WO2020025005A1 - Mobile terminal, and entering method and device of privacy system - Google Patents

Mobile terminal, and entering method and device of privacy system Download PDF

Info

Publication number
WO2020025005A1
WO2020025005A1 PCT/CN2019/098718 CN2019098718W WO2020025005A1 WO 2020025005 A1 WO2020025005 A1 WO 2020025005A1 CN 2019098718 W CN2019098718 W CN 2019098718W WO 2020025005 A1 WO2020025005 A1 WO 2020025005A1
Authority
WO
WIPO (PCT)
Prior art keywords
private system
password
entering
key unit
enter
Prior art date
Application number
PCT/CN2019/098718
Other languages
French (fr)
Chinese (zh)
Inventor
王力
邓安良
李巍宏
Original Assignee
奇酷互联网络科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 奇酷互联网络科技(深圳)有限公司 filed Critical 奇酷互联网络科技(深圳)有限公司
Publication of WO2020025005A1 publication Critical patent/WO2020025005A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Definitions

  • the present invention relates to the field of mobile equipment, and in particular, to a method and device for entering a mobile terminal and a private system.
  • the main purpose of the present invention is to provide a method and device for accessing a private system, which aims to solve the problem of enhanced security protection of private information in a mobile terminal.
  • the present invention provides a method for entering a private system.
  • the method includes the steps of: when a user initiates an entry request to enter a private system, detecting whether a first key unit is inserted; When a key unit is inserted, a first encrypted data is sent to the first key unit; when the first key unit verifies that the first encrypted data is correct, it receives the first key unit to send Verify the second encrypted data is correct; if the second encrypted data is correct, obtain a first password to enter the private system; when the first password is obtained, verify the Whether the first password is correct; if the first password is correct, the entry request is allowed to enter the private system.
  • the method includes: when the user enters the private system for the first time, prompting the user to set a password for entering the private system. A first password; after setting the first password, the user is prompted to bind the first key unit.
  • the first key unit is more than one key unit; and / or, the first password is more than one password.
  • the method includes: after completing binding the first key unit, The first password is stored in the first key unit.
  • the method includes: when the second encrypted data is correct, after a preset first time, input to enter the private system Password.
  • the method includes: when detecting that the first key unit is unplugged, automatically Exit the private system.
  • the method further includes at least one of the following steps:
  • a prompt window for re-entering the password for entering the private system pops up;
  • the invention proposes a method for entering a private system.
  • the method includes the steps of: when a user initiates an entry request to enter a private system, obtaining a first password to enter the private system; when the first password is obtained, Verifying whether the first password is correct; if the first password is correct, detecting whether a first key unit is inserted; if detecting that the first key unit is inserted, sending first encrypted data to the A first key unit; when the first key unit verifies that the first encrypted data is correct, receiving the second encrypted data sent by the first key unit; verifying whether the second encrypted data is correct; If the second encrypted data is correct, the entry request is allowed to enter the private system.
  • the method includes: when entering the private system for the first time, prompting the user to set to enter the privacy The first password of the system; after setting the first password, the user is prompted to bind the first key unit.
  • the first key unit is more than one key unit; and / or, the first password is more than one password.
  • the method includes: when detecting that the first key unit is unplugged, automatically exiting the Describe privacy systems.
  • the method further includes at least one of the following steps:
  • a prompt window for re-entering the password for entering the private system pops up;
  • the present invention also provides a device for entering a private system.
  • the device includes: a first detection module for detecting whether a first key unit is inserted when a user initiates an entry request to enter the private system; a first sending module, And if it is detected that the first key unit has been inserted, send first encrypted data to the first key unit; a first receiving module is used when the first key unit verifies the first key unit When the encrypted data is correct, receiving the second encrypted data sent by the first key unit; a first verification module for verifying whether the second encrypted data is correct; a first obtaining module for if the second If the encrypted data is correct, a first password for accessing the private system is obtained; a second verification module is used to verify whether the first password is correct when the first password is obtained; a first entry module is used for If the first password is correct, the entry request is allowed to enter the privacy system.
  • the device further includes: a first prompt module for prompting a user to set a first password to enter the private system when entering the private system for the first time; a second prompt module for completing the setting After the first password, the user is prompted to bind the first key unit.
  • the first key unit is more than one key unit.
  • the second prompting module includes: a storage module, configured to store the first password in the first key unit after the binding of the first key unit is completed.
  • the apparatus further includes: an exit module, configured to automatically exit the privacy system when the first key unit is detected to be unplugged.
  • the present invention also provides a device for entering a private system.
  • the device includes: a second obtaining module configured to obtain a first password for entering the private system when a user initiates an entry request to enter the private system; and a third verification A module for verifying whether the first password is correct when the first password is obtained; a second detecting module for detecting whether the first key unit is inserted if the first password is correct; Two sending modules are used to send the first encrypted data to the first key unit if it is detected that the first key unit has been inserted; and a second receiving module is used when the first key unit is verified When the first encrypted data is correct, receiving the second encrypted data sent by the first key unit; a fourth verification module for verifying whether the second encrypted data is correct; a second entry module for if If the second encrypted data is correct, the entry request is allowed to enter the private system.
  • the device further includes: a third prompt module for prompting the user to set a first password for entering the private system when entering the private system for the first time; a fourth prompt module for completing the setting After the first password, the user is prompted to bind the first key unit.
  • the first key unit is more than one key unit.
  • the device further includes: a first exit module, configured to automatically exit the privacy system when the first key unit is detected to be pulled out.
  • the present invention also provides a mobile terminal including a processor and a memory, where the memory is used to store a program for the device for entering the private system to execute the method for entering the private system of any one of the above; the processor is configured to use For executing a program stored in the memory.
  • the invention decrypts the system into the private system by verifying that the first key of the first key unit, the first mobile device information of the first key unit, and the entered first password of the system are correct, thereby entering the private system, thereby strengthening the private information.
  • the beneficial effect of security protection is to solve the problem that the security protection of private information such as system software and files in mobile terminals needs to be strengthened.
  • FIG. 1 is a schematic flowchart of a method for entering a privacy system according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a method for entering a privacy system according to another embodiment of the present invention.
  • FIG. 3 is a schematic block diagram of a structure of a device for entering a privacy system according to an embodiment of the present invention
  • FIG. 4 is a schematic block diagram of a structure of a device for entering a privacy system according to another embodiment of the present invention.
  • FIG. 5 is a schematic block diagram of a mobile terminal according to an embodiment of the present invention.
  • an embodiment of the present invention provides a method for entering a private system, which aims to solve the problem of strengthening the security of private file management.
  • the privacy system is in a mobile terminal.
  • the mobile terminal is a mobile phone;
  • the first key unit is UK (UKey).
  • the method includes the following steps:
  • the user initiates an entry request to enter the private system by clicking or sliding the desktop of the mobile terminal, and the like, after receiving the entry request, the private system detects whether the first key unit is inserted into the mobile terminal.
  • the first key unit controls the entry of the private system in the form of a hardware key.
  • the privacy system detects that the first key unit is inserted into the mobile terminal, it sends the first encrypted data to the first key unit, and the first key unit verifies the first encrypted data. It is verified whether the first encrypted data is the data information read and stored by the private system when the first key unit is first inserted into the mobile terminal and connected to the private system.
  • the first encrypted data is IMEI (International Mobile Equipment Identity) of the mobile terminal bound to the first key unit and SN (Series ID) of the first key unit.
  • the first key unit verifies that the first encrypted data is the first time that the first key unit is inserted into the mobile terminal and connected to the private system, the data information read and stored by the private system, Send the second encrypted data to the privacy system. That is, when the first key unit verifies that the currently inserted mobile terminal is a mobile terminal bound to it, it sends the second encrypted data to the mobile terminal.
  • the second encrypted data is IMEI information of the mobile terminal bound to the first key unit and SN information of the first key unit.
  • the private system when the private system receives the second encrypted data sent by the currently inserted first key unit, it verifies whether the second encrypted data is read and stored when it is bound to the first key unit for the first time. Encrypted data information of the first key unit. That is, it is verified whether the currently inserted first key unit is the first key unit bound to it.
  • the private system verifies that the received second encrypted data is correct (that is, it verifies that the currently inserted first key unit is the first key unit bound to it), it can be entered through user input.
  • the password of the private system or the private system automatically reads the password for entering the private system stored in the first key unit, etc. Enter the password for entering the private system in the private system, and the private system reads the password for entering the private system for the private system, that is, First password.
  • the private system After the private system obtains the entered first password for entering the private system, it verifies whether the entered first password for entering the private system is consistent with the password information for entering the system stored in the private system.
  • the privacy system verifies that the entered first password information for entering the private system is consistent with the information for entering the system password stored in the private system, it accepts the user's request to enter the private system, that is, the entry request. To enter the private system.
  • the method before step S1 of detecting whether the first key unit is inserted when the user initiates an entry request to enter the private system, includes: prompting the user to enter the private system when entering the private system for the first time. After completing setting the first password, the user is prompted to bind the first key unit.
  • the private system When entering the private system for the first time, the private system prompts the user to set a password for entering the private system by popping up a window for setting a password, and the password is the first password.
  • the private system stores the set password for entering the private system, as the password required for each subsequent entry into the private system, and as the comparison content for verifying whether the entered password is correct each time after entering the private system.
  • the private system After setting the first password, the private system prompts the user to bind the first key unit by popping up a prompt binding window and other forms.
  • the privacy system recognizes that the first key unit is inserted into the mobile terminal for the first time, and reads and stores the information stored in the security chip of the first key unit, that is, the SN information of the first key unit; at the same time, it also reads and stores The information of the mobile terminal, that is, the IMEI information of the mobile terminal, and then generate the first encrypted data for verifying whether the inserted key unit is the comparison condition content of the bound first key unit when entering the private system later. .
  • the first key unit also reads and stores the IMEI information of the inserted mobile terminal, and generates its own SN information and IMEI information to generate the second encrypted data.
  • the number of bound first key units is one.
  • the first key unit is one key unit, or more than one key unit.
  • the number of the first key units bound may be one or more. Generally, the number of the first key units bound is two at most. Binding multiple key units is to enable the private system to enter the private system through another key unit when one key unit is lost. Too many bindings is not conducive to the security of the private system. Therefore, at most two key units are bound. When the bound key units are lost, the private system cannot be entered, which guarantees relatively absolute security.
  • the first password is a password, or more than one password.
  • the number of the first passwords described above may be one or more. That is, when the password for entering the private system is set when entering the private system for the first time, multiple passwords can be set to enhance its security. When only one password is set, the secret is a digital password; when multiple passwords are set, in addition to the first basic password that is set as a digital password, the second and subsequent passwords can be digital passwords or pattern passwords or fingerprint passwords.
  • the method includes: after completing binding the first key unit, storing the first password in the first A key unit.
  • a window pops up asking whether to grant the key unit decryption permission.
  • the private system sends the first password to the bound first key unit.
  • the key unit stores its first password.
  • the user inserts the first key unit into the mobile terminal after initiating an entry request to enter the private system.
  • the private system verifies that the inserted key unit is
  • the first password stored in the currently inserted first key unit is automatically read and verified, and after verifying that the first password is correct, it accepts the entry request and enters the private system. That is, after inserting the bound key unit, you do not need to enter the password to enter the private system to enter the private system.
  • the private system verifies that the inserted first key unit is the bound first key unit, after a preset first time, a prompt window for entering a password for entering the private system pops up, and the user enters the first password, or After the preset first time, the private system can read the first password stored in the inserted first key unit.
  • the preset first time can be set to 1 minute.
