。
在接收到外接设备的连接请求之后,还可以通过唯一识别码来确定是否可以快速的接入外接设备,即判断外接设备是否具有唯一识别码。其中,唯一识别码为终端在外接设备第一次接入终端时生成的。
在外接设备没有唯一识别码的情况下,根据当前检测时间生成一个外接设备对应的唯一识别码,生成该唯一识别码后,当下次该外接设备还想接入该终端时,就可以通过该识别码确认是否可以快速接入。当然,在此过程中,首次生成唯一识别码的情况下,是需要将外接设备接入独立的用户空间来进行安全性验证的。
在外接设备具有唯一识别码的情况下,根据唯一识别码确定是否接入独立的用户空间,具体包括:根据唯一识别码判断此次连接与上一次接入终端的时间差是否在预设时间范围内;如果时间差在预设时间范围内,说明与终端断开连接的时间较短,不存在安全隐患,可以重新将外接设备直接连接至终端正常的用户空间;如果时间差不在预设时间范围内,说明与终端断开连接的时间较长,可能存在安全隐患,因此,需要将外接设备连接至独立的用户空间进行安全性检测。
在独立的用户空间内检测外接设备的安全性之后,如果外接设备的安全性符合预设标准,则将外接设备连接至终端正常的用户空间,以实现正常访问;如果外接设备的安全性不符合预设标准,则说明存在安全隐患,断开与外设设 备的连接。
在断开与外设设备的连接之后,为了避免该外接设备发送请求时再次进行安全性检测等过程,可以先记录外设设备的唯一识别码,以在外接设备再次请求接入终端时,根据唯一识别码屏蔽外接设备的接入操作。
本发明实施例还提供一种连接外接设备的装置,该装置的结构示意如图2所示,包括:分配模块10,用于在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间;连接模块20,与分配模块10耦合,用于在接受外接设备的连接请求的情况下,将外接设备连接至独立的用户空间,以在独立的用户空间内检测外接设备的安全性。
图3示出了上述装置的又一种结构示意图,上述装置还可以包括:判断模块30,与分配模块10耦合,用于判断外接设备是否具有唯一识别码,其中,唯一识别码为终端在外接设备第一次接入终端时生成的;生成模块40,与判断模块30耦合,用于在没有唯一识别码的情况下,根据当前检测时间生成一个外接设备对应的唯一识别码,以通过唯一识别码将外接设备接入独立的用户空间;接入模块50,与判断模块30耦合,用于在具有唯一识别码的情况下,根据唯一识别码确定是否接入独立的用户空间。
在上述实施例中,判断模块30与分配模块10耦合时,是将判断模块30和分配模块10是存在交互关系的,并不是如图所示的上下级关系,即当分配模块10接收到外接设备的连接请求时,转向判断模块30来判断唯一标识码,再根据生成模块40和接入模块50等执行结果确定分配模块10是否分配一个独立的用户空间。
上述接入模块50的结构示意可以如图4所示,其包括:判断单元501,用于根据唯一识别码判断此次连接与上一次接入终端的时间差是否在预设时间范围内;接入单元502,与判断单元501耦合,用于在时间差在预设时间范围内的情况下,将外接设备连接至终端正常的用户空间;在时间差不在预设时间范围内的情况下,将外接设备连接至独立的用户空间。
在实现时,接入模块50还用于在外接设备的安全性符合预设标准的情况下,将外接设备连接至终端正常的用户空间,以实现正常访问;在外接设备的安全性不符合预设标准的情况下,断开与外设设备的连接。基于接入模块50的该功能,图5又示出了上述装置的一种结构示意图,在图3的基础上,该装置还可以包括:记录模块60,与接入模块50耦合,用于在断开与外设设备的连接之后,记录外设设备的唯一识别码,以在外接设备再次请求接入终端时,根据唯一识别码屏蔽外接设备的接入操作。
本发明实施例还提供一种移动终端,其包括上述的连接外接设备的装置。本领域技术人员根据上述记载,知晓如何将上述装置集成设置在移动终端中,此处不再赘述。需要说明的是,上述装置或移动终端在工作时,其内部的各模块在实现其功能时都是需要交互的,并不是独立完成的。
优选实施例
本发明实施例提供了一种智能手机,其内部设置有连接外接设备(也称为外设)的装置,其能在一些用户需要高安全性来连接外接设备的情景下(如手机的安全空间),提供一种基于多域技术的外接设备连接方法,用于检测接入的外接设备,提高手机连接外接设备的安全性。
本发明实施例智能手机各功能模块连接结构示意如图6所示,包括:外设判断模块、用户空间管理模块、外设连接处理模块和外设检测模块,图6中还指导出了各模块工作的过程。下面,结合图6中的各模块,说明智能手机工作的过程。
在手机要连接外接设备时,在驱动检测到外接设备后,外设判断模块优先判断连接的外接设备是否是第一次连接手机/上一次连接时间超时(距离上一次的连接时间是否超过预设值,如果超过需重新检测)。如果是,则产生相应判断结果,并向用户空间管理模块和外设连接处理模块传递。
用户空间管理模块根据接收到的判断结果,临时生成一个新的用户空间,该空间是最小化的,仅用来检测连接外接设备的安全性。之后由外设连接处理 模块将手机外设连接到这个临时生成的新空间。而由于多域空间技术的特性,此时手机连接的外设仅能访问/操作这个临时空间的数据,从而保证的手机上的用户数据安全。
在临时空间中,外设检测模块对手机连接的外接设备进行检测,并结合当前时间生成一个该手机对该外接设备的唯一识别码,该识别码用来以后再次连接时识别该外接设备及上次连接时间。实现时,如果之前生成过,则此处不再生成。
在检测结果显示为该外接设备不安全时,则通过外设判断模块反馈结果给外设连接处理模块,令其关闭手机与该外接设备的连接,同时将识别码反馈给外设判断模块。
在检测结果显示为该外接设备安全时,则通过外设判断模块反馈结果给外设连接处理模块,令其将手机与该外接设备的连接转至正常用户,以访问正常的用户空间,同时将识别码反馈给外设判断模块。
需要说明的是,在本实施例中,虽然各功能模块的名称不同,但各功能模块的总功能与上述实施例中连接外接设备的装置的各功能模块总和相同。
本发明实施例操作方法简便快捷,无需用户参与;可以有效的防止有安全隐患的外接设备对手机数据进行访问和操作,提高了系统的安全性能。
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。

