WO2018064887A1 - 一种对终端进行加密的方法、装置及计算机存储介质 - Google Patents

一种对终端进行加密的方法、装置及计算机存储介质 Download PDF

Info

Publication number
WO2018064887A1
WO2018064887A1 PCT/CN2017/081732 CN2017081732W WO2018064887A1 WO 2018064887 A1 WO2018064887 A1 WO 2018064887A1 CN 2017081732 W CN2017081732 W CN 2017081732W WO 2018064887 A1 WO2018064887 A1 WO 2018064887A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification card
encryption
user identification
terminal
card slot
Prior art date
Application number
PCT/CN2017/081732
Other languages
English (en)
French (fr)
Inventor
关瑞娟
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018064887A1 publication Critical patent/WO2018064887A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, an apparatus, and a computer storage medium for encrypting a terminal.
  • a lock screen password for example, a PIN code
  • a personal identification password for example, a PIN code
  • the security of the lock screen password is relatively low, and it is easy to crack. Opening the PIN code of the user identification card can ensure the security of the card, but since the input needs to be input every time, the usage rate is not high.
  • Embodiments of the present invention are directed to providing a method, device, and computer storage for encrypting a terminal
  • the storage medium can effectively ensure the security of the terminal while simplifying the operation of the user.
  • An embodiment of the present invention provides a method for encrypting a terminal, including:
  • the control terminal According to the state of the encryption card slot, the control terminal enters a normal working state or a security protection state.
  • the step of detecting that the user identification card in the terminal needs to be initialized includes:
  • the step of controlling the terminal to enter a normal working state or a security protection state according to the state of the encryption card slot includes:
  • the control terminal enters the security protection state.
  • the method further includes:
  • a user identification card is inserted in the encryption card slot, it is determined whether the user identification card inserted in the encryption card slot is a preset encryption identification card;
  • the control terminal enters a normal working state
  • the control terminal enters a security protection state.
  • the step of controlling the terminal to enter a security protection state includes:
  • the first broadcast for indicating that the user identification card inserted in the encryption card slot is inserted is not an encrypted identification card, or the user identification card is not inserted in the encryption card slot, and the terminal is controlled to be self-locked or prohibited from being accessed.
  • the method further includes:
  • the private information preset in the terminal is hidden or deleted, and the current location information of the terminal is sent to the network side.
  • the step of controlling the terminal to enter a normal working state includes:
  • the step of determining whether the user identification card inserted in the encryption card slot is a preset encryption identification card comprises:
  • the PIN code of the user identification card inserted in the encryption card slot is inactive, it is determined that the user identification card inserted in the encryption card slot is not an encrypted identification card.
  • the method further includes:
  • the user identification card inserted in the encryption card slot is an encrypted identification card
  • the user identification card inserted in the encryption card slot is not an encrypted identification card.
  • the method before the step of determining whether the user identification card inserted in the encryption card slot is a preset encryption identification card, the method further includes:
  • the method before the step of prompting to input an encrypted password, the method further includes:
  • the PIN code controlling the encrypted identification card is switched from the inactive state to the activated state.
  • An embodiment of the present invention further provides an apparatus for encrypting a terminal, including:
  • the first obtaining module is configured to acquire a state of the preset encryption card slot in the terminal when detecting that the user identification card in the terminal needs to be initialized;
  • the first control module is configured to control the terminal to enter a normal working state or a security protection state according to the state of the encryption card slot.
  • the first acquiring module includes:
  • the first obtaining unit is configured to: when it receives the power-on command, determine that it is detected that the user identification card in the terminal needs to be initialized; or
  • the second obtaining unit is configured to determine that it is necessary to initialize the user identification card in the terminal when detecting that the user identification card hot plugging event occurs in the encryption card slot.
  • the first control module includes:
  • the first control unit is configured to control the terminal to enter a security protection state if the user identification card is not inserted in the encryption card slot.
  • the apparatus further includes:
  • the first judging module is configured to determine whether the user identification card inserted in the encryption card slot is a preset encryption identification card if the user identification card is inserted in the encryption card slot, and if the user is inserted in the encryption card slot
  • the identification card is an encrypted identification card
  • the second control module is triggered, and if the user identification card inserted in the encryption card slot is not an encrypted identification card, the third control module is triggered;
  • the second control module is configured to control the terminal to enter a normal working state according to the triggering of the first determining module
  • the third control module is configured to control the terminal to enter a security protection state according to the triggering of the first determining module.
  • the apparatus further includes:
  • the fourth control module is configured to send a first broadcast that is used to indicate that the user identification card inserted in the encryption card slot is not an encrypted identification card, or that is not inserted with the user identification card in the encryption card slot, and control the terminal to perform self-locking or It is forbidden to be accessed.
  • the apparatus further includes:
  • the sending module is configured to hide or delete the preset private information in the terminal, and send the current location information of the terminal to the network side.
  • the second control module includes:
  • the second control unit is configured to perform an initialization operation on the user identification card inserted in the encryption card slot, and send a second broadcast for indicating that the user identification card inserted in the encryption card slot is an encrypted identification card, so as to remove the terminal
  • the user identification card inserted in the card slot other than the encryption card slot in the terminal is initialized.
  • the first determining module comprises:
  • the first determining unit is configured to determine whether the PIN code of the user identification card inserted in the encryption card slot is in an activated state, and if the PIN code of the user identification card inserted in the encryption card slot is inactive, triggering the second Judging unit
  • the second determining unit is configured to determine, according to the triggering of the first determining unit, that the user identification card inserted in the encryption card slot is not an encrypted identification card.
  • the apparatus further includes:
  • the second obtaining module is configured to obtain a code value of a PIN code of the user identification card inserted in the encryption card slot if the PIN code of the user identification card inserted in the encryption card slot is in an activated state;
  • the second determining module is configured to determine whether the obtained code value is consistent with the pre-stored encrypted password, and if the obtained code value is consistent with the encrypted password, triggering the first determining module, and if If the obtained code value is inconsistent with the encrypted password, the second determining module is triggered;
  • the first determining module is configured to determine, according to the triggering of the second determining module, that the user identification card inserted in the encryption card slot is an encrypted identification card;
  • the second determining module is configured to determine, according to the triggering of the second determining module, that the user identification card inserted in the encryption card slot is not an encrypted identification card.
  • the apparatus further includes:
  • the third determining module is configured to determine whether the PIN code of the encrypted identification card is in an activated state, and if the PIN code of the encrypted identification card is in an activated state, triggering the prompting module;
  • the prompting module is configured to prompt to input an encrypted password according to the triggering of the third determining module
  • the third obtaining module is configured to obtain the input encrypted password, and modify the code value of the PIN code of the encrypted identification card to be an encrypted password.
  • the apparatus further includes:
  • the fifth control module is configured to control the PIN code of the encrypted identification card to switch from the inactive state to the activated state if the PIN code of the encrypted identification card is in an inactive state.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to perform the method for encrypting a terminal according to an embodiment of the present invention.
  • the state of the preset encryption card slot in the terminal is acquired, and according to the acquired state of the encrypted card slot, the terminal is controlled to enter.