  • step S7 of allowing the access request to enter the private system if the first password is correct the method includes:
  • the private system After entering the private system, after using the private system, in order to prevent users from forgetting to quit the private system due to factors such as rush and time urgency, the private information in the system is leaked.
  • the private system detects the first key unit and pulls out the mobile terminal. Exit the system automatically.
  • the method includes: when entering the private system, after a second preset time, a prompt window for re-entering the password for entering the private system is displayed.
  • the second preset time is 20 minutes; the password for entering the private system is the first password for entering the private system.
  • the second preset time can be set by the user according to personal wishes. For example, when a user enters a private system to view a file, a window pops up after 20 minutes.
  • the window content includes a password entry box and a confirmation key to enter the private system.
  • the page returns to the page before the popup window.
  • the method further includes: when entering the private system, detecting whether there is a user operating the private system in the private system within a third preset time; If there is no user operation on the private system within the preset time, a prompt window for re-entering the password for entering the private system pops up.
  • the private system After entering the private system, within the third preset time, the private system detects whether the user has operated the private system. If it is not detected that the user has operated the private system, the current page is converted into the password for entering the private system. Window page, the user can only open the private system after entering the password to enter the private system.
  • the third preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. For example, when accessing a private system to view files, etc., within 20 minutes, the private system cannot detect the presence of page-turning files, text input, and other operations that are in touch with the screen of the mobile terminal.
  • a window pops up. The window content includes information about entering the private system. Password input box and confirmation key. When the user enters the first password, it returns to the page before the pop-up window.
  • the method further includes: after entering the private system, when the voice information is recognized, determining whether the voiceprint feature in the voice information is the same as the voiceprint feature set in the input Consistent
  • the user When entering the private system for the first time to set the password for entering the private system, the user has set the voice entry setting, and the private system obtains and stores the user's voiceprint characteristics. Enter the private system again. If the user using the private system makes a sound, the private system collects the voice and determines whether the voiceprint characteristics of the voice information are consistent with the voiceprint characteristics of the settings. When a discrepancy is detected, a window pops up. The window content includes Enter the password input box and confirmation key of the private system. After the user enters the first password, the user can return to the page before the pop-up window.
  • the password for entering the private system is the first password for entering the private system.
  • the method includes: after entering the private system, obtaining a voiceprint feature of the user; when the voice information is recognized, analyzing whether the voice information is related to the voiceprint feature of the user Consistent; if not, a prompt window for re-entering the password to enter the private system pops up.
  • the user After entering the private system, the user needs to enter the voice to collect and store voiceprint features.
  • the private system recognizes that voice information exists, collects the voiceprint characteristics of the voice information, and determines whether the voiceprint characteristics are consistent with the user's voiceprint characteristics. If an inconsistency is detected, a window pops up.
  • the window content includes a password input box and a confirmation key to enter the private system.
  • the user After the user enters the first password, the user can return to the page before the pop-up window.
  • the password for entering the private system is the first password for entering the private system. For example, in the process of using the private system, user A and user B use the private system together or user B is using the private system for various reasons.
  • the voiceprint feature acquired and stored by the private system is the voiceprint feature of user A. .
  • User B makes a sound when using the private system.
  • the private system collects the voice information and collects and judges the voiceprint features in it. It is judged that the collected voiceprint features are not the voiceprint features of user A. It immediately closes the current page and pops up a
  • the window contains the password input box and confirmation key for entering the private system. Only the first password can be entered to restore the page before the pop-up window.
  • the embodiment of the present invention achieves the beneficial effect of strengthening the protection of private information security by verifying that the key of the key unit and the entered password for entering the system are correct and entering the private system, and aims to solve the private information in the mobile terminal. Issues that need to be strengthened for security protection.
  • a method for entering a private system includes:
  • the user initiates an entry request to enter the private system by clicking or sliding on the desktop of the mobile terminal, etc.
  • the private system After the private system receives the entry request, it obtains the password for entering the private system, that is, the first password.
  • the private system After the private system obtains the entered first password for entering the private system, it verifies whether the entered first password for entering the private system is consistent with the password for entering the system stored in the private system.
  • the private system After the private system verifies that the entered first password for entering the private system is consistent with the password for entering the system stored in the private system, it detects whether the first key unit is inserted into the mobile terminal.
  • the first key unit controls the entry of the private system in the form of a hardware key.
  • the privacy system detects that the first key unit is inserted into the mobile terminal, it sends the first encrypted data to the first key unit, and the first key unit verifies the first encrypted data. It is verified whether the first encrypted data is the data information read and stored by the private system when the first key unit is first inserted into the mobile terminal and connected to the private system.
  • the first encrypted data is IMEI (International Mobile Equipment Identity) of the mobile terminal bound to the first key unit and SN (Series ID) of the first key unit.
  • the first key unit verifies that the first encrypted data is the first time that the first key unit is inserted into the mobile terminal and connected to the private system, the data information read and stored by the private system, Send the second encrypted data to the privacy system. That is, when the first key unit verifies that the currently inserted mobile terminal is a mobile terminal bound to it, it sends the second encrypted data to the mobile terminal.
  • the second encrypted data is IMEI information of the mobile terminal bound to the first key unit and SN information of the first key unit.
  • the private system when the private system receives the second encrypted data sent by the currently inserted first key unit, it verifies whether the second encrypted data is read and stored when it is bound to the first key unit for the first time. Encrypted data information of the first key unit. That is, it is verified whether the currently inserted first key unit is the first key unit bound to it.
  • the private system After the private system verifies that the obtained second encrypted data is correct, it accepts a user-initiated request to enter the private system, that is, an entry request, to enter the private system.
  • the method before the above-mentioned step S21 of obtaining the first password for entering the private system when the user initiates an entry request to enter the private system, the method includes: when entering the private system for the first time, prompting the user to set to enter the private system After completing setting the first password, the user is prompted to bind the first key unit.
  • the private system When entering the private system for the first time, the private system prompts the user to set a password for entering the private system by popping up a window for setting a password, and the password is the first password.
  • the private system stores the set password for entering the private system, as the password required for each subsequent entry into the private system, and as the comparison content for verifying whether the entered password is correct each time after entering the private system.
  • the privacy system After setting the first password, the privacy system prompts the user to bind the first key unit by popping up a prompt binding window and the like.
  • the privacy system recognizes that the first key unit is inserted into the mobile terminal for the first time, and reads and stores the information stored in the security chip of the first key unit, that is, the SN information of the first key unit; at the same time, it also reads and stores The information of the mobile terminal, that is, the IMEI information of the mobile terminal, and then generate the first encrypted data for verifying whether the inserted key unit is the comparison condition content of the bound first key unit when entering the private system later. .
  • the first key unit also reads and stores the IMEI information of the inserted mobile terminal, and generates its own SN information and IMEI information to generate the second encrypted data.
  • the number of bound first key units is one.
  • the first key unit is one key unit, or more than one key unit.
  • the number of the first key units bound may be one or more. Generally, the number of the first key units bound is two at most.
  • the binding of multiple key units is to enable the private system to enter the private system through another key unit if one key unit is lost. Too many bindings is not conducive to the security of the private system. Therefore, at most two key units are bound. When the bound key units are lost, the private system cannot be entered, which guarantees relatively absolute security.
  • the first password is a password, or more than one password.
  • the number of the first passwords described above may be one or more. That is, when the password for entering the private system is set when entering the private system for the first time, multiple passwords can be set to enhance its security. When only one password is set, the secret is a digital password; when multiple passwords are set, in addition to the first basic password that is set as a digital password, the second and subsequent passwords can be digital passwords or pattern passwords or fingerprint passwords.
  • step S27 of entering the private system the method includes: when the first key unit is detected to be pulled out, the private system is automatically exited.
  • the private system After entering the private system, after using the private system, in order to prevent users from forgetting to quit the private system due to factors such as rush and time urgency, the private information in the system is leaked.
  • the private system detects the first key unit and pulls out the mobile terminal. Exit the system automatically.
  • the method includes: when entering the private system, after a second preset time, a prompt window for re-entering the password for entering the private system is displayed.
  • the second preset time is 20 minutes; the password for entering the private system is the first password for entering the private system.
  • the second preset time can be set by the user according to personal wishes. For example, when a user enters a private system to view a file, a window pops up after 20 minutes.
  • the window content includes a password entry box and a confirmation key to enter the private system.
  • the page returns to the page before the popup window.
  • the method further includes: when entering the private system, detecting whether there is a user operating the private system in the private system within a third preset time; If there is no user operation on the private system within the preset time, a prompt window for re-entering the password for entering the private system pops up.
  • the private system After entering the private system, within the third preset time, the private system detects whether the user has operated the private system. If it is not detected that the user has operated the private system, the current page is converted into the password for entering the private system. Window page, the user can only open the private system after entering the password to enter the private system.
  • the third preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. For example, when accessing a private system to view files, etc., within 20 minutes, the private system cannot detect the presence of page-turning files, text input, and other operations that are in touch with the screen of the mobile terminal.
  • a window pops up. The window content includes information about entering the private system. Password input box and confirmation key. When the user enters the first password, it returns to the page before the pop-up window.
  • the method further includes: after entering the private system, when the voice information is recognized, determining whether the voiceprint feature in the voice information is the same as the voiceprint feature set in the input. Consistent
  • the user When entering the private system for the first time to set the password for entering the private system, the user has set the voice entry setting, and the private system obtains and stores the user's voiceprint characteristics. Enter the private system again. If the user using the private system makes a sound, the private system collects the voice and determines whether the voiceprint characteristics of the voice information are consistent with the voiceprint characteristics of the settings. When a discrepancy is detected, a window pops up. The window content includes Enter the password input box and confirmation key of the private system. After the user enters the first password, the user can return to the page before the pop-up window.
  • the password for entering the private system is the first password for entering the private system.
  • the method includes: after entering the private system, obtaining a voiceprint feature of the user; when the voice information is recognized, analyzing whether the voice information is related to the voiceprint feature of the user Consistent; if not, a prompt window for re-entering the password to enter the private system pops up.
  • the user After entering the private system, the user needs to enter the voice to collect and store voiceprint features.
  • the private system recognizes that voice information exists, collects the voiceprint characteristics of the voice information, and determines whether the voiceprint characteristics are consistent with the user's voiceprint characteristics. If an inconsistency is detected, a window pops up.
  • the window content includes a password input box and a confirmation key to enter the private system.
  • the user After the user enters the first password, the user can return to the page before the pop-up window.
  • the password for entering the private system is the first password for entering the private system. For example, in the process of using the private system, user A and user B use the private system together or user B is using the private system for various reasons.
  • the voiceprint feature acquired and stored by the private system is the voiceprint feature of user A. .
  • User B makes a sound when using the private system.
  • the private system collects the voice information and collects and judges the voiceprint features in it. It is judged that the collected voiceprint features are not the voiceprint features of user A. It immediately closes the current page and pops up a
  • the window contains the password input box and confirmation key for entering the private system. Only the first password can be entered to restore the page before the pop-up window.
  • the embodiment of the present invention achieves the beneficial effect of strengthening the protection of private information security by verifying that the key of the key unit and the entered password for entering the system are correct and entering the private system, and aims to solve the private information in the mobile terminal. Issues that need to be strengthened for security protection.
  • an embodiment of the present invention provides a device 1 for entering a private system, which aims to solve the problem of enhancing the security of private file management.
  • the privacy system is in a mobile terminal.
  • the access device 1 of the private system includes:
  • a first detection module 11 is configured to detect whether a first key unit is inserted when a user initiates an entry request to enter a private system.