Claims (11)

  1. 一种连接外接设备的方法,其特征在于,包括:
    在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间;
    在接受所述外接设备的连接请求的情况下,将所述外接设备连接至所述独立的用户空间,以在所述独立的用户空间内检测所述外接设备的安全性。
  2. 如权利要求1所述的方法,其特征在于,在接收到外接设备的连接请求之后,还包括:
    判断所述外接设备是否具有唯一识别码,其中,所述唯一识别码为终端在所述外接设备第一次接入所述终端时生成的;
    在没有所述唯一识别码的情况下,根据当前检测时间生成一个所述外接设备对应的唯一识别码,以通过所述唯一识别码将所述外接设备接入所述独立的用户空间;
    在具有所述唯一识别码的情况下,根据所述唯一识别码确定是否接入所述独立的用户空间。
  3. 如权利要求2所述的方法,其特征在于,根据所述唯一识别码确定是否接入所述独立的用户空间包括:
    根据所述唯一识别码判断此次连接与上一次接入所述终端的时间差是否在预设时间范围内;
    在所述时间差在所述预设时间范围内的情况下,将所述外接设备连接至终端正常的用户空间;
    在所述时间差不在所述预设时间范围内的情况下,将所述外接设备连接至所述独立的用户空间。
  4. 如权利要求1至3中任一项所述的方法,其特征在于,在所述独立的用户空间内检测所述外接设备的安全性之后,还包括:
    在所述外接设备的安全性符合预设标准的情况下,将所述外接设备连接至终端正常的用户空间,以实现正常访问;
    在所述外接设备的安全性不符合预设标准的情况下,断开与所述外设设备的连接。
  5. 如权利要求4所述的方法,其特征在于,断开与所述外设设备的连接之后,还包括:
    记录所述外设设备的唯一识别码,以在所述外接设备再次请求接入所述终端时,根据所述唯一识别码屏蔽所述外接设备的接入操作。
  6. 一种连接外接设备的装置,其特征在于,包括:
    分配模块,用于在接收到外接设备的连接请求时,通过多域空间技术分配一个独立的用户空间;
    连接模块,用于在接受所述外接设备的连接请求的情况下,将所述外接设备连接至所述独立的用户空间,以在所述独立的用户空间内检测所述外接设备的安全性。
  7. 如权利要求6所述的装置,其特征在于,所述装置还包括:
    判断模块,用于判断所述外接设备是否具有唯一识别码,其中,所述唯一识别码为终端在所述外接设备第一次接入所述终端时生成的;
    生成模块,用于在没有所述唯一识别码的情况下,根据当前检测时间生成一个所述外接设备对应的唯一识别码,以通过所述唯一识别码将所述外接设备接入所述独立的用户空间;
    接入模块,用于在具有所述唯一识别码的情况下,根据所述唯一识别码确定是否接入所述独立的用户空间。
  8. 如权利要求7所述的装置,其特征在于,所述接入模块包括:
    判断单元,用于根据所述唯一识别码判断此次连接与上一次接入所述终端的时间差是否在预设时间范围内;
    接入单元,用于在所述时间差在所述预设时间范围内的情况下,将所述外 接设备连接至终端正常的用户空间;在所述时间差不在所述预设时间范围内的情况下,将所述外接设备连接至所述独立的用户空间。
  9. 如权利要求6至8中任一项所述的装置,其特征在于,
    所述接入模块,还用于在所述外接设备的安全性符合预设标准的情况下,将所述外接设备连接至终端正常的用户空间,以实现正常访问;在所述外接设备的安全性不符合预设标准的情况下,断开与所述外设设备的连接。
  10. 如权利要求9所述的装置,其特征在于,所述装置还包括:
    记录模块,用于在断开与所述外设设备的连接之后,记录所述外设设备的唯一识别码,以在所述外接设备再次请求接入所述终端时,根据所述唯一识别码屏蔽所述外接设备的接入操作。
  11. 一种移动终端,其特征在于,包括:权利要求6至10中任一项所述的连接外接设备的装置。
PCT/CN2015/093535 2015-08-28 2015-10-31 一种连接外接设备的方法、装置及移动终端 WO2017035943A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510536598.0A CN106488454B (zh) 2015-08-28 2015-08-28 一种连接外接设备的方法、装置及移动终端
CN201510536598.0 2015-08-28