  • the normal working state or the security protection state solves the problem that the operation of the method for ensuring the security of the terminal is cumbersome, and achieves the effect of effectively ensuring the security of the terminal while simplifying the operation of the user.
  • FIG. 1 is a flowchart of a method for encrypting a terminal in a first embodiment of the present invention
  • FIG. 2 is a method for determining whether a user identification card inserted in an encryption card slot is in the first embodiment of the present invention; a specific flow chart of the preset encryption identification card;
  • FIG. 3 is a specific flowchart of modifying a code value of a PIN code of an encrypted identification card to an encrypted password according to the first embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of an apparatus for encrypting a terminal according to a second embodiment of the present invention.
  • a first embodiment of the present invention provides a method for encrypting a terminal, where the method includes:
  • step 101 when it is detected that the user identification card in the terminal needs to be initialized, the state of the preset encryption card slot in the terminal is acquired.
  • the user identification card may be a Subscriber Identification Module (SIM) card
  • the encryption card slot may be a card slot pre-selected by the user from at least one card slot included in the terminal.
  • SIM Subscriber Identification Module
  • the step of detecting that the user identification card in the terminal needs to be initialized includes two specific implementation manners.
  • the first implementation manner is: when receiving the power-on command, determining that it is detected that the user identification card in the terminal needs to be initialized.
  • the second implementation manner is: when it is detected that the user identification card hot plugging event occurs in the encryption card slot, it is determined that the user identification card in the terminal needs to be initialized.
  • the event that the user identification card is hot swapped in the encryption card slot refers to an event in which the terminal is hot-plugged and the user identification card in the encryption card slot is activated.
  • the control terminal when it is detected that the user identification card in the terminal needs to be initialized, it is required to determine whether to obtain the function of the state of the preset encryption card slot in the terminal, and if it is enabled, perform the encryption preset in the acquisition terminal. The step of the state of the card slot, and if not, the control terminal is put into a normal working state.
  • Step 102 Control the terminal to enter a normal working state or a security protection state according to the state of the encryption card slot.
  • the user can use the terminal to perform services supported by the terminal, such as accessing the Internet, making a call, etc.; after the terminal enters the security protection state, the terminal prohibits the user from accessing the service.
  • the state of the encryption card slot includes: indicating a state in which the user identification card is not inserted in the encryption card slot or a state in which the user identification card is inserted in the encryption card slot.
  • the specific implementation of the above step 102 mainly includes two types.
  • the first implementation manner is as follows: if the user identification card is not inserted in the encryption card slot, the control terminal enters the security protection state, and the authentication of the encryption card slot is considered to be failed.
  • the second implementation manner is: if a user identification card is inserted in the encryption card slot, it is determined whether the user identification card inserted in the encryption card slot is a preset encryption identification card, and if the user inserted in the encryption card slot is inserted If the identification card is an encrypted identification card, the control terminal enters a normal working state, and at this time, the authentication of the encryption card slot is considered successful; and if the user identification card inserted in the encryption card slot is not an encrypted identification card, the control terminal enters the security. Protection status, and at this time, authentication of the encryption card slot is considered to have failed.
  • the encrypted identification card is a user identification card preset by the user, and the user identification card may contain important information such as the user's private contact and the associated bank account.
  • the step of controlling the terminal to enter the security protection state includes: sending the indicator for indicating the encryption card slot, whether it is the first implementation manner of step 102 or the second implementation manner of step 102.
  • the user identification card inserted in the middle is not an encrypted identification card, or a first broadcast in which no user identification card is inserted in the encryption card slot, and the terminal is controlled to be self-locked or prohibited from being accessed.
  • the step of controlling the terminal to enter the security protection state further includes: hiding or deleting the private information preset in the terminal.
  • the step of controlling the terminal to enter the security protection state further includes: by opening a Global Positioning System (GPS), the current location information of the terminal is sent to the network side, thereby improving the possibility of retrieving the terminal when the terminal is lost.
  • GPS Global Positioning System
  • the private information may be preset by the user, and may specifically be information such as bank card information and private contacts.
  • the step of controlling the terminal to enter the normal working state includes: performing an initialization operation on the user identification card inserted in the encryption card slot, and sending the indication for inserting the encryption card slot
  • the user identification card is a second broadcast of the encrypted identification card, so that when the card slot other than the encryption card slot in the terminal receives the second broadcast, the user identification card inserted in the card slot other than the encryption card slot in the terminal Perform an initialization operation. It should be noted that after all the user identification cards in the terminal are initialized, the user can use the terminal to perform all operations, such as surfing the Internet, making a call, and the like.
  • the card slot other than the encryption card slot in the terminal only initializes the user identification card inserted therein when the second broadcast is monitored, otherwise the user identification cards are always in a waiting state.
  • the initialization timing of each user identification card is different, which is early and late, and is the first in the present invention.
  • the user identification card inserted in the other card slot can be initialized only after the initialization of the user identification card inserted in the encryption card slot is completed.
  • the step of determining whether the user identification card inserted in the encryption card slot is a preset encryption identification card specifically includes the following steps:
  • Step 201 Determine whether the PIN code of the user identification card inserted in the encryption card slot is in an activated state. If the PIN code of the user identification card inserted in the encryption card slot is in an inactive state, step 205 is performed, and if the encryption card is If the PIN code of the user identification card inserted in the slot is in the active state, step 202 is performed.
  • Step 202 Obtain a code value of a PIN code of a user identification card inserted in the encryption card slot, and execute step 203.
  • step 203 it is determined whether the obtained code value is consistent with the pre-stored encrypted password. If the obtained code value is consistent with the encrypted password, step 204 is performed, and if the obtained code value is inconsistent with the encrypted password, step 205 is performed. .
  • Step 204 Determine that the user identification card inserted in the encryption card slot is an encryption identification card.
  • the user identification card inserted in the encryption card slot can be set to the normal working state (ie, the READY state).
  • Step 205 It is determined that the user identification card inserted in the encryption card slot is not an encrypted identification card.
  • the method before the step of determining whether the user identification card inserted in the encryption card slot is a preset encryption identification card, the method further includes: encrypting the PIN code of the identification card The code value is modified to the step of encrypting the password.
  • the step of modifying the code value of the PIN code of the encryption identification card to the encryption password specifically includes the following steps:
  • step 301 it is determined whether the PIN code of the encrypted identification card is in an active state. If the PIN code of the encrypted identification card is in an active state, step 303 is performed, and if the PIN code of the encrypted identification card is in an inactive state, step 302 is performed.
  • Step 302 Control the PIN code of the encrypted identification card to switch from the inactive state to the activated state, and execute step 303.
  • Step 303 prompting to input an encrypted password, and executing step 304.
  • the encrypted password is subsequently used as the code value of the PIN code of the encrypted identification card, when the encrypted password is prompted, the 4 to 8 digits are promptly input as the encrypted password.
  • Step 304 Acquire an input encrypted password, and modify the code value of the PIN code of the encrypted identification card to an encrypted password.
  • the PIN code of the encrypted identification card is definitely in an active state (even if the state can be), so that when the encrypted identification card is lost and inserted into the other At the time of the terminal, the encrypted identification card cannot be used for any service (such as surfing the Internet, making a call, etc.), thereby ensuring the security of the encrypted identification card.