  • the user initiates an entry request to enter the private system by clicking or sliding the desktop of the mobile terminal, and the like, after the private system receives the entry request, it is determined whether the first key unit is inserted into the mobile terminal. Detection.
  • the first key unit controls the entry of the private system in the form of a hardware key.
  • the first obtaining module 12 is configured to send the first encrypted data to the first key unit if it is detected that the first key unit has been inserted.
  • the privacy system detects that the first key unit is inserted into the mobile terminal, it sends the first encrypted data to the first key unit, and the first key unit performs the first encrypted data verification. It is verified whether the first encrypted data is the data information read and stored by the private system when the first key unit is first inserted into the mobile terminal and connected to the private system.
  • the first encrypted data is IMEI (International Mobile Equipment Identity) of the mobile terminal bound to the first key unit and SN (Series ID) of the first key unit.
  • the first receiving module 13 is configured to receive the second encrypted data sent by the first key unit when the first key unit verifies that the first encrypted data is correct.
  • the first receiving module 13 when the first key unit verifies that the first encrypted data is the first time that the first key unit is inserted into the mobile terminal and connected to the private system, the data read and stored by the private system
  • the second encrypted data is sent to the private system. That is, when the first key unit verifies that the currently inserted mobile terminal is a mobile terminal bound to it, it sends the second encrypted data to the mobile terminal.
  • the second encrypted data is IMEI information of the mobile terminal bound to the first key unit and SN information of the first key unit.
  • the first verification module 14 is configured to verify whether the second encrypted data is correct.
  • the privacy system when the privacy system receives the second encrypted data sent by the currently inserted first key unit, it verifies whether the second encrypted data is read for the first time when it is bound to the first key unit. Fetch and store the encrypted data information of the first key unit. That is, it is verified whether the currently inserted first key unit is the first key unit bound to it.
  • the second obtaining module 15 is configured to obtain a first password for entering the private system if the second encrypted data is correct.
  • the privacy system verifies that the received second encrypted data is correct (that is, it is verified that the currently inserted first key unit is the first key unit bound to it), it may The user enters the password into the private system or the private system automatically reads the password to enter the private system stored in the first key unit.
  • the password to enter the private system is entered in the private system, and the private system reads the private system and enters the private system.
  • Password which is the first password.
  • the second verification module 16 is configured to verify whether the first password is correct when the first password is obtained.
  • the private system After the private system obtains the first password entered into the private system, it verifies whether the first password entered into the private system is consistent with the password entered into the system stored in the private system.
  • a first entry module 17 is used to allow an entry request to enter the private system if the first password is correct.
  • the privacy system verifies that the entered first password for accessing the private system is consistent with the password for accessing the system stored in the private system, and then accepts the user's request to enter the private system, that is, the access request To enter the private system.
  • the device 1 for entering a private system further includes: a first prompting module for prompting a user to set a first password for entering the private system when entering the private system for the first time; a second prompting module for After setting the first password, the user is prompted to bind the first key unit.
  • the private system when entering the private system for the first time, the private system prompts the user to set a password for entering the private system by popping up a window for setting a password, and the password is the first password.
  • the private system stores the set password for entering the private system, as the password required for each subsequent entry into the private system, and as the comparison content for verifying whether the entered password is correct each time after entering the private system.
  • the privacy system After setting the first password, the privacy system prompts the user to bind the first key unit by popping up a prompt binding window and the like.
  • the private system recognizes that the first key unit is inserted into the mobile terminal for the first time, and the private system stores the information stored in the security chip of the first key unit, that is, the SN information of the first key unit; at the same time, it also reads and stores the mobile
  • the terminal information that is, the IMEI information of the mobile terminal, further generates first encrypted data for verifying whether the inserted key unit is the comparison condition content of the bound first key unit when entering the private system later.
  • the first key unit also reads and stores the IMEI information of the inserted mobile terminal, and generates its own SN information and IMEI information to generate the second encrypted data.
  • the number of bound first key units is one.
  • the first key unit is one key unit, or more than one key unit.
  • the number of the first key units bound may be one or more. Generally, the number of the first key units bound is two at most. Binding multiple key units is to enable the private system to enter the private system through another key unit when one key unit is lost. Too many bindings is not conducive to the security of the private system. Therefore, at most two key units are bound. When the bound key units are lost, the private system cannot be entered, which guarantees relatively absolute security.
  • the first password is a password, or more than one password.
  • the number of the first passwords described above may be one or more. That is, when the password for entering the private system is set when entering the private system for the first time, multiple passwords can be set to enhance its security. When only one password is set, the secret is a digital password; when multiple passwords are set, in addition to the first basic password that is set as a digital password, the second and subsequent passwords can be digital passwords or pattern passwords or fingerprint passwords.
  • the second prompt module further includes:
  • the storage module is configured to store the first password in the first key unit after binding the first key unit.
  • a window prompting whether to grant the decryption authority of the key unit pops up.
  • the private system sends the first password to the bound first A key unit.
  • the first key unit stores its first password.
  • the user inserts the first key unit into the mobile terminal after initiating an entry request to enter the private system.
  • the private system verifies that When the inserted key unit is the bound first key unit, the first password stored in the currently inserted first key unit is automatically read and verified, and after verifying that the first password is correct, the access request is accepted, Enter a private system. That is, after inserting the bound key unit, you do not need to enter the password to enter the private system to enter the private system.
  • the method before the step of obtaining the first password for entering the private system, includes: a first input module, configured to: when the second encrypted data is correct, enter a password for entering the private system after a preset first time; password.
  • a prompt for entering a password to enter the private system pops up. Window, the user enters the first password, or the private system can read the first password stored in the inserted first key unit after the preset first time.
  • the preset first time can be set to 1 minute.
  • the apparatus 1 for entering the private system further includes:
  • the exit module is configured to automatically exit the private system when detecting the first key unit is pulled out.
  • the private system After entering the private system, after the use of the private system ends, in order to prevent users from forgetting to exit the private system due to factors such as rush and time urgency, the private system detects the first key unit. After unplugging the mobile terminal, it will exit the system automatically.
  • the device 1 for entering the private system further includes: a first pop-up module, configured to pop up a prompt window for re-entering the password for entering the private system after the second preset time when entering the private system.
  • the password for entering the private system needs to be entered again before the private system can continue to operate.
  • the second preset time is 20 minutes; the password for entering the private system is the first password for entering the private system.
  • the second preset time can be set by the user according to personal wishes. For example, when a user enters a private system to view a file, a window pops up after 20 minutes.
  • the window content includes a password entry box and a confirmation key to enter the private system.
  • the page returns to the page before the popup window.
  • the device 1 for entering the private system further includes: a third detection module, configured to detect whether there is a user operating the private system within the third preset time when entering the private system; the second A pop-up module is configured to pop up a prompt window for re-entering the password for entering the private system if there is no user operation on the private system within the third preset time.
  • the private system detects whether the user has operated the private system, and if it is not detected that the user has performed the private system Operation, the current page is converted into a window page for entering the password for entering the private system, and the user can enter the password for entering the private system before opening the private system.
  • the third preset time is 20 minutes; the password for entering the private system is the first password for entering the private system.
  • the private system cannot detect the presence of page-turning files, text input, and other operations that are in touch with the screen of the mobile terminal.
  • a window pops up.
  • the window content includes information about entering the private system. Password input box and confirmation key. When the user enters the first password, it returns to the page before the pop-up window.
  • the device 1 for entering a private system further includes: a first judgment module, configured to determine whether the voiceprint feature in the voice information is consistent with the input voice when the voice information is recognized after entering the private system. Pattern characteristics are consistent;
  • the third pop-up module is used to pop up a prompt window for re-entering the password for entering the private system if they are not consistent.
  • the user when the user enters the private system for the first time to set the password for entering the private system, the user performs a voice entry setting, and the private system acquires and stores the user's voiceprint characteristics. Enter the private system again. If the user using the private system makes a sound, the private system collects the voice and determines whether the voiceprint characteristics of the voice information are consistent with the voiceprint characteristics of the settings. When a discrepancy is detected, a window pops up. The window content includes Enter the password input box and confirmation key of the private system. After the user enters the first password, the user can return to the page before the pop-up window.
  • the password for entering the private system is the first password for entering the private system.
  • the device 1 for entering the private system further includes: a third acquisition module for acquiring the voiceprint characteristics of the user after entering the private system; and an analysis module for analyzing the voice when the voice information is recognized Whether the information is consistent with the user's voiceprint characteristics; a fourth pop-up module is used to pop up a prompt window for re-entering the password for entering the private system if they are not consistent.
  • the user after entering the private system, the user needs to input voice to collect and store voiceprint features.
  • the private system recognizes that voice information exists, collects the voiceprint characteristics of the voice information, and determines whether the voiceprint characteristics are consistent with the user's voiceprint characteristics. If an inconsistency is detected, a window pops up.
  • the window content includes a password input box and a confirmation key to enter the private system. After the user enters the first password, the user can return to the page before the pop-up window.
  • the password for entering the private system is the first password for entering the private system.
  • the voiceprint feature acquired and stored by the private system is the voiceprint feature of user A. .
  • User B makes a sound when using the private system.
  • the private system collects the voice information and collects and judges the voiceprint features in it. It is judged that the collected voiceprint features are not the voiceprint features of user A. It immediately closes the current page and pops up a
  • the window contains the password input box and confirmation key for entering the private system. Only the first password can be entered to restore the page before the pop-up window.
  • the embodiment of the present invention achieves the beneficial effect of strengthening the protection of private information security by verifying that the key of the key unit and the entered password for entering the system are correct and entering the private system, and aims to solve the private information in the mobile terminal. Issues that need to be strengthened for security protection.
  • the present invention further provides a device 2 for entering a private system.
  • the device 2 for entering the private system includes:
  • the second obtaining module 21 is configured to obtain a first password for entering the private system when the user initiates an entry request to enter the private system.
  • the user initiates an entry request to enter the private system by clicking or sliding the desktop of the mobile terminal, etc.
  • the private system After the private system receives the entry request, it obtains the password for entering the private system, that is, the first password. .
  • the third verification module 22 is configured to verify whether the first password is correct when the first password is obtained.
  • the private system After the private system obtains the entered first password for entering the private system, it verifies whether the entered first password for entering the private system is consistent with the password for entering the system stored in the private system.
  • the second detecting module 23 is configured to detect whether the first key unit is inserted if the first password is correct.
  • the privacy system verifies that the entered first password for entering the private system is consistent with the password for entering the system stored in the private system, and then detects whether the first key unit is inserted into the mobile terminal.
  • the first key unit controls the entry of the private system in the form of a hardware key.
  • the second sending module 24 is configured to send the first encrypted data to the first key unit if it is detected that the first key unit has been inserted.
  • the privacy system detects that the first key unit is inserted into the mobile terminal, it sends the first encrypted data to the first key unit, and the first key unit performs the first encrypted data verification. It is verified whether the first encrypted data is the data information read and stored by the private system when the first key unit is first inserted into the mobile terminal and connected to the private system.
  • the first encrypted data is IMEI (International Mobile Equipment Identity) of the mobile terminal bound to the first key unit and SN (Series ID) of the first key unit.
  • the second receiving module 25 is configured to receive the second encrypted data sent by the first key unit when the first key unit verifies that the first encrypted data is correct.
  • the first key unit verifies that the first encrypted data is the first time that the first key unit is inserted into the mobile terminal and connected to the private system, the data read and stored by the private system
  • the second encrypted data is sent to the private system. That is, when the first key unit verifies that the currently inserted mobile terminal is a mobile terminal bound to it, it sends the second encrypted data to the mobile terminal.