Publications (1)

Publication Number Publication Date
WO2017035943A1 true WO2017035943A1 (zh) 2017-03-09

Family

ID=58186680

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/093535 WO2017035943A1 (zh) 2015-08-28 2015-10-31 一种连接外接设备的方法、装置及移动终端

Country Status (2)

Country Link
CN (1) CN106488454B (zh)
WO (1) WO2017035943A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101382928A (zh) * 2008-10-29 2009-03-11 清华大学 一种软计算机及实现方法
CN102110207A (zh) * 2009-12-24 2011-06-29 英特尔公司 移动设备上的合作式的恶意软件检测和阻止
CN102663283A (zh) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 一种动态隔离计算机系统的方法
US8458800B1 (en) * 2010-10-01 2013-06-04 Viasat, Inc. Secure smartphone
WO2015094189A1 (en) * 2013-12-17 2015-06-25 Intel Corporation Detection of unauthorized memory modification and access using transactional memory

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197667B (zh) * 2007-12-26 2010-07-14 北京飞天诚信科技有限公司 一种动态口令认证的方法
CN102098475A (zh) * 2009-12-11 2011-06-15 鸿富锦精密工业(深圳)有限公司 电子设备及其获知接口与外部设备连接关系的方法
EP2693652B1 (en) * 2011-04-26 2015-09-30 Huawei Device Co., Ltd. Bluetooth device and method for connecting bluetooth devices
CN103198263B (zh) * 2012-10-26 2016-07-06 高榕科技(深圳)有限公司 借助个人计算机的外设密钥建立加/解密存储空间的方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101382928A (zh) * 2008-10-29 2009-03-11 清华大学 一种软计算机及实现方法
CN102110207A (zh) * 2009-12-24 2011-06-29 英特尔公司 移动设备上的合作式的恶意软件检测和阻止
US8458800B1 (en) * 2010-10-01 2013-06-04 Viasat, Inc. Secure smartphone
CN102663283A (zh) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 一种动态隔离计算机系统的方法
WO2015094189A1 (en) * 2013-12-17 2015-06-25 Intel Corporation Detection of unauthorized memory modification and access using transactional memory

Also Published As

Publication number Publication date
CN106488454B (zh) 2020-03-17
CN106488454A (zh) 2017-03-08

Similar Documents

Publication Publication Date Title
CN110912938B (zh) 入网终端接入验证方法、装置、存储介质及电子设备
US9179312B2 (en) Registration and login method and mobile terminal
US12026294B2 (en) Security adjustments in mobile devices
US20180041893A1 (en) Method and system of multi-terminal mapping to a virtual sim card
CN103415016A (zh) 一种移动wifi热点连接处理方法及系统
CN109033857B (zh) 一种访问数据的方法、装置、设备及可读存储介质
CN104581727A (zh) 设备连接方法、装置及ap端电子设备
US9398432B2 (en) Electronic device and method for controlling emergency call in electronic device
CN105516055B (zh) 数据访问方法、访问设备、目标设备及管理服务器
US10284653B2 (en) Method and apparatus for utilizing NFC to establish a secure connection
CN106656985B (zh) 一种备份账号登录方法、装置及系统
CN106209847A (zh) 电力数据传输方法及装置
CN106488394A (zh) 一种设备连接的方法及装置
WO2022156253A1 (zh) 支付方法、网关设备、服务器及存储介质
US20150121474A1 (en) Processor security authentication area
US10308217B2 (en) Method and apparatus for secure pairing
CN105592459A (zh) 基于无线通信的安全认证装置
CN103618767A (zh) 一种虚拟机配置的方法以及相关设备
CN104023040A (zh) 一种信息处理的方法及装置
WO2017035943A1 (zh) 一种连接外接设备的方法、装置及移动终端
CN105592031A (zh) 基于身份认证的用户登陆方法及系统
CN110460567B (zh) 一种身份鉴权方法及装置
CN107766232A (zh) 一种插件管理方法及装置
CN106557372B (zh) 一种应用共享的方法、装置及终端
CN104702405A (zh) 一种应用分级认证的方法和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15902750

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15902750

Country of ref document: EP

Kind code of ref document: A1