  • the terminal stores the encrypted password and the encrypted card slot selected by the user to the encrypted card slot.
  • the terminal's secure file system even if the terminal is restored to factory settings, over-the-air software upgrade (FOTA, Firmware Over-The-Air) / secure digital card (ie SD card) upgrade, etc., stored in the secure file system The information in it is not erased, thus ensuring the security of the encrypted password and the encryption card slot.
  • FOTA Firmware Over-The-Air
  • secure digital card ie SD card
  • the state of the preset encryption card slot in the terminal is obtained, and according to the obtained encryption card slot.
  • the state of the control terminal enters the normal working state or the security protection state, and solves the problem that the operation of the method for ensuring the security of the terminal is cumbersome, and achieves the effect of effectively ensuring the security of the terminal while simplifying the operation of the user.
  • a second embodiment of the present invention provides an apparatus for encrypting a terminal, including:
  • the first obtaining module 401 is configured to acquire a state of the preset encryption card slot in the terminal when detecting that the user identification card in the terminal needs to be initialized;
  • the first control module 402 is configured to control the terminal to enter a normal working state or a security protection state according to the state of the encryption card slot.
  • the first obtaining module 401 includes:
  • the first obtaining unit is configured to: when it receives the power-on command, determine that it is detected that the user identification card in the terminal needs to be initialized; or
  • the second obtaining unit is configured to determine that it is necessary to initialize the user identification card in the terminal when detecting that the user identification card hot plugging event occurs in the encryption card slot.
  • the first control module 402 includes:
  • the first control unit is configured to control the terminal to enter a security protection state if the user identification card is not inserted in the encryption card slot.
  • the device further includes:
  • the first judging module is configured to determine whether the user identification card inserted in the encryption card slot is a preset encryption identification card if the user identification card is inserted in the encryption card slot, and if the user is inserted in the encryption card slot
  • the identification card is an encrypted identification card
  • the second control module is triggered, and if the user identification card inserted in the encryption card slot is not an encrypted identification card, the third control module is triggered;
  • the second control module is configured to control the terminal to enter a normal working state according to the triggering of the first determining module
  • the third control module is configured to control the terminal to enter a security protection state according to the triggering of the first determining module.
  • the device further includes:
  • the fourth control module is configured to send a first broadcast that is used to indicate that the user identification card inserted in the encryption card slot is not an encrypted identification card, or that is not inserted with the user identification card in the encryption card slot, and control the terminal to perform self-locking or It is forbidden to be accessed.
  • the device further includes:
  • the sending module is configured to hide or delete the preset private information in the terminal, and send the information to the network side. Send the current location information of the terminal.
  • the second control module includes:
  • the second control unit is configured to perform an initialization operation on the user identification card inserted in the encryption card slot, and send a second broadcast for indicating that the user identification card inserted in the encryption card slot is an encrypted identification card, so as to remove the terminal
  • the user identification card inserted in the card slot other than the encryption card slot in the terminal is initialized.
  • the first determining module includes:
  • the first determining unit is configured to determine whether the PIN code of the user identification card inserted in the encryption card slot is in an activated state, and if the PIN code of the user identification card inserted in the encryption card slot is inactive, triggering the second Judging unit
  • the second determining unit is configured to determine, according to the triggering of the first determining unit, that the user identification card inserted in the encryption card slot is not an encrypted identification card.
  • the device further includes:
  • the second obtaining module is configured to obtain a code value of a PIN code of the user identification card inserted in the encryption card slot if the PIN code of the user identification card inserted in the encryption card slot is in an activated state;
  • the second determining module is configured to determine whether the obtained code value is consistent with the pre-stored encrypted password, and if the obtained code value is consistent with the encrypted password, triggering the first determining module, and if the obtained code value and encryption If the passwords are inconsistent, the second determining module is triggered;
  • the first determining module is configured to determine, according to the triggering of the second determining module, that the user identification card inserted in the encryption card slot is an encrypted identification card;
  • the second determining module is configured to determine, according to the triggering of the second determining module, that the user identification card inserted in the encryption card slot is not an encrypted identification card.
  • the device further includes:
  • the third determining module is configured to determine whether the PIN code of the encrypted identification card is in an activated state, and if the PIN code of the encrypted identification card is in an activated state, triggering the prompting module;
  • the prompting module is configured to prompt to input an encrypted password according to the triggering of the third determining module
  • the third obtaining module is configured to obtain the input encrypted password, and modify the code value of the PIN code of the encrypted identification card to be an encrypted password.
  • the device further includes:
  • the fifth control module is configured to control the PIN code of the encrypted identification card to switch from the inactive state to the activated state if the PIN code of the encrypted identification card is in an inactive state.
  • the device for encrypting the terminal acquires the state of the preset encryption card slot in the terminal by detecting the need to initialize the user identification card in the terminal, and according to the obtained encryption.
  • the state of the card slot controls the terminal to enter the normal working state or the security protection state, which solves the problem that the operation of the method for ensuring the security of the terminal is cumbersome, and achieves the effect of effectively ensuring the security of the terminal while simplifying the operation of the user.
  • the device for encrypting the terminal can be applied to a terminal having a card slot, such as a mobile phone.
  • the module, the second determining module, the third determining module, the prompting module, the third obtaining module and the fifth control module can be implemented by a central processing unit (CPU) and a digital signal processor (DSP, Digital) in practical applications.
  • CPU central processing unit
  • DSP digital signal processor
  • the transmitting module in the device can pass the communication module in practical applications (including: basic Communication suite, operating system, communication module, standardized interface and protocol, etc.) and transceiver antenna implementation.
  • practical applications including: basic Communication suite, operating system, communication module, standardized interface and protocol, etc.
  • the apparatus for encrypting a terminal according to the second embodiment of the present invention is a device that applies the foregoing method for encrypting a terminal, that is, all the embodiments of the foregoing method are applicable to the device, and both can achieve the same or Similar benefits.
  • the disclosed apparatus and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing storage device includes the following steps: the foregoing storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.
  • ROM read-only memory
  • RAM random access memory
  • magnetic disk or an optical disk.
  • optical disk A medium that can store program code.
  • the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a standalone product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • Make a computer device can be a personal computing The machine, server, or network device, etc.) performs all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a RAM, a magnetic disk, or an optical disk.
  • the technical solution of the embodiment of the present invention acquires the state of the preset encryption card slot in the terminal when the user identification card in the terminal needs to be initialized, and controls the terminal to enter the normal state according to the acquired state of the encryption card slot.
  • the working state or the security protection state solves the problem that the operation of the method for ensuring the security of the terminal is cumbersome, and achieves the effect of effectively ensuring the security of the terminal while simplifying the operation of the user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例公开了一种对终端进行加密的方法、装置及计算机存储介质,该方法包括:在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态;根据加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态。