  • the second encrypted data is IMEI information of the mobile terminal bound to the first key unit and SN information of the first key unit.
  • the fourth verification module 26 is configured to verify whether the second encrypted data is correct.
  • the privacy system when the privacy system receives the second encrypted data sent by the currently inserted first key unit, it verifies whether the second encrypted data is read for the first time when it is bound to the first key unit Fetch and store the encrypted data information of the first key unit. That is, it is verified whether the currently inserted first key unit is the first key unit bound to it.
  • a second entry module 27 is used to allow an entry request to enter the private system if the first key is correct.
  • the private system After the private system verifies that the obtained second encrypted data is correct, it accepts a user-initiated request to enter the private system, that is, an entry request, to enter the private system.
  • the apparatus 1 for entering the private system further includes:
  • a third prompt module configured to prompt a user to set a first password to enter the private system when entering the private system for the first time
  • a fourth prompting module is configured to prompt the user to bind the first key unit after the first password is set.
  • the private system when entering the private system for the first time, the private system prompts the user to set a password for entering the private system by popping up a window for setting a password, and the password is the first password.
  • the private system stores the set password for entering the private system, as the password required for each subsequent entry into the private system, and as the comparison content for verifying whether the entered password is correct each time after entering the private system.
  • the privacy system After setting the first password, the privacy system prompts the user to bind the first key unit by popping up a prompt binding window and the like.
  • the privacy system recognizes that the first key unit is inserted into the mobile terminal for the first time, and reads and stores the information stored in the security chip of the first key unit, that is, the SN information of the first key unit; at the same time, it also reads and stores The information of the mobile terminal, that is, the IMEI information of the mobile terminal, and then generate the first encrypted data for verifying whether the inserted key unit is the comparison condition content of the bound first key unit when entering the private system later. .
  • the first key unit also reads and stores the IMEI information of the inserted mobile terminal, and generates its own SN information and IMEI information to generate the second encrypted data.
  • the number of bound first key units is one.
  • the first key unit is one key unit, or more than one key unit.
  • the number of the first key units bound may be one or more. Generally, the number of the first key units bound is two at most. Binding multiple key units is to enable the private system to enter the private system through another key unit when one key unit is lost. Too many bindings is not conducive to the security of the private system. Therefore, at most two key units are bound. When the bound key units are lost, the private system cannot be entered, which guarantees relatively absolute security.
  • the first password is a password, or more than one password.
  • the number of the first passwords described above may be one or more. That is, when the password for entering the private system is set when entering the private system for the first time, multiple passwords can be set to enhance its security. When only one password is set, the secret is a digital password; when multiple passwords are set, in addition to the first basic password that is set as a digital password, the second and subsequent passwords can be digital passwords or pattern passwords or fingerprint passwords.
  • the apparatus 1 for entering the private system further includes:
  • the first exit module is configured to automatically exit the private system when detecting that the first key unit is pulled out.
  • the private system After entering the private system, after using the private system, in order to prevent users from forgetting to exit the private system due to factors such as rush and time urgency, the private system detects the first secret. After the key unit is pulled out of the mobile terminal, it automatically exits the system.
  • the device 2 for entering the private system further includes a fifth pop-up module, configured to pop up a prompt window for re-entering the password for entering the private system after the second preset time when entering the private system.
  • the password for entering the private system needs to be entered again before the private system can continue to operate.
  • the second preset time is 20 minutes; the password for entering the private system is the first password for entering the private system.
  • the second preset time can be set by the user according to personal wishes. For example, when a user enters a private system to view a file, a window pops up after 20 minutes.
  • the window content includes a password entry box and a confirmation key to enter the private system.
  • the page returns to the page before the popup window.
  • the device 2 for entering the private system further includes: a fourth detection module, configured to detect whether there is a user operating the private system within the third preset time when entering the private system; the sixth A pop-up module is configured to pop up a prompt window for re-entering the password for entering the private system if there is no user operation on the private system within the third preset time.
  • the private system detects whether the user has operated the private system, and if it is not detected that the user has performed the private system Operation, the current page is converted into a window page for entering the password for entering the private system, and the user can enter the password for entering the private system before opening the private system.
  • the third preset time is 20 minutes; the password for entering the private system is the first password for entering the private system.
  • the private system cannot detect the presence of page-turning files, text input, and other operations that are in touch with the screen of the mobile terminal.
  • a window pops up.
  • the window content includes information about entering the private system. Password input box and confirmation key. When the user enters the first password, it returns to the page before the pop-up window.
  • the device 2 for entering the private system further includes: a second judgment module, configured to determine whether the voiceprint feature in the voice information is consistent with the input voice when the voice information is recognized after entering the private system. Pattern characteristics are consistent;
  • a seventh pop-up module is used to pop up a prompt window for re-entering the password for entering the private system if they are not consistent.
  • the user when the user enters the private system for the first time to set the password for entering the private system, the user performs a voice entry setting, and the private system acquires and stores the user's voiceprint characteristics. Enter the private system again. If the user using the private system makes a sound, the private system collects the voice and determines whether the voiceprint characteristics of the voice information are consistent with the voiceprint characteristics of the settings. When a discrepancy is detected, a window pops up. The window content includes Enter the password input box and confirmation key of the private system. After the user enters the first password, the user can return to the page before the pop-up window.
  • the password for entering the private system is the first password for entering the private system.
  • the device 2 for entering the private system further includes: a fourth obtaining module, configured to obtain a voiceprint feature of the user after entering the private system; and a first analysis module, configured to recognize voice information, Analyze whether the voice information is consistent with the user's voiceprint characteristics; the eighth pop-up module is used to pop up a prompt window for re-entering the password to enter the private system if they are not consistent.
  • the user after entering the private system, the user needs to record voice to collect and store voiceprint features.
  • the private system recognizes that voice information exists, collects the voiceprint characteristics of the voice information, and determines whether the voiceprint characteristics are consistent with the user's voiceprint characteristics. If an inconsistency is detected, a window pops up.
  • the window content includes a password input box and a confirmation key to enter the private system. After the user enters the first password, the user can return to the page before the pop-up window.
  • the password for entering the private system is the first password for entering the private system.
  • the voiceprint feature acquired and stored by the private system is the voiceprint feature of user A. .
  • User B makes a sound when using the private system.
  • the private system collects the voice information and collects and judges the voiceprint features in it. It is judged that the collected voiceprint features are not the voiceprint features of user A. It immediately closes the current page and pops up a
  • the window contains the password input box and confirmation key for entering the private system. Only the first password can be entered to restore the page before the pop-up window.
  • the embodiment of the present invention achieves the beneficial effect of strengthening the protection of private information security by verifying that the key of the key unit and the entered password for entering the system are correct and entering the private system, and aims to solve the private information in the mobile terminal. Issues that need to be strengthened for security protection.
  • an embodiment of the present invention further provides a mobile terminal, including a processor 1080 and a memory 1020, where the memory 1020 is configured to store a program for a device for entering a private system to execute the method for accessing the private system described above;
  • the processor 1080 is configured to execute a program stored in the memory.
  • the mobile terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), and a vehicle-mounted computer.
  • a mobile phone a mobile phone
  • PDA Personal Digital Assistant
  • POS Point of Sales
  • FIG. 5 is a block diagram showing a partial structure of a mobile phone related to a mobile terminal according to an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 1010, a memory 1020, an input unit 1030, a display unit 1040, a sensor 1050, an audio circuit 1060, a wireless fidelity (WiFi) module 1070, and a processor 1080 , And power supply 1090 and other components.
  • RF radio frequency
  • the RF circuit 1010 can be used for receiving and transmitting signals during information transmission and reception or during a call.
  • the downlink information of the base station is received and processed by the processor 1080; in addition, the uplink data of the design is transmitted to the base station.
  • the RF circuit 1010 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • the RF circuit 1010 can also communicate with a network and other devices through wireless communication.
  • the above wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division Multiple Access) Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), etc.
  • GSM Global System of Mobile
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • E-mail Short Messaging Service
  • the memory 1020 may be used to store software programs and modules.
  • the processor 1080 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 1020.
  • the memory 1020 may mainly include a storage program area and a storage data area, where the storage program area may store an operating system, at least one function required application program (such as a sound playback function, an image playback function, etc.), etc .; the storage data area may store data according to Data (such as audio data, phone book, etc.) created by the use of mobile phones.
  • the memory 1020 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the input unit 1030 can be used to receive inputted numeric or character information, and generate key signal inputs related to user settings and function control of the mobile phone.
  • the input unit 1030 may include a touch panel 1031 and other input devices 1032.
  • Touch panel 1031 also known as touch screen, can collect user's touch operations on or near it (such as the user using a finger, stylus, etc. any suitable object or accessory on touch panel 1031 or near touch panel 1031 Operation), and drive the corresponding connection device according to a preset program.
  • the touch panel 1031 may include two parts, a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, and detects the signal caused by the touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into contact coordinates, and sends it To the processor 1080, and can receive the commands sent by the processor 1080 and execute them.
  • various types such as resistive, capacitive, infrared, and surface acoustic wave can be used to implement the touch panel 1031.
  • the input unit 1030 may include other input devices 1032.
  • other input devices 1032 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, an operation lever, and the like.
  • the display unit 1040 may be used to display information input by the user or information provided to the user and various menus of the mobile phone.
  • the display unit 1040 may include a display panel 1041, and optionally, the display panel 1041 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1031 may cover the display panel 1041. When the touch panel 1031 detects a touch operation on or near the touch panel 1031, the touch panel 1031 transmits the touch operation to the processor 1080 to determine the type of the touch event. The type provides corresponding visual output on the display panel 1041.
  • the touch panel 1031 and the display panel 1041 are implemented as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1031 and the display panel 1041 can be integrated and Realize the input and output functions of the mobile phone.
  • the mobile phone may further include at least one sensor 1050, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1041 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1041 and / Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when it is stationary.
  • the mobile phone can be used for applications that recognize the attitude of mobile phones (such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc .; as for the mobile phone can also be equipped with gyroscope, barometer, hygrometer, thermometer, infrared sensor and other sensors, no longer here To repeat.
  • attitude of mobile phones such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tap
  • the mobile phone can also be equipped with gyroscope, barometer, hygrometer, thermometer, infrared sensor and other sensors, no longer here To repeat.
  • the audio circuit 1060, the speaker 1061, and the microphone 1062 can provide an audio interface between the user and the mobile phone.
  • the audio circuit 1060 can transmit the received electrical data converted electrical signal to the speaker 1061, and the speaker 1061 converts the sound signal to an audio signal output.
  • the microphone 1062 converts the collected sound signal into an electrical signal, and the audio circuit 1060 After receiving, it is converted into audio data, and then the audio data is output to the processor 1080 for processing, and then sent to, for example, another mobile phone via the RF circuit 1010, or the audio data is output to the memory 1020 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone can help users send and receive emails, browse web pages, and access streaming media through the WiFi module 1070. It provides users with wireless broadband Internet access.
  • FIG. 5 shows the WiFi module 1070, it can be understood that it does not belong to the necessary structure of the mobile phone, and can be omitted as needed without changing the essence of the invention.
  • the processor 1080 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone.
  • the processor 1080 runs or executes software programs and / or modules stored in the memory 1020, and calls data stored in the memory 1020 to execute.
  • Various functions and processing data of the mobile phone so as to monitor the mobile phone as a whole.
  • the processor 1080 may include one or more processing units; preferably, the processor 1080 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, and an application program, etc.
  • the modem processor mainly handles wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 1080.
  • the mobile phone also includes a power supply 1090 (such as a battery) for supplying power to various components.