Description

一种对终端进行加密的方法、装置及计算机存储介质
相关申请的交叉引用
本申请基于申请号为201610883461.7、申请日为2016年10月09日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本发明涉及通信领域,特别涉及一种对终端进行加密的方法、装置及计算机存储介质。
背景技术
随着智能移动技术的发展和人们社交圈的扩大,智能终端在终端市场上也越来越受欢迎。而安全和保密性一直是终端用户所关注的一个重要问题。一般用户都通过设置锁屏密码的方式对终端进行加密,但锁屏密码存储于终端的数据(data)分区,通过第三方软件或是获取到root权限(该root权限为系统权限的一种),很容易被破解。
因此,为了同时保障终端和用户识别卡数据的安全,需要设置两道密码,即锁屏密码和用户识别卡的个人识别密码(例如PIN码)。但锁屏密码的安全性比较低,极易破解;而打开用户识别卡的PIN码,虽然可以保证卡的安全,但由于每次开机均需要输入,因此使用率并不高。
可见,目前用于保证终端安全的方法的操作较为繁琐。
发明内容
本发明实施例期望提供一种对终端进行加密的方法、装置及计算机存 储介质,能在简化用户操作的情况下,有效保证终端的安全。
本发明实施例提供了一种对终端进行加密的方法,包括:
在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态;
根据加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态。
在一实施例中,所述检测到需要对终端中的用户识别卡进行初始化的步骤,包括:
在接收到开机指令时,确定检测到需要对终端中的用户识别卡进行初始化;或者
在检测到加密卡槽发生用户识别卡热插拔事件时,确定检测到需要对终端中的用户识别卡进行初始化。
在一实施例中,所述根据加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态的步骤,包括:
若加密卡槽中未插设有用户识别卡,则控制终端进入安全保护状态。
在一实施例中,所述方法还包括:
若加密卡槽中插设有用户识别卡,则判断加密卡槽中插设的用户识别卡是否为预设的加密识别卡;
若加密卡槽中插设的用户识别卡是加密识别卡,则控制终端进入正常工作状态;
若加密卡槽中插设的用户识别卡不是加密识别卡,则控制终端进入安全保护状态。
在一实施例中,所述控制终端进入安全保护状态的步骤,包括:
发送用于指示加密卡槽中插设的用户识别卡不是加密识别卡、或者加密卡槽中未插设有用户识别卡的第一广播,并控制终端进行自锁或者禁止被访问。
在一实施例中,所述方法还包括:
隐藏或删除终端中预设的私密信息,并向网络侧发送终端的当前位置信息。
在一实施例中,所述控制终端进入正常工作状态的步骤,包括:
对加密卡槽中插设的用户识别卡进行初始化操作,并发送用于指示加密卡槽中插设的用户识别卡是加密识别卡的第二广播,使终端中除加密卡槽以外的卡槽在接收到第二广播时,对插设于终端中除加密卡槽以外的卡槽中的用户识别卡进行初始化操作。
在一实施例中,所述判断加密卡槽中插设的用户识别卡是否为预设的加密识别卡的步骤,包括:
判断加密卡槽中插设的用户识别卡的PIN码是否处于激活状态;
若加密卡槽中插设的用户识别卡的PIN码处于非激活状态,则确定加密卡槽中插设的用户识别卡不是加密识别卡。
在一实施例中,所述方法还包括:
若加密卡槽中插设的用户识别卡的PIN码处于激活状态,则获取加密卡槽中插设的用户识别卡的PIN码的码值;
判断获取到的码值是否与预先存储的加密密码一致;
若获取到的码值与加密密码一致,则确定加密卡槽中插设的用户识别卡是加密识别卡;
若获取到的码值与加密密码不一致,则确定加密卡槽中插设的用户识别卡不是加密识别卡。
在一实施例中,所述在判断加密卡槽中插设的用户识别卡是否为预设的加密识别卡的步骤之前,方法还包括:
判断加密识别卡的PIN码是否处于激活状态;
若加密识别卡的PIN码处于激活状态,则提示输入加密密码;
获取输入的加密密码,并将加密识别卡的PIN码的码值修改为加密密码。
在一实施例中,所述在提示输入加密密码的步骤之前,方法还包括:
若加密识别卡的PIN码处于非激活状态,则控制加密识别卡的PIN码从非激活状态切换至激活状态。
本发明实施例还提供了一种对终端进行加密的装置,包括:
第一获取模块,配置为在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态;
第一控制模块,配置为根据加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态。
在一实施例中,所述第一获取模块包括:
第一获取单元,配置为在接收到开机指令时,确定检测到需要对终端中的用户识别卡进行初始化;或者
第二获取单元,配置为在检测到加密卡槽发生用户识别卡热插拔事件时,确定检测到需要对终端中的用户识别卡进行初始化。
在一实施例中,所述第一控制模块包括:
第一控制单元,配置为若加密卡槽中未插设有用户识别卡,则控制终端进入安全保护状态。
在一实施例中,所述装置还包括:
第一判断模块,配置为若加密卡槽中插设有用户识别卡,则判断加密卡槽中插设的用户识别卡是否为预设的加密识别卡,并若加密卡槽中插设的用户识别卡是加密识别卡,则触发第二控制模块,以及若加密卡槽中插设的用户识别卡不是加密识别卡,则触发第三控制模块;
第二控制模块,配置为根据第一判断模块的触发,控制终端进入正常工作状态;
第三控制模块,配置为根据第一判断模块的触发,控制终端进入安全保护状态。
在一实施例中,所述装置还包括:
第四控制模块,配置为发送用于指示加密卡槽中插设的用户识别卡不是加密识别卡,或者加密卡槽中未插设有用户识别卡的第一广播,并控制终端进行自锁或者禁止被访问。
在一实施例中,所述装置还包括:
发送模块,配置为隐藏或删除终端中预设的私密信息,并向网络侧发送终端的当前位置信息。
在一实施例中,所述第二控制模块包括:
第二控制单元,配置为对加密卡槽中插设的用户识别卡进行初始化操作,并发送用于指示加密卡槽中插设的用户识别卡是加密识别卡的第二广播,使终端中除加密卡槽以外的卡槽在接收到第二广播时,对插设于终端中除加密卡槽以外的卡槽中的用户识别卡进行初始化操作。
在一实施例中,所述第一判断模块包括:
第一判断单元,配置为判断加密卡槽中插设的用户识别卡的PIN码是否处于激活状态,并若加密卡槽中插设的用户识别卡的PIN码处于非激活状态,则触发第二判断单元;
第二判断单元,配置为根据第一判断单元的触发,确定加密卡槽中插设的用户识别卡不是加密识别卡。
在一实施例中,所述装置还包括:
第二获取模块,配置为若加密卡槽中插设的用户识别卡的PIN码处于激活状态,则获取加密卡槽中插设的用户识别卡的PIN码的码值;
第二判断模块,配置为判断获取到的码值是否与预先存储的加密密码一致,并若获取到的码值与加密密码一致,则触发第一确定模块,以及若 获取到的码值与加密密码不一致,则触发第二确定模块;
第一确定模块,配置为根据第二判断模块的触发,确定加密卡槽中插设的用户识别卡是加密识别卡;
第二确定模块,配置为根据第二判断模块的触发,确定加密卡槽中插设的用户识别卡不是加密识别卡。
在一实施例中,所述装置还包括:
第三判断模块,配置为判断加密识别卡的PIN码是否处于激活状态,并若加密识别卡的PIN码处于激活状态,则触发提示模块;