  • a power supply 1090 (such as a battery) for supplying power to various components.
  • the power supply can be logically connected to the processor 1080 through a power management system, so as to implement functions such as management of charging, discharging, and power consumption management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the processor 1080 included in the mobile terminal also has the following functions:
  • the entry request is allowed to enter the privacy system.
  • the processor 1080 included in the mobile terminal also has the following functions:
  • the entry request is allowed to enter the private system.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
  • the program may be stored in a computer-readable storage medium.
  • the medium may be a read-only memory, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed in the present invention are a mobile terminal, and an entering method and device of a privacy system. The method comprises the steps of: when a user initiates an entering request of entering the privacy system, detecting whether a first key unit is inserted; if detecting that the first key unit has been inserted, sending first encrypted data to the first key unit; when the first key unit verifies that the first encrypted data is correct, receiving second encrypted data sent by the first key unit; verifying whether the second encrypted data is correct; if the second encrypted data is correct, allowing the entering request, and entering the privacy system. According to the present invention, by entering the privacy system after verifying that a key of the key unit and an input password for entering the system are corrected, the beneficial effect of enhancing privacy information safety protection is implemented, and the present invention aims at solving a problem of enhancing the privacy information safety protection in the mobile terminal.

Description

移动终端和私密系统的进入的方法、装置Method and device for entering mobile terminal and privacy system 【技术领域】[Technical Field]
本发明涉及到移动设备领域,特别是涉及到一种移动终端和私密系统的进入的方法、装置。The present invention relates to the field of mobile equipment, and in particular, to a method and device for entering a mobile terminal and a private system.
【背景技术】【Background technique】
随着网络的迅速发展,系统文件、存录的个人信息等数据信息的安全性受到了越来越大的威胁。而随着社会经济和手机技术的发展,手机现如今已成为人们必备的日常工具之一。手机内存有大量的信息和数据,其信息安全就显得尤为重要,尤其是私密信息的安全性。现在的手机都是以用户名与密码或者指纹作为加解密的方式。对于一些私密信息,以用户名与密码和指纹作为加解密方式的安全性保护就显得尤为不足,这就需要一种更能加强私密信息安全保护的方式来提供相对绝密的私密信息安全环境。如何对手机的私密信息安全进行更为加强的保护就成为了极需解决的问题。With the rapid development of the network, the security of data such as system files and recorded personal information has been increasingly threatened. With the development of social economy and mobile phone technology, mobile phones have now become one of the necessary daily tools for people. There is a large amount of information and data in the memory of the mobile phone, and its information security is particularly important, especially the security of private information. Today's mobile phones use user names and passwords or fingerprints as encryption and decryption methods. For some private information, it is particularly inadequate to use user names, passwords, and fingerprints as security protection for encryption and decryption. This requires a more secure way to protect private information to provide a relatively top-secret private information security environment. How to strengthen the protection of the private information of mobile phones has become a problem that needs to be solved.
【发明内容】[Summary of the Invention]
本发明的主要目的为提供一种私密系统的进入的方法和装置,旨在解决移动终端内私密信息安全保护加强的问题。The main purpose of the present invention is to provide a method and device for accessing a private system, which aims to solve the problem of enhanced security protection of private information in a mobile terminal.
为了实现上述发明目的,本发明提出一种私密系统的进入的方法,所述方法包括步骤:当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元;若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;验证所述第二加密数据是否正确;若所述第二加密数据是正确,则获取进入所述私密系统的第一密码;当获取到所述第一密码时,验证所述第一密码是否正确;若所述第一密码是正确,则允许所述进入请求,进入所述私密系统。In order to achieve the above-mentioned object of the present invention, the present invention provides a method for entering a private system. The method includes the steps of: when a user initiates an entry request to enter a private system, detecting whether a first key unit is inserted; When a key unit is inserted, a first encrypted data is sent to the first key unit; when the first key unit verifies that the first encrypted data is correct, it receives the first key unit to send Verify the second encrypted data is correct; if the second encrypted data is correct, obtain a first password to enter the private system; when the first password is obtained, verify the Whether the first password is correct; if the first password is correct, the entry request is allowed to enter the private system.
进一步地,所述当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元的步骤之前,包括:当第一次进入所述私密系统时,提示用户设置进入所述私密系统的第一密码;在完成设置所述第一密码之后,提示用户绑定所述第一密钥单元。Further, before the step of detecting whether the first key unit is inserted when the user initiates an entry request to enter the private system, the method includes: when the user enters the private system for the first time, prompting the user to set a password for entering the private system. A first password; after setting the first password, the user is prompted to bind the first key unit.
进一步地,所述第一密钥单元为一个以上的密钥单元;和/或,所述第一密码为一个以上的密码。Further, the first key unit is more than one key unit; and / or, the first password is more than one password.
进一步地,所述在完成设置所述第一密码之后,提示用户绑定所述第一密钥单元的步骤之后,所述方法包括:在完成绑定所述第一密钥单元之后,将所述第一密码储存在所述第一密钥单元。Further, after completing the step of prompting a user to bind the first key unit after setting the first password, the method includes: after completing binding the first key unit, The first password is stored in the first key unit.
进一步地,在所述获取进入所述私密系统的第一密码的步骤之前,所述方法包括:当所述第二加密数据是正确时,在预设第一时间之后,输入进入所述私密系统的密码。Further, before the step of obtaining the first password to enter the private system, the method includes: when the second encrypted data is correct, after a preset first time, input to enter the private system Password.
进一步地,所述若所述第一密码是为正确,则允许所述进入请求,进入所述私密系统的步骤之后,所述方法包括:当检测所述第一密钥单元拔出时,自动退出所述私密系统。Further, if the first password is correct, the entry request is allowed, and after the step of entering the private system, the method includes: when detecting that the first key unit is unplugged, automatically Exit the private system.
进一步地,在所述允许所述进入请求,进入所述私密系统的步骤之后,所述方法还包括以下至少一个步骤:Further, after the step of allowing the entry request to enter the private system, the method further includes at least one of the following steps:
当进入所述私密系统时,在第二预设时间之后,弹出再次输入进入所述私密系统的密码的提示窗口;When entering the private system, after a second preset time, a prompt window for re-entering the password for entering the private system pops up;
当进入所述私密系统时,检测所述私密系统在第三预设时间内是否存在用户对所述私密 系统进行操作;若在所述第三预设时间内不存在用户对所述私密系统进行操作,则弹出再次输入进入所述私密系统的密码的提示窗口;When entering the private system, detecting whether there is a user operating the private system in the private system within a third preset time; if there is no user performing the private system in the third preset time Operation, a prompt window for re-entering the password to enter the private system pops up;
在进入所述私密系统之后,当识别到语音信息时,判断所述语音信息中的声纹特征是否与设置录入的声纹特征一致;若不一致,则弹出再次输入进入所述私密系统的密码的提示窗口;After entering the private system, when the voice information is recognized, it is judged whether the voiceprint feature in the voice information is consistent with the entered voiceprint feature; if they are not the same, then pop-up and enter the password to enter the private system again. Prompt window
在进入所述私密系统之后,获取用户的声纹特征;当识别到语音信息时,分析所述语音信息是否与所述用户的声纹特征一致;若不一致,则弹出再次输入进入所述私密系统的密码的提示窗口。After entering the private system, obtain the voiceprint characteristics of the user; when the voice information is recognized, analyze whether the voice information is consistent with the user's voiceprint characteristics; if they are not consistent, pop up and enter again to enter the private system Prompt window for password.
本发明提出一种私密系统的进入的方法,所述方法包括步骤:当用户发起进入私密系统的进入请求时,获取进入所述私密系统的第一密码;当获取到所述第一密码时,验证所述第一密码是否正确;若所述第一密码是正确,则检测是否插入第一密钥单元;若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;验证所述第二加密数据是否正确;若所述第二加密数据是正确,则允许所述进入请求,进入所述私密系统。The invention proposes a method for entering a private system. The method includes the steps of: when a user initiates an entry request to enter a private system, obtaining a first password to enter the private system; when the first password is obtained, Verifying whether the first password is correct; if the first password is correct, detecting whether a first key unit is inserted; if detecting that the first key unit is inserted, sending first encrypted data to the A first key unit; when the first key unit verifies that the first encrypted data is correct, receiving the second encrypted data sent by the first key unit; verifying whether the second encrypted data is correct; If the second encrypted data is correct, the entry request is allowed to enter the private system.
进一步地,所述当用户发起进入私密系统的进入请求时,获取进入所述私密系统的第一密码的步骤之前,包括:当第一次进入所述私密系统时,提示用户设置进入所述私密系统的第一密码;在完成设置所述第一密码之后,提示用户绑定所述第一密钥单元。Further, when the user initiates an entry request to enter the private system, before the step of obtaining a first password to enter the private system, the method includes: when entering the private system for the first time, prompting the user to set to enter the privacy The first password of the system; after setting the first password, the user is prompted to bind the first key unit.
进一步地,所述第一密钥单元为一个以上的密钥单元;和/或,所述第一密码为一个以上的密码。Further, the first key unit is more than one key unit; and / or, the first password is more than one password.
进一步地,若所述第二加密数据是正确,则允许所述进入请求,进入所述私密系统的步骤之后,所述方法包括:当检测所述第一密钥单元拔出时,自动退出所述私密系统。Further, if the second encrypted data is correct, the entry request is allowed. After the step of entering the private system, the method includes: when detecting that the first key unit is unplugged, automatically exiting the Describe privacy systems.
进一步地,在所述允许所述进入请求,进入所述私密系统的步骤之后,所述方法还包括以下至少一个步骤:Further, after the step of allowing the entry request to enter the private system, the method further includes at least one of the following steps:
当进入所述私密系统时,在第二预设时间之后,弹出再次输入进入所述私密系统的密码的提示窗口;When entering the private system, after a second preset time, a prompt window for re-entering the password for entering the private system pops up;
当进入所述私密系统时,检测所述私密系统在第三预设时间内是否存在用户对所述私密系统进行操作;若在所述第三预设时间内不存在用户对所述私密系统进行操作,则弹出再次输入进入所述私密系统的密码的提示窗口;When entering the private system, detecting whether there is a user operating the private system in the private system within a third preset time; if there is no user performing the private system in the third preset time Operation, a prompt window for re-entering the password to enter the private system pops up;
在进入所述私密系统之后,当识别到语音信息时,判断所述语音信息中的声纹特征是否与设置录入的声纹特征一致;若不一致,则弹出再次输入进入所述私密系统的密码的提示窗口;After entering the private system, when the voice information is recognized, it is judged whether the voiceprint feature in the voice information is consistent with the entered voiceprint feature; if they are not the same, then pop-up and enter the password to enter the private system again. Prompt window
在进入所述私密系统之后,获取用户的声纹特征;当识别到语音信息时,分析所述语音信息是否与所述用户的声纹特征一致;若不一致,则弹出再次输入进入所述私密系统的密码的提示窗口。After entering the private system, obtain the voiceprint characteristics of the user; when the voice information is recognized, analyze whether the voice information is consistent with the user's voiceprint characteristics; if they are not consistent, pop up and enter again to enter the private system Prompt window for password.
本发明还提供一种私密系统的进入的装置,所述装置包括:第一检测模块,用于当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元;第一发送模块,用于若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;第一接收模块,用于当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;第一验证模块,用于验证所述第二加密数据是否正确;第一获取模块,用于若所述第二加密数据是正确,则获取进入所述私密系统的第一密码;第二验证模块,用于当获取到所述第一密码时,验证所述第一密码是否正确;第一进入模块,用于若所述第一密码是正确,则允许所述进入请求,进入所述私密系统。The present invention also provides a device for entering a private system. The device includes: a first detection module for detecting whether a first key unit is inserted when a user initiates an entry request to enter the private system; a first sending module, And if it is detected that the first key unit has been inserted, send first encrypted data to the first key unit; a first receiving module is used when the first key unit verifies the first key unit When the encrypted data is correct, receiving the second encrypted data sent by the first key unit; a first verification module for verifying whether the second encrypted data is correct; a first obtaining module for if the second If the encrypted data is correct, a first password for accessing the private system is obtained; a second verification module is used to verify whether the first password is correct when the first password is obtained; a first entry module is used for If the first password is correct, the entry request is allowed to enter the privacy system.
进一步地,所述装置还包括:第一提示模块,用于当第一次进入所述私密系统时,提示用户设置进入所述私密系统的第一密码;第二提示模块,用于在完成设置所述第一密码之后,提示用户绑定第一密钥单元。Further, the device further includes: a first prompt module for prompting a user to set a first password to enter the private system when entering the private system for the first time; a second prompt module for completing the setting After the first password, the user is prompted to bind the first key unit.
进一步地,所述第一密钥单元为一个以上的密钥单元。Further, the first key unit is more than one key unit.
进一步地,第二提示模块包括:储存模块,用于在完成绑定所述第一密钥单元之后,将所述第一密码储存在所述第一密钥单元。Further, the second prompting module includes: a storage module, configured to store the first password in the first key unit after the binding of the first key unit is completed.
进一步地,所述装置还包括:退出模块,用于当检测所述第一密钥单元拔出时,自动退出所述私密系统。Further, the apparatus further includes: an exit module, configured to automatically exit the privacy system when the first key unit is detected to be unplugged.
本发明还提供一种私密系统的进入的装置,所述装置包括:第二获取模块,用于当用户发起进入私密系统的进入请求时,获取进入所述私密系统的第一密码;第三验证模块,用于当获取到所述第一密码时,验证所述第一密码是否正确;第二检测模块,用于若所述第一密码是正确,则检测是否插入第一密钥单元;第二发送模块,用于若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;第二接收模块,用于当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;第四验证模块,用于验证所述第二加密数据是否正确;第二进入模块,用于若所述第二加密数据是正确,则允许所述进入请求,进入所述私密系统。The present invention also provides a device for entering a private system. The device includes: a second obtaining module configured to obtain a first password for entering the private system when a user initiates an entry request to enter the private system; and a third verification A module for verifying whether the first password is correct when the first password is obtained; a second detecting module for detecting whether the first key unit is inserted if the first password is correct; Two sending modules are used to send the first encrypted data to the first key unit if it is detected that the first key unit has been inserted; and a second receiving module is used when the first key unit is verified When the first encrypted data is correct, receiving the second encrypted data sent by the first key unit; a fourth verification module for verifying whether the second encrypted data is correct; a second entry module for if If the second encrypted data is correct, the entry request is allowed to enter the private system.
进一步地,所述装置还包括:第三提示模块,用于当第一次进入所述私密系统时,提示用户设置进入所述私密系统的第一密码;第四提示模块,用于在完成设置所述第一密码之后,提示用户绑定第一密钥单元。Further, the device further includes: a third prompt module for prompting the user to set a first password for entering the private system when entering the private system for the first time; a fourth prompt module for completing the setting After the first password, the user is prompted to bind the first key unit.
进一步地,所述第一密钥单元为一个以上的密钥单元。Further, the first key unit is more than one key unit.
进一步地,所述装置还包括:第一退出模块,用于当检测所述第一密钥单元拔出时,自动退出所述私密系统。Further, the device further includes: a first exit module, configured to automatically exit the privacy system when the first key unit is detected to be pulled out.
本发明还提供一种移动终端,包括处理器和存储器,所述存储器用于存储私密系统的进入的装置执行上述任一项的私密系统的进入的方法的程序;所述处理器被配置为用于执行所述存储器中存储的程序。The present invention also provides a mobile terminal including a processor and a memory, where the memory is used to store a program for the device for entering the private system to execute the method for entering the private system of any one of the above; the processor is configured to use For executing a program stored in the memory.
本发明通过验证第一密钥单元的第一密钥第一移动设备信息和所输入的进入系统的第一密码正确后信息后对系统进行解密进入私密系统,从而进入系统,实现了加强私密信息安全保护的有益效果,旨在解决移动终端内系统软件、文件等的私密信息安全保护需要加强的问题。The invention decrypts the system into the private system by verifying that the first key of the first key unit, the first mobile device information of the first key unit, and the entered first password of the system are correct, thereby entering the private system, thereby strengthening the private information. The beneficial effect of security protection is to solve the problem that the security protection of private information such as system software and files in mobile terminals needs to be strengthened.
【附图说明】[Brief Description of the Drawings]
图1为本发明一实施例的私密系统的进入的方法的流程示意图;1 is a schematic flowchart of a method for entering a privacy system according to an embodiment of the present invention;
图2为本发明另一实施例的私密系统的进入的方法的流程示意图;2 is a schematic flowchart of a method for entering a privacy system according to another embodiment of the present invention;
图3为本发明一实施例的私密系统的进入的装置的结构示意框图;FIG. 3 is a schematic block diagram of a structure of a device for entering a privacy system according to an embodiment of the present invention; FIG.
图4为本发明另一实施例的私密系统的进入的装置的结构示意框图;4 is a schematic block diagram of a structure of a device for entering a privacy system according to another embodiment of the present invention;
图5为本发明一实施例的移动终端的结构示意框图。FIG. 5 is a schematic block diagram of a mobile terminal according to an embodiment of the present invention.
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization of the purpose, functional characteristics and advantages of the present invention will be further explained with reference to the embodiments and the drawings.
【具体实施方式】【detailed description】
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It should be understood that the specific embodiments described herein are only used to explain the present invention and are not intended to limit the present invention.
参照图1,本发明实施例提供一种私密系统的进入的方法,旨在解决加强私密文件管理的安全性的问题。在本实施例中,私密系统在移动终端中。其中,移动终端为手机端;第一密 钥单元为UK(UKey)。Referring to FIG. 1, an embodiment of the present invention provides a method for entering a private system, which aims to solve the problem of strengthening the security of private file management. In this embodiment, the privacy system is in a mobile terminal. Among them, the mobile terminal is a mobile phone; the first key unit is UK (UKey).
该方法包括以下步骤:The method includes the following steps:
S1,当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元。S1. When the user initiates an entry request to enter the private system, it is detected whether the first key unit is inserted.
在本实施例中,用户通过点击或滑动移动终端的桌面等方式对进入私密系统发起进入请求,当私密系统接收到该进入请求后,对第一密钥单元是否插入移动终端进行检测。第一密钥单元以一把硬件钥匙的形式控制私密系统的进入。In this embodiment, the user initiates an entry request to enter the private system by clicking or sliding the desktop of the mobile terminal, and the like, after receiving the entry request, the private system detects whether the first key unit is inserted into the mobile terminal. The first key unit controls the entry of the private system in the form of a hardware key.
S2,若检测到第一密钥单元已插入,则发送第一加密数据给第一密钥单元。S2. If it is detected that the first key unit has been inserted, send the first encrypted data to the first key unit.
在本实施例中,若私密系统检测到第一密钥单元插入移动终端后,则将第一加密数据发送给第一密钥单元,第一密钥单元对第一加密数据进行验证。验证其第一加密数据是否为第一密钥单元第一次插入移动终端并与私密系统连接绑定时,私密系统所读取和储存的数据信息。其中,第一加密数据为与第一密钥单元绑定的移动终端的IMEI(International Mobile Equipment Identity)和第一密钥单元的SN(Series Number)。In this embodiment, if the privacy system detects that the first key unit is inserted into the mobile terminal, it sends the first encrypted data to the first key unit, and the first key unit verifies the first encrypted data. It is verified whether the first encrypted data is the data information read and stored by the private system when the first key unit is first inserted into the mobile terminal and connected to the private system. The first encrypted data is IMEI (International Mobile Equipment Identity) of the mobile terminal bound to the first key unit and SN (Series ID) of the first key unit.
S3,当第一密钥单元验证第一加密数据是正确时,接收第一密钥单元发送的第二加密数据。S3. When the first key unit verifies that the first encrypted data is correct, receive the second encrypted data sent by the first key unit.
在本实施例中,当第一密钥单元验证第一加密数据是第一密钥单元第一次插入移动终端并与私密系统连接绑定时,私密系统所读取和储存的数据信息时,发送第二加密数据给私密系统。即当第一密钥单元验证到当前插入的移动终端是与其绑定的移动终端时,发送第二加密数据给移动终端。其中第二加密数据为与第一密钥单元绑定的移动终端的IMEI信息和第一密钥单元的SN信息。In this embodiment, when the first key unit verifies that the first encrypted data is the first time that the first key unit is inserted into the mobile terminal and connected to the private system, the data information read and stored by the private system, Send the second encrypted data to the privacy system. That is, when the first key unit verifies that the currently inserted mobile terminal is a mobile terminal bound to it, it sends the second encrypted data to the mobile terminal. The second encrypted data is IMEI information of the mobile terminal bound to the first key unit and SN information of the first key unit.
S4,验证第二加密数据是否正确。S4. Verify whether the second encrypted data is correct.
在本实施例中,私密系统接收到当前插入的第一密钥单元发送的第二加密数据时,验证第二加密数据是否是第一次与第一密钥单元绑定时读取并储存的第一密钥单元的加密数据信息。即验证当前插入的第一密钥单元是否是与其绑定的第一密钥单元。In this embodiment, when the private system receives the second encrypted data sent by the currently inserted first key unit, it verifies whether the second encrypted data is read and stored when it is bound to the first key unit for the first time. Encrypted data information of the first key unit. That is, it is verified whether the currently inserted first key unit is the first key unit bound to it.
S5,若第二加密数据是正确,则获取进入私密系统的第一密码。S5. If the second encrypted data is correct, obtain the first password for entering the private system.
在本实施例中,私密系统验证到所接收到的第二加密数据是正确(即验证到当前插入的第一密钥单元是与其绑定的第一密钥单元)后,可通过用户输入进入私密系统的密码或私密系统自动读取第一密钥单元储存的进入私密系统的密码等方式在私密系统中输入进入私密系统的密码,私密系统读取输入私密系统的进入私密系统的密码,即第一密码。In this embodiment, after the private system verifies that the received second encrypted data is correct (that is, it verifies that the currently inserted first key unit is the first key unit bound to it), it can be entered through user input. The password of the private system or the private system automatically reads the password for entering the private system stored in the first key unit, etc. Enter the password for entering the private system in the private system, and the private system reads the password for entering the private system for the private system, that is, First password.
S6,当获取到第一密码时,验证第一密码是否正确。S6. When the first password is obtained, verify whether the first password is correct.
在本实施例中,私密系统获取所输入的进入私密系统的第一密码后,验证所输入的进入私密系统的第一密码与私密系统内储存的进入系统的密码信息是否一致。In this embodiment, after the private system obtains the entered first password for entering the private system, it verifies whether the entered first password for entering the private system is consistent with the password information for entering the system stored in the private system.
S7,若第一密码是正确,则允许进入请求,进入私密系统。S7. If the first password is correct, the request is allowed to enter the private system.
在本实施例中,私密系统验证到所输入的进入私密系统的第一密码的信息与私密系统内储存的进入系统的密码的信息一致后,接受用户发起的进入私密系统的请求,即进入请求,进入私密系统。In this embodiment, after the privacy system verifies that the entered first password information for entering the private system is consistent with the information for entering the system password stored in the private system, it accepts the user's request to enter the private system, that is, the entry request. To enter the private system.