提示模块,配置为根据第三判断模块的触发,提示输入加密密码;
第三获取模块,配置为获取输入的加密密码,并将加密识别卡的PIN码的码值修改为加密密码。
在一实施例中,所述装置还包括:
第五控制模块,配置为若加密识别卡的PIN码处于非激活状态,则控制加密识别卡的PIN码从非激活状态切换至激活状态。
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行本发明实施例所述的对终端进行加密的方法。
在本发明的实施例中,通过在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态,并根据获取到的加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态,解决了用于保证终端安全的方法的操作较为繁琐的问题,达到了在简化用户操作的情况下,有效保证终端的安全的效果。
附图说明
图1为本发明第一实施例中对终端进行加密的方法的流程图;
图2为本发明第一实施例中判断加密卡槽中插设的用户识别卡是否为 预设的加密识别卡的具体流程图;
图3为本发明第一实施例中将加密识别卡的PIN码的码值修改为加密密码的具体流程图;
图4为本发明第二实施例中对终端进行加密的装置的结构示意图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
第一实施例
如图1所示,本发明的第一实施例提供了一种对终端进行加密的方法,该方法包括:
步骤101,在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态。
其中,上述用户识别卡可以为用户识别模块(SIM,Subscriber Identification Module)卡,而上述加密卡槽可以为用户从终端所包括的至少一个卡槽中预先选定的卡槽。
其中,在本发明的第一实施例中,上述检测到需要对终端中的用户识别卡进行初始化的步骤包括两种具体的实现方式。其中,第一种实现方式为:在接收到开机指令时,确定检测到需要对终端中的用户识别卡进行初始化。而第二种实现方式为:在检测到加密卡槽发生用户识别卡热插拔事件时,确定检测到需要对终端中的用户识别卡进行初始化。其中,加密卡槽发生用户识别卡热插拔事件是指终端在开机的状态下,发生热插拔加密卡槽中的用户识别卡的事件。
需要说明的是,在检测到需要对终端中的用户识别卡进行初始化时,需要判断获取终端中预设的加密卡槽的状态的功能是否开启,若开启的话,执行获取终端中预设的加密卡槽的状态的步骤,而若未开启的话,则执行控制终端进入正常工作状态。
步骤102,根据加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态。
其中,终端进入正常工作状态后,用户便可以使用终端进行所述终端支持的业务,例如上网、拨打电话等;而终端进入安全保护状态后,终端便会禁止用户访问业务。
在本发明的第一实施例中,上述加密卡槽的状态包括:表征加密卡槽中未插设有用户识别卡的状态或者表征加密卡槽中插设有用户识别卡的状态。
因此,在本发明的第一实施例中,上述步骤102具体实现方式主要包括两种。
其中,第一种实现方式为:若加密卡槽中未插设有用户识别卡,则控制终端进入安全保护状态,且此时认为对加密卡槽的鉴权失败。
第二种实现方式为:若加密卡槽中插设有用户识别卡,则判断加密卡槽中插设的用户识别卡是否为预设的加密识别卡,且若加密卡槽中插设的用户识别卡是加密识别卡,则控制终端进入正常工作状态,且此时认为对加密卡槽的鉴权成功;而若加密卡槽中插设的用户识别卡不是加密识别卡,则控制终端进入安全保护状态,且此时认为对加密卡槽的鉴权失败。其中,上述加密识别卡是用户预设的一张用户识别卡,且这张用户识别卡可能包含用户的私密联系人、关联银行账号等重要信息。
其中,不管是步骤102的第一种实现方式,还是步骤102的第二种实现方式,控制终端进入安全保护状态的步骤包括:发送用于指示加密卡槽 中插设的用户识别卡不是加密识别卡、或者加密卡槽中未插设有用户识别卡的第一广播,并控制终端进行自锁或者禁止被访问。此外,为了保护终端中预设的私密信息的安全,控制终端进入安全保护状态的步骤还包括:隐藏或删除终端中预设的私密信息。同时,控制终端进入安全保护状态的步骤还包括:可通过打开全球定位系统(GPS,Global Positioning System)定位,向网络侧发送终端的当前位置信息,从而提高当终端丢失时,找回终端的可能性。其中,上述私密信息可以是用户预设的,其具体可以是银行卡信息、私密联系人等信息。
需要说明的是,若终端中存在多个卡槽,那么在控制终端进入安全保护状态后,终端中除加密卡槽以外的所有卡槽在监听到上述第一广播之后,都会禁止执行一切业务,例如上网、拨打电话等。
而在上述步骤102的第二种实现方式中,控制终端进入正常工作状态的步骤包括:对加密卡槽中插设的用户识别卡进行初始化操作,并发送用于指示加密卡槽中插设的用户识别卡是加密识别卡的第二广播,使终端中除加密卡槽以外的卡槽在接收到第二广播时,对插设于终端中除加密卡槽以外的卡槽中的用户识别卡进行初始化操作。需要说明的是,当终端中的所有用户识别卡都初始化完成之后,用户便可以使用终端进行一切操作,例如上网、拨打电话等。
可见,终端中除加密卡槽以外的卡槽只有在监听到第二广播时,才会对插设于其中的用户识别卡进行初始化操作,否则这些用户识别卡一直处于等待状态。
需要说明的是,在对终端中的用户识别卡进行初始化,且当终端存在多张用户识别卡时,每张用户识别卡的初始化时序都不同,有早有晚,而在本发明的第一实施例中,只有当插设于加密卡槽中的用户识别卡初始化完成之后,插设于其他卡槽中的用户识别卡才能进行初始化。
其中,如图2所示,在上述步骤102的第二种实现方式中,判断加密卡槽中插设的用户识别卡是否为预设的加密识别卡的步骤具体包括如下步骤:
步骤201,判断加密卡槽中插设的用户识别卡的PIN码是否处于激活状态,若加密卡槽中插设的用户识别卡的PIN码处于非激活状态,则执行步骤205,而若加密卡槽中插设的用户识别卡的PIN码处于激活状态,则执行步骤202。
步骤202,获取加密卡槽中插设的用户识别卡的PIN码的码值,并执行步骤203。
步骤203,判断获取到的码值是否与预先存储的加密密码一致,若获取到的码值与加密密码一致,则执行步骤204,而若获取到的码值与加密密码不一致,则执行步骤205。
步骤204,确定加密卡槽中插设的用户识别卡是加密识别卡。
在执行完步骤204之后,可将加密卡槽中插设的用户识别卡置位正常工作状态(即READY状态)。
步骤205,确定加密卡槽中插设的用户识别卡不是加密识别卡。
其中,在本发明的第一实施例中,在执行判断加密卡槽中插设的用户识别卡是否为预设的加密识别卡的步骤之前,上述方法还包括:将加密识别卡的PIN码的码值修改为加密密码的步骤。且如图3所示,将加密识别卡的PIN码的码值修改为加密密码的步骤具体包括如下步骤:
步骤301,判断加密识别卡的PIN码是否处于激活状态,若加密识别卡的PIN码处于激活状态,则执行步骤303,而若加密识别卡的PIN码处于非激活状态,则执行步骤302。
步骤302,控制加密识别卡的PIN码从非激活状态切换至激活状态,并执行步骤303。
步骤303,提示输入加密密码,并执行步骤304。
其中,由于该加密密码后续要作为加密识别卡的PIN码的码值,因此,在提示输入加密密码时,会一并提示输入4至8位的数字作为加密密码。