在一个实施例中,在上述的当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元的步骤S1之前,包括:当第一次进入私密系统时,提示用户设置进入私密系统的第一密码;在完成设置第一密码之后,提示用户绑定第一密钥单元。In one embodiment, before step S1 of detecting whether the first key unit is inserted when the user initiates an entry request to enter the private system, the method includes: prompting the user to enter the private system when entering the private system for the first time. After completing setting the first password, the user is prompted to bind the first key unit.
当第一次进入私密系统时,私密系统通过弹出一个设置密码的窗口等形式提示用户设置进入私密系统的密码,该密码为第一密码。私密系统将所设置的进入私密系统的密码储存起来,作为之后每次进入私密系统所需要输入的密码,也作为之后每次进入私密系统时验证所输入密码是否正确的比对内容。在完成设置第一密码之后,私密系统通过弹出一个提示绑定 窗口等形式提示用户绑定第一密钥单元。私密系统识别到第一密钥单元第一次插入移动终端,读取并储存第一密钥单元的安全芯片内储存的信息,即第一密钥单元的SN信息;同时,也读取和储存移动终端的信息,即移动终端的IMEI信息,进而生成第一加密数据,用于之后进入私密系统时验证所插入的密钥单元中是否为所绑定的第一密钥单元的比对条件内容。第一密钥单元也会读取和储存所插入的移动终端的IMEI信息,并将自身的SN信息和IMEI信息生成第二加密数据。其中,绑定的第一密钥单元的数量为一个。When entering the private system for the first time, the private system prompts the user to set a password for entering the private system by popping up a window for setting a password, and the password is the first password. The private system stores the set password for entering the private system, as the password required for each subsequent entry into the private system, and as the comparison content for verifying whether the entered password is correct each time after entering the private system. After setting the first password, the private system prompts the user to bind the first key unit by popping up a prompt binding window and other forms. The privacy system recognizes that the first key unit is inserted into the mobile terminal for the first time, and reads and stores the information stored in the security chip of the first key unit, that is, the SN information of the first key unit; at the same time, it also reads and stores The information of the mobile terminal, that is, the IMEI information of the mobile terminal, and then generate the first encrypted data for verifying whether the inserted key unit is the comparison condition content of the bound first key unit when entering the private system later. . The first key unit also reads and stores the IMEI information of the inserted mobile terminal, and generates its own SN information and IMEI information to generate the second encrypted data. The number of bound first key units is one.
在一个实施例中,上述的第一密钥单元为一个密钥单元,或者一个以上的密钥单元。In one embodiment, the first key unit is one key unit, or more than one key unit.
上述所绑定的第一密钥单元的数量可以为一个或者多个,一般绑定的第一密钥单元的数量最多为两个。绑定多个密钥单元是为了在丢失一个密钥单元时还能通过另外一个密钥单元进入私密系统。绑定数量太多不利于私密系统安全性的保障,因而最多绑定两个密钥单元,当所绑定的密钥单元都丢失时,将无法进入私密系统,这保证了相对绝对的安全。The number of the first key units bound may be one or more. Generally, the number of the first key units bound is two at most. Binding multiple key units is to enable the private system to enter the private system through another key unit when one key unit is lost. Too many bindings is not conducive to the security of the private system. Therefore, at most two key units are bound. When the bound key units are lost, the private system cannot be entered, which guarantees relatively absolute security.
在一个实施例中,上述的第一密码为一个密码,或者一个以上的密码。In one embodiment, the first password is a password, or more than one password.
上述的第一密码的数量可以一个或一个以上。即在第一次进入私密系统时设置进入私密系统的密码时,可以设置多个密码,增强其安全性。当只设置一个密码时,该秘密为数字密码;当设置多个密码时,除了设置的第一个基础密码为数字密码外,第二个之后的密码可为数字密码或者图案密码或指纹密码。The number of the first passwords described above may be one or more. That is, when the password for entering the private system is set when entering the private system for the first time, multiple passwords can be set to enhance its security. When only one password is set, the secret is a digital password; when multiple passwords are set, in addition to the first basic password that is set as a digital password, the second and subsequent passwords can be digital passwords or pattern passwords or fingerprint passwords.
在一个实施例中,在上述的在完成设置第一密码之后,提示用户绑定第一密钥单元的步骤之后,包括:在完成绑定第一密钥单元之后,将第一密码储存在第一密钥单元。In one embodiment, after the step of prompting the user to bind the first key unit after completing the setting of the first password, the method includes: after completing binding the first key unit, storing the first password in the first A key unit.
在私密系统与第一密钥单元绑定完成后,弹出一个提示是否授予密钥单元解密权限的窗口,用户确认后,私密系统发送第一密码给所绑定的第一密钥单元,第一密钥单元储存其第一密码,之后,若进入私密系统,用户在发起进入私密系统的进入请求后,将第一密钥单元插入移动终端中,当私密系统验证到所插入的密钥单元为所绑定的第一密钥单元时,自动读取和验证当前插入的第一密钥单元内储存的第一密码,验证其第一密码正确后,接受进入请求,进入私密系统。即插入所绑定的密钥单元后,无需再输入进入私密系统的密码便可进入私密系统。After the private system is bound to the first key unit, a window pops up asking whether to grant the key unit decryption permission. After the user confirms, the private system sends the first password to the bound first key unit. The key unit stores its first password. After entering the private system, the user inserts the first key unit into the mobile terminal after initiating an entry request to enter the private system. When the private system verifies that the inserted key unit is When the first key unit is bound, the first password stored in the currently inserted first key unit is automatically read and verified, and after verifying that the first password is correct, it accepts the entry request and enters the private system. That is, after inserting the bound key unit, you do not need to enter the password to enter the private system to enter the private system.
在一个实施例中,在获取进入私密系统的第一密码的步骤之前,包括:当第二加密数据是正确时,在预设第一时间之后,输入进入私密系统的密码。In one embodiment, before the step of obtaining the first password for entering the private system, when the second encrypted data is correct, after a preset first time, entering a password for entering the private system.
私密系统验证到所插入的第一密钥单元为所绑定的第一密钥单元时,在预设第一时间后,弹出输入进入私密系统的密码的提示窗口,用户输入第一密码,或者,在预设第一时间后,私密系统方可读取所插入的第一密钥单元内储存的第一密码。其中,预设第一时间可设为1分钟。When the private system verifies that the inserted first key unit is the bound first key unit, after a preset first time, a prompt window for entering a password for entering the private system pops up, and the user enters the first password, or After the preset first time, the private system can read the first password stored in the inserted first key unit. The preset first time can be set to 1 minute.
在一个实施例中,在若第一密码是正确,则允许进入请求,进入私密系统的步骤S7之后,包括:In an embodiment, after step S7 of allowing the access request to enter the private system if the first password is correct, the method includes:
当检测第一密钥单元拔出时,自动退出私密系统。When the first key unit is detected to be pulled out, the private system is automatically exited.
进入私密系统,使用私密系统结束后,为了防止用户由于匆忙、时间紧急等因素导致忘记退出私密系统而泄露系统内的私密信息,私密系统在检测到第一密钥单元拔出移动终端后,便自动退出系统。After entering the private system, after using the private system, in order to prevent users from forgetting to quit the private system due to factors such as rush and time urgency, the private information in the system is leaked. The private system detects the first key unit and pulls out the mobile terminal. Exit the system automatically.
在一个实施例中,在允许进入请求,进入私密系统的步骤之后,包括:当进入私密系统时,在第二预设时间之后,弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, after the step of allowing the access request to enter the private system, the method includes: when entering the private system, after a second preset time, a prompt window for re-entering the password for entering the private system is displayed.
进入私密系统后,超过第二预设时间,需要再次输入进入私密系统的密码,方可继续操作私密系统。其中,第二预设时间为20分钟;进入私密系统的密码为设置的进入私密系统的第一密码。第二预设时间可由用户根据个人意愿进行设置。例如:当用户进入私密系统阅览 文件,20分钟之后,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,恢复到弹出窗口前的页面。After entering the private system, after the second preset time, you need to enter the password to enter the private system again to continue operating the private system. The second preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. The second preset time can be set by the user according to personal wishes. For example, when a user enters a private system to view a file, a window pops up after 20 minutes. The window content includes a password entry box and a confirmation key to enter the private system. When the user enters the first password, the page returns to the page before the popup window.
在一个实施例中,在允许进入请求,进入私密系统的步骤之后,还包括:当进入私密系统时,检测私密系统在第三预设时间内是否存在用户对私密系统进行操作;若在第三预设时间内不存在用户对私密系统进行操作,则弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, after the step of allowing the access request to enter the private system, the method further includes: when entering the private system, detecting whether there is a user operating the private system in the private system within a third preset time; If there is no user operation on the private system within the preset time, a prompt window for re-entering the password for entering the private system pops up.
在进入私密系统后,在第三预设时间内,私密系统检测用户是否有对私密系统进行操作,若是检测不到用户对私密系统有进行操作,则将当前页面转为输入进入私密系统的密码的窗口页面,用户输入进入私密系统的密码后,方可打开私密系统。其中,第三预设时间为20分钟;进入私密系统的密码为设置的进入私密系统的第一密码。例如:进入私密系统阅览文件等时,在20分钟内,私密系统检测不到用户存在翻页文件、输入文字等与移动终端屏幕有接触感应的操作,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,恢复到弹出窗口前的页面。After entering the private system, within the third preset time, the private system detects whether the user has operated the private system. If it is not detected that the user has operated the private system, the current page is converted into the password for entering the private system. Window page, the user can only open the private system after entering the password to enter the private system. The third preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. For example, when accessing a private system to view files, etc., within 20 minutes, the private system cannot detect the presence of page-turning files, text input, and other operations that are in touch with the screen of the mobile terminal. A window pops up. The window content includes information about entering the private system. Password input box and confirmation key. When the user enters the first password, it returns to the page before the pop-up window.
在一个实施例中,在允许进入请求,进入私密系统的步骤之后,还包括:在进入私密系统之后,当识别到语音信息时,判断语音信息中的声纹特征是否与设置录入的声纹特征一致;In an embodiment, after the step of allowing the access request to enter the private system, the method further includes: after entering the private system, when the voice information is recognized, determining whether the voiceprint feature in the voice information is the same as the voiceprint feature set in the input Consistent
若不一致,则弹出再次输入进入私密系统的密码的提示窗口。If not, a prompt window for re-entering the password to enter the private system will pop up.
在第一次进入私密系统设置进入私密系统的密码时,用户进行了语音录入设置,私密系统获取并储存用户的声纹特征。再次进入私密系统,若使用私密系统的用户发出声音,私密系统收集该语音并判断该语音信息的声纹特征是否与设置录入的声纹特征一致,当检测到不一致,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,方可恢复到弹出窗口前的页面。其中,进入私密系统的密码为设置的进入私密系统的第一密码。When entering the private system for the first time to set the password for entering the private system, the user has set the voice entry setting, and the private system obtains and stores the user's voiceprint characteristics. Enter the private system again. If the user using the private system makes a sound, the private system collects the voice and determines whether the voiceprint characteristics of the voice information are consistent with the voiceprint characteristics of the settings. When a discrepancy is detected, a window pops up. The window content includes Enter the password input box and confirmation key of the private system. After the user enters the first password, the user can return to the page before the pop-up window. The password for entering the private system is the first password for entering the private system.