步骤304,获取输入的加密密码,并将加密识别卡的PIN码的码值修改为加密密码。
由此可见,加密识别卡的PIN码的码值在修改为加密密码后,加密识别卡的PIN码肯定是处于激活状态(即使能状态)的,这样,当加密识别卡遗失,且被插入其他终端时,也无法使用该加密识别卡进行任何业务(例如上网、拨打电话等),从而确保了加密识别卡的安全。
需要说明的是,在本发明的第一实施例中,在将加密识别卡的PIN码的码值在修改为加密密码后,终端会将该加密密码以及用户预先选定的加密卡槽存储至终端的安全文件系统中,这样,即使对该终端进行恢复出厂设置、空中下载软件升级(FOTA,Firmware Over-The-Air)/安全数码卡(即SD卡)升级等操作,存储在安全文件系统中的信息都不会被擦除,从而确保加密密码以及加密卡槽的安全性。
由此可见,在本发明的第一实施例中,通过在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态,并根据获取到的加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态,解决了用于保证终端安全的方法的操作较为繁琐的问题,达到了在简化用户操作的情况下,有效保证终端的安全的效果。
第二实施例
如图4所示,本发明的第二实施例提供了一种对终端进行加密的装置,包括:
第一获取模块401,配置为在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态;
第一控制模块402,配置为根据加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态。
作为一种实施方式,第一获取模块401包括:
第一获取单元,配置为在接收到开机指令时,确定检测到需要对终端中的用户识别卡进行初始化;或者
第二获取单元,配置为在检测到加密卡槽发生用户识别卡热插拔事件时,确定检测到需要对终端中的用户识别卡进行初始化。
作为一种实施方式,第一控制模块402包括:
第一控制单元,配置为若加密卡槽中未插设有用户识别卡,则控制终端进入安全保护状态。
作为一种实施方式,装置还包括:
第一判断模块,配置为若加密卡槽中插设有用户识别卡,则判断加密卡槽中插设的用户识别卡是否为预设的加密识别卡,并若加密卡槽中插设的用户识别卡是加密识别卡,则触发第二控制模块,以及若加密卡槽中插设的用户识别卡不是加密识别卡,则触发第三控制模块;
第二控制模块,配置为根据第一判断模块的触发,控制终端进入正常工作状态;
第三控制模块,配置为根据第一判断模块的触发,控制终端进入安全保护状态。
作为一种实施方式,装置还包括:
第四控制模块,配置为发送用于指示加密卡槽中插设的用户识别卡不是加密识别卡,或者加密卡槽中未插设有用户识别卡的第一广播,并控制终端进行自锁或者禁止被访问。
作为一种实施方式,装置还包括:
发送模块,配置为隐藏或删除终端中预设的私密信息,并向网络侧发 送终端的当前位置信息。
作为一种实施方式,第二控制模块包括:
第二控制单元,配置为对加密卡槽中插设的用户识别卡进行初始化操作,并发送用于指示加密卡槽中插设的用户识别卡是加密识别卡的第二广播,使终端中除加密卡槽以外的卡槽在接收到第二广播时,对插设于终端中除加密卡槽以外的卡槽中的用户识别卡进行初始化操作。
作为一种实施方式,第一判断模块包括:
第一判断单元,配置为判断加密卡槽中插设的用户识别卡的PIN码是否处于激活状态,并若加密卡槽中插设的用户识别卡的PIN码处于非激活状态,则触发第二判断单元;
第二判断单元,配置为根据第一判断单元的触发,确定加密卡槽中插设的用户识别卡不是加密识别卡。
作为一种实施方式,装置还包括:
第二获取模块,配置为若加密卡槽中插设的用户识别卡的PIN码处于激活状态,则获取加密卡槽中插设的用户识别卡的PIN码的码值;
第二判断模块,配置为判断获取到的码值是否与预先存储的加密密码一致,并若获取到的码值与加密密码一致,则触发第一确定模块,以及若获取到的码值与加密密码不一致,则触发第二确定模块;
第一确定模块,配置为根据第二判断模块的触发,确定加密卡槽中插设的用户识别卡是加密识别卡;
第二确定模块,配置为根据第二判断模块的触发,确定加密卡槽中插设的用户识别卡不是加密识别卡。
作为一种实施方式,装置还包括:
第三判断模块,配置为判断加密识别卡的PIN码是否处于激活状态,并若加密识别卡的PIN码处于激活状态,则触发提示模块;
提示模块,配置为根据第三判断模块的触发,提示输入加密密码;
第三获取模块,配置为获取输入的加密密码,并将加密识别卡的PIN码的码值修改为加密密码。
作为一种实施方式,装置还包括:
第五控制模块,配置为若加密识别卡的PIN码处于非激活状态,则控制加密识别卡的PIN码从非激活状态切换至激活状态。
在本发明的第二实施例中,对终端进行加密的装置通过在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态,并根据获取到的加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态,解决了用于保证终端安全的方法的操作较为繁琐的问题,达到了在简化用户操作的情况下,有效保证终端的安全的效果。
本发明实施例中,所述对终端进行加密的装置可应用于具有卡槽终端中,例如手机等终端。所述装置中的第一获取模块401、第一控制模块402、第一判断模块、第二控制模块、第三控制模块、第四控制模块、第二获取模块、第二判断模块、第一确定模块、第二确定模块、第三判断模块、提示模块、第三获取模块和第五控制模块,在实际应用中均可由中央处理器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Signal Processor)、微控制单元(MCU,Microcontroller Unit)或可编程门阵列(FPGA,Field-Programmable Gate Array)实现;所述装置中的发送模块,在实际应用中可通过通信模组(包含:基础通信套件、操作系统、通信模块、标准化接口和协议等)及收发天线实现。
需要说明的是,本发明第二实施例提供的对终端进行加密的装置是应用上述对终端进行加密的方法的装置,即上述方法的所有实施例均适用于该装置,且均能达到相同或相似的有益效果。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法, 可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本发明各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本发明上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算 机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。
工业实用性
本发明实施例的技术方案通过在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态,并根据获取到的加密卡槽的状态,控制终端进入正常工作状态或者安全保护状态,解决了用于保证终端安全的方法的操作较为繁琐的问题,达到了在简化用户操作的情况下,有效保证终端的安全的效果。

Claims (23)

  1. 一种对终端进行加密的方法,包括:
    在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态;
    根据所述加密卡槽的状态,控制所述终端进入正常工作状态或者安全保护状态。
  2. 根据权利要求1所述的方法,其中,所述检测到需要对终端中的用户识别卡进行初始化的步骤,包括:
    在接收到开机指令时,确定检测到需要对终端中的用户识别卡进行初始化;或者
    在检测到所述加密卡槽发生用户识别卡热插拔事件时,确定检测到需要对终端中的用户识别卡进行初始化。
  3. 根据权利要求1所述的方法,其中,所述根据所述加密卡槽的状态,控制所述终端进入正常工作状态或者安全保护状态的步骤,包括:
    若所述加密卡槽中未插设有用户识别卡,则控制所述终端进入安全保护状态。
  4. 根据权利要求3所述的方法,其中,所述方法还包括:
    若所述加密卡槽中插设有用户识别卡,则判断所述加密卡槽中插设的用户识别卡是否为预设的加密识别卡;
    若所述加密卡槽中插设的用户识别卡是所述加密识别卡,则控制所述终端进入正常工作状态;
    若所述加密卡槽中插设的用户识别卡不是所述加密识别卡,则控制所述终端进入安全保护状态。
  5. 根据权利要求3或4所述的方法,其中,所述控制所述终端进入安全保护状态的步骤,包括:
    发送用于指示所述加密卡槽中插设的用户识别卡不是所述加密识别卡、或者所述加密卡槽中未插设有用户识别卡的第一广播,并控制所述终端进行自锁或者禁止被访问。
  6. 根据权利要求5所述的方法,其中,所述方法还包括:
    隐藏或删除所述终端中预设的私密信息,并向网络侧发送所述终端的当前位置信息。
  7. 根据权利要求4所述的方法,其中,所述控制所述终端进入正常工作状态的步骤,包括:
    对所述加密卡槽中插设的用户识别卡进行初始化操作,并发送用于指示所述加密卡槽中插设的用户识别卡是所述加密识别卡的第二广播,使所述终端中除所述加密卡槽以外的卡槽在接收到所述第二广播时,对插设于所述终端中除所述加密卡槽以外的卡槽中的用户识别卡进行初始化操作。
  8. 根据权利要求4所述的方法,其中,所述判断所述加密卡槽中插设的用户识别卡是否为预设的加密识别卡的步骤,包括:
    判断所述加密卡槽中插设的用户识别卡的PIN码是否处于激活状态;
    若所述加密卡槽中插设的用户识别卡的PIN码处于非激活状态,则确定所述加密卡槽中插设的用户识别卡不是所述加密识别卡。
  9. 根据权利要求8所述的方法,其中,所述方法还包括:
    若所述加密卡槽中插设的用户识别卡的PIN码处于激活状态,则获取所述加密卡槽中插设的用户识别卡的PIN码的码值;
    判断获取到的码值是否与预先存储的加密密码一致;
    若获取到的码值与所述加密密码一致,则确定所述加密卡槽中插设的用户识别卡是所述加密识别卡;
    若获取到的码值与所述加密密码不一致,则确定所述加密卡槽中插设的用户识别卡不是所述加密识别卡。
  10. 根据权利要求9所述的方法,其中,在所述判断所述加密卡槽中插设的用户识别卡是否为预设的加密识别卡的步骤之前,所述方法还包括:
    判断所述加密识别卡的PIN码是否处于激活状态;
    若所述加密识别卡的PIN码处于激活状态,则提示输入加密密码;
    获取输入的加密密码,并将所述加密识别卡的PIN码的码值修改为所述加密密码。
  11. 根据权利要求10所述的方法,其中,在所述提示输入加密密码的步骤之前,所述方法还包括:
    若所述加密识别卡的PIN码处于非激活状态,则控制所述加密识别卡的PIN码从非激活状态切换至激活状态。
  12. 一种对终端进行加密的装置,包括:
    第一获取模块,配置为在检测到需要对终端中的用户识别卡进行初始化时,获取终端中预设的加密卡槽的状态;
    第一控制模块,配置为根据所述加密卡槽的状态,控制所述终端进入正常工作状态或者安全保护状态。
  13. 根据权利要求12所述的装置,其中,所述第一获取模块包括:
    第一获取单元,配置为在接收到开机指令时,确定检测到需要对终端中的用户识别卡进行初始化;或者
    第二获取单元,配置为在检测到所述加密卡槽发生用户识别卡热插拔事件时,确定检测到需要对终端中的用户识别卡进行初始化。
  14. 根据权利要求12所述的装置,其中,所述第一控制模块包括:
    第一控制单元,配置为若所述加密卡槽中未插设有用户识别卡,则控制所述终端进入安全保护状态。
  15. 根据权利要求14所述的装置,其中,所述装置还包括:
    第一判断模块,配置为若所述加密卡槽中插设有用户识别卡,则判断 所述加密卡槽中插设的用户识别卡是否为预设的加密识别卡,并若所述加密卡槽中插设的用户识别卡是所述加密识别卡,则触发第二控制模块,以及若所述加密卡槽中插设的用户识别卡不是所述加密识别卡,则触发第三控制模块;
    第二控制模块,配置为根据所述第一判断模块的触发,控制所述终端进入正常工作状态;
    第三控制模块,配置为根据所述第一判断模块的触发,控制所述终端进入安全保护状态。
  16. 根据权利要求14或15所述的装置,其中,所述装置还包括:
    第四控制模块,配置为发送用于指示所述加密卡槽中插设的用户识别卡不是所述加密识别卡,或者所述加密卡槽中未插设有用户识别卡的第一广播,并控制所述终端进行自锁或者禁止被访问。
  17. 根据权利要求16所述的装置,其中,所述装置还包括:
    发送模块,配置为隐藏或删除所述终端中预设的私密信息,并向网络侧发送所述终端的当前位置信息。
  18. 根据权利要求15所述的装置,其中,所述第二控制模块包括:
    第二控制单元,配置为对所述加密卡槽中插设的用户识别卡进行初始化操作,并发送用于指示所述加密卡槽中插设的用户识别卡是所述加密识别卡的第二广播,使所述终端中除所述加密卡槽以外的卡槽在接收到所述第二广播时,对插设于所述终端中除所述加密卡槽以外的卡槽中的用户识别卡进行初始化操作。
  19. 根据权利要求15所述的装置,其中,所述第一判断模块包括:
    第一判断单元,配置为判断所述加密卡槽中插设的用户识别卡的PIN码是否处于激活状态,并若所述加密卡槽中插设的用户识别卡的PIN码处于非激活状态,则触发第二判断单元;
    第二判断单元,配置为根据所述第一判断单元的触发,确定所述加密卡槽中插设的用户识别卡不是所述加密识别卡。
  20. 根据权利要求19所述的装置,其中,所述装置还包括:
    第二获取模块,配置为若所述加密卡槽中插设的用户识别卡的PIN码处于激活状态,则获取所述加密卡槽中插设的用户识别卡的PIN码的码值;
    第二判断模块,配置为判断获取到的码值是否与预先存储的加密密码一致,并若获取到的码值与所述加密密码一致,则触发第一确定模块,以及若获取到的码值与所述加密密码不一致,则触发第二确定模块;
    第一确定模块,配置为根据所述第二判断模块的触发,确定所述加密卡槽中插设的用户识别卡是所述加密识别卡;
    第二确定模块,配置为根据所述第二判断模块的触发,确定所述加密卡槽中插设的用户识别卡不是所述加密识别卡。
  21. 根据权利要求20所述的装置,其中,所述装置还包括:
    第三判断模块,配置为判断所述加密识别卡的PIN码是否处于激活状态,并若所述加密识别卡的PIN码处于激活状态,则触发提示模块;
    提示模块,配置为根据所述第三判断模块的触发,提示输入加密密码;
    第三获取模块,配置为获取输入的加密密码,并将所述加密识别卡的PIN码的码值修改为所述加密密码。
  22. 根据权利要求21所述的装置,其中,所述装置还包括:
    第五控制模块,配置为若所述加密识别卡的PIN码处于非激活状态,则控制所述加密识别卡的PIN码从非激活状态切换至激活状态。
  23. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1至11任一项所述的对终端进行加密的方法。
PCT/CN2017/081732 2016-10-09 2017-04-24 一种对终端进行加密的方法、装置及计算机存储介质 WO2018064887A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610883461.7A CN107919957A (zh) 2016-10-09 2016-10-09 一种对终端进行加密的方法及装置
CN201610883461.7 2016-10-09