在一个实施例中,在允许进入请求,进入私密系统的步骤之后,包括:在进入私密系统之后,获取用户的声纹特征;当识别到语音信息时,分析语音信息是否与用户的声纹特征一致;若不一致,则弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, after the step of allowing the access request to enter the private system, the method includes: after entering the private system, obtaining a voiceprint feature of the user; when the voice information is recognized, analyzing whether the voice information is related to the voiceprint feature of the user Consistent; if not, a prompt window for re-entering the password to enter the private system pops up.
进入私密系统后,用户需要录入语音进行声纹特征的采集和储存。当使用私密系统的过程中,私密系统识别到存在语音信息,便收集该语音信息的声纹特征,并判断该声纹特征是否与用户的声纹特征一致。若检测到不一致,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,方可恢复到弹出窗口前的页面。其中,进入私密系统的密码为设置的进入私密系统的第一密码。例如:在使用私密系统过程中,用户甲和用户乙一起使用私密系统或者由于各种原因为用户乙在使用私密系统,其中,私密系统获取和储存的声纹特征的是用户甲的声纹特征。用户乙在使用私密系统时,发出声音,私密系统收集该语音信息并采集和判断其中的声纹特征,判断到采集的声纹特征不是用户甲的声纹特征,立即关闭当前页面,并弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,只有输入第一密码方可恢复到弹出窗口前的页面。After entering the private system, the user needs to enter the voice to collect and store voiceprint features. When using the private system, the private system recognizes that voice information exists, collects the voiceprint characteristics of the voice information, and determines whether the voiceprint characteristics are consistent with the user's voiceprint characteristics. If an inconsistency is detected, a window pops up. The window content includes a password input box and a confirmation key to enter the private system. After the user enters the first password, the user can return to the page before the pop-up window. The password for entering the private system is the first password for entering the private system. For example, in the process of using the private system, user A and user B use the private system together or user B is using the private system for various reasons. The voiceprint feature acquired and stored by the private system is the voiceprint feature of user A. . User B makes a sound when using the private system. The private system collects the voice information and collects and judges the voiceprint features in it. It is judged that the collected voiceprint features are not the voiceprint features of user A. It immediately closes the current page and pops up a The window contains the password input box and confirmation key for entering the private system. Only the first password can be entered to restore the page before the pop-up window.
综上所述,本发明实施例通过验证密钥单元的密钥和所输入的进入系统的密码正确后进入私密系统,实现了加强私密信息安全保护的有益效果,旨在解决移动终端内私密信息安全保护需要加强的问题。In summary, the embodiment of the present invention achieves the beneficial effect of strengthening the protection of private information security by verifying that the key of the key unit and the entered password for entering the system are correct and entering the private system, and aims to solve the private information in the mobile terminal. Issues that need to be strengthened for security protection.
参照图2,在另一个实施例中,提供一种私密系统的进入的方法,该方法步骤包括:Referring to FIG. 2, in another embodiment, a method for entering a private system is provided. The method steps include:
S21,当用户发起进入私密系统的进入请求时,获取进入私密系统的第一密码。S21. When the user initiates an entry request to enter the private system, obtain a first password to enter the private system.
在本实施例中,用户通过点击或滑动移动终端的桌面等方式对进入私密系统发起进入请求,当私密系统接收到该进入请求后,获取进入私密系统的密码,即第一密码。In this embodiment, the user initiates an entry request to enter the private system by clicking or sliding on the desktop of the mobile terminal, etc. After the private system receives the entry request, it obtains the password for entering the private system, that is, the first password.
S22,当获取到第一密码时,验证第一密码是否正确。S22. When the first password is obtained, verify whether the first password is correct.
在本实施例中,私密系统获取所输入的进入私密系统的第一密码后,验证所输入的进入私密系统的第一密码与私密系统内储存的进入系统的密码是否一致。In this embodiment, after the private system obtains the entered first password for entering the private system, it verifies whether the entered first password for entering the private system is consistent with the password for entering the system stored in the private system.
S23,若第一密码是正确,则检测是否插入第一密钥单元。S23. If the first password is correct, it is detected whether the first key unit is inserted.
在本实施例中,私密系统验证到所输入的进入私密系统的第一密码与私密系统内储存的进入系统的密码一致后,检测第一密钥单元是否插入移动终端。第一密钥单元以一把硬件钥匙的形式控制私密系统的进入。In this embodiment, after the private system verifies that the entered first password for entering the private system is consistent with the password for entering the system stored in the private system, it detects whether the first key unit is inserted into the mobile terminal. The first key unit controls the entry of the private system in the form of a hardware key.
S24,若检测到第一密钥单元已插入,则发送第一加密数据给第一密钥单元。S24. If it is detected that the first key unit has been inserted, send the first encrypted data to the first key unit.
在本实施例中,若私密系统检测到第一密钥单元插入移动终端后,则将第一加密数据发送给第一密钥单元,第一密钥单元对第一加密数据进行验证。验证其第一加密数据是否为第一密钥单元第一次插入移动终端并与私密系统连接绑定时,私密系统所读取和储存的数据信息。其中,第一加密数据为与第一密钥单元绑定的移动终端的IMEI(International Mobile Equipment Identity)和第一密钥单元的SN(Series Number)。In this embodiment, if the privacy system detects that the first key unit is inserted into the mobile terminal, it sends the first encrypted data to the first key unit, and the first key unit verifies the first encrypted data. It is verified whether the first encrypted data is the data information read and stored by the private system when the first key unit is first inserted into the mobile terminal and connected to the private system. The first encrypted data is IMEI (International Mobile Equipment Identity) of the mobile terminal bound to the first key unit and SN (Series ID) of the first key unit.
S25,当第一密钥单元验证第一加密数据是正确时,接收第一密钥单元发送的第二加密数据。S25. When the first key unit verifies that the first encrypted data is correct, receive the second encrypted data sent by the first key unit.
在本实施例中,当第一密钥单元验证第一加密数据是第一密钥单元第一次插入移动终端并与私密系统连接绑定时,私密系统所读取和储存的数据信息时,发送第二加密数据给私密系统。即当第一密钥单元验证到当前插入的移动终端为与其绑定的移动终端时,发送第二加密数据给移动终端。其中第二加密数据为与第一密钥单元绑定的移动终端的IMEI信息和第一密钥单元的SN信息。In this embodiment, when the first key unit verifies that the first encrypted data is the first time that the first key unit is inserted into the mobile terminal and connected to the private system, the data information read and stored by the private system, Send the second encrypted data to the privacy system. That is, when the first key unit verifies that the currently inserted mobile terminal is a mobile terminal bound to it, it sends the second encrypted data to the mobile terminal. The second encrypted data is IMEI information of the mobile terminal bound to the first key unit and SN information of the first key unit.
S26,验证第二加密数据是否正确。S26. Verify whether the second encrypted data is correct.
在本实施例中,私密系统接收到当前插入的第一密钥单元发送的第二加密数据时,验证第二加密数据是否是第一次与第一密钥单元绑定时读取并储存的第一密钥单元的加密数据信息。即验证当前插入的第一密钥单元是否是与其绑定的第一密钥单元。In this embodiment, when the private system receives the second encrypted data sent by the currently inserted first key unit, it verifies whether the second encrypted data is read and stored when it is bound to the first key unit for the first time. Encrypted data information of the first key unit. That is, it is verified whether the currently inserted first key unit is the first key unit bound to it.
S27,若第二加密数据是正确,则允许进入请求,进入私密系统。S27. If the second encrypted data is correct, an entry request is allowed to enter the private system.
在本实施例中,私密系统验证到所获取的第二加密数据正确后,接受用户发起的进入私密系统的请求,即进入请求,进入私密系统。In this embodiment, after the private system verifies that the obtained second encrypted data is correct, it accepts a user-initiated request to enter the private system, that is, an entry request, to enter the private system.
在一个实施例中,在上述的当用户发起进入私密系统的进入请求时,获取进入私密系统的第一密码的步骤S21之前,包括:当第一次进入私密系统时,提示用户设置进入私密系统的第一密码;在完成设置第一密码之后,提示用户绑定第一密钥单元。In one embodiment, before the above-mentioned step S21 of obtaining the first password for entering the private system when the user initiates an entry request to enter the private system, the method includes: when entering the private system for the first time, prompting the user to set to enter the private system After completing setting the first password, the user is prompted to bind the first key unit.
当第一次进入私密系统时,私密系统通过弹出一个设置密码的窗口等形式提示用户设置进入私密系统的密码,该密码为第一密码。私密系统将所设置的进入私密系统的密码储存起来,作为之后每次进入私密系统所需要输入的密码,也作为之后每次进入私密系统时验证所输入密码是否正确的比对内容。在完成设置第一密码之后,私密系统通过弹出一个提示绑定窗口等形式提示用户绑定第一密钥单元。私密系统识别到第一密钥单元第一次插入移动终端,读取并储存第一密钥单元的安全芯片内储存的信息,即第一密钥单元的SN信息;同时,也读取和储存移动终端的信息,即移动终端的IMEI信息,进而生成第一加密数据,用于之后进入私密系统时验证所插入的密钥单元中是否为所绑定的第一密钥单元的比对条件内容。第一密钥单元也会读取和储存所插入的移动终端的IMEI信息,并将自身的SN信息和IMEI信息生成第二加密数据。其中,绑定的第一密钥单元的数量为一个。When entering the private system for the first time, the private system prompts the user to set a password for entering the private system by popping up a window for setting a password, and the password is the first password. The private system stores the set password for entering the private system, as the password required for each subsequent entry into the private system, and as the comparison content for verifying whether the entered password is correct each time after entering the private system. After setting the first password, the privacy system prompts the user to bind the first key unit by popping up a prompt binding window and the like. The privacy system recognizes that the first key unit is inserted into the mobile terminal for the first time, and reads and stores the information stored in the security chip of the first key unit, that is, the SN information of the first key unit; at the same time, it also reads and stores The information of the mobile terminal, that is, the IMEI information of the mobile terminal, and then generate the first encrypted data for verifying whether the inserted key unit is the comparison condition content of the bound first key unit when entering the private system later. . The first key unit also reads and stores the IMEI information of the inserted mobile terminal, and generates its own SN information and IMEI information to generate the second encrypted data. The number of bound first key units is one.
在一个实施例中,上述的第一密钥单元为一个密钥单元,或者一个以上的密钥单元。In one embodiment, the first key unit is one key unit, or more than one key unit.
上述所绑定的第一密钥单元的数量可以为一个或者多个,一般绑定的第一密钥单元的数量最多为两个。绑定多个密钥单元是为了在丢失一个密钥单元时还能通过另外一个密钥单元 进入私密系统。绑定数量太多不利于私密系统安全性的保障,因而最多绑定两个密钥单元,当所绑定的密钥单元都丢失时,将无法进入私密系统,这保证了相对绝对的安全。The number of the first key units bound may be one or more. Generally, the number of the first key units bound is two at most. The binding of multiple key units is to enable the private system to enter the private system through another key unit if one key unit is lost. Too many bindings is not conducive to the security of the private system. Therefore, at most two key units are bound. When the bound key units are lost, the private system cannot be entered, which guarantees relatively absolute security.
在一个实施例中,上述的第一密码为一个密码,或者一个以上的密码。In one embodiment, the first password is a password, or more than one password.
上述的第一密码的数量可以一个或一个以上。即在第一次进入私密系统时设置进入私密系统的密码时,可以设置多个密码,增强其安全性。当只设置一个密码时,该秘密为数字密码;当设置多个密码时,除了设置的第一个基础密码为数字密码外,第二个之后的密码可为数字密码或者图案密码或指纹密码。The number of the first passwords described above may be one or more. That is, when the password for entering the