Publications (1)

Publication Number Publication Date
WO2018064887A1 true WO2018064887A1 (zh) 2018-04-12

Family

ID=61830840

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/081732 WO2018064887A1 (zh) 2016-10-09 2017-04-24 一种对终端进行加密的方法、装置及计算机存储介质

Country Status (2)

Country Link
CN (1) CN107919957A (zh)
WO (1) WO2018064887A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645626A (zh) * 2020-04-27 2021-11-12 成都鼎桥通信技术有限公司 一种提高终端安全性的方法
CN117715031A (zh) * 2023-05-29 2024-03-15 荣耀终端有限公司 一种保护指纹信息的方法及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980427A (zh) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 用于移动终端自动删除信息的装置及方法
CN102647712A (zh) * 2012-04-06 2012-08-22 惠州Tcl移动通信有限公司 一种手机数据加密方法以及解密方法
CN103973876A (zh) * 2013-02-05 2014-08-06 联想移动通信科技有限公司 一种移动终端丢失追踪方法和移动终端
CN105930749A (zh) * 2016-05-09 2016-09-07 广东欧珀移动通信有限公司 移动终端防盗处理方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980427A (zh) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 用于移动终端自动删除信息的装置及方法
CN102647712A (zh) * 2012-04-06 2012-08-22 惠州Tcl移动通信有限公司 一种手机数据加密方法以及解密方法
CN103973876A (zh) * 2013-02-05 2014-08-06 联想移动通信科技有限公司 一种移动终端丢失追踪方法和移动终端
CN105930749A (zh) * 2016-05-09 2016-09-07 广东欧珀移动通信有限公司 移动终端防盗处理方法及装置

Also Published As

Publication number Publication date
CN107919957A (zh) 2018-04-17

Similar Documents

Publication Publication Date Title
KR102307665B1 (ko) 신원 인증
EP2905715B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN109150835B (zh) 云端数据存取的方法、装置、设备及计算机可读存储介质
US9378344B2 (en) Method and apparatus for protecting information based on data card
WO2018000834A1 (zh) 一种wifi热点信息修改方法及装置
CN107679370B (zh) 一种设备标识生成方法及装置
WO2017063517A1 (zh) 一种近距离通信的建立方法和装置
US20150319147A1 (en) System and method for file encrypting and decrypting
JP6397046B2 (ja) アドレス帳保護方法、装置及び通信システム
CN106550090A (zh) 远程控制方法、装置及移动终端
CN107124279B (zh) 擦除终端数据的方法及装置
US20190156059A1 (en) Method and apparatus for securely calling fingerprint information, and mobile terminal
WO2018064887A1 (zh) 一种对终端进行加密的方法、装置及计算机存储介质
WO2016201600A1 (zh) 一种信息发送方法、装置、终端设备以及系统
WO2013182112A1 (zh) 一种保护移动终端用户私密数据的方法和装置
WO2016141797A1 (zh) 信息处理方法及装置、计算机可读介质
WO2016082394A1 (zh) 一种实现用户识别卡锁定的方法和移动终端
US9977907B2 (en) Encryption processing method and device for application, and terminal
CN103020509B (zh) 一种终端设备加密与解密方法、装置及终端设备
EP3667530B1 (fr) Accès sécurise à des données chiffrées d'un terminal utilisateur
WO2015131585A1 (zh) 一种保证sd卡安全的方法和装置
CN110110533B (zh) 带身份自动识别的电子文件批量加密转存方法、系统及介质
CN107995625B (zh) 移动终端及调出联系人的方法、存储介质及授信sim卡
CN108769989A (zh) 一种无线网连接方法、无线接入装置和设备
CN110008760B (zh) 密码数据存储方法、装置、电子设备及计算机可读介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17857768

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17857768

Country of ref document: EP

Kind code of ref document: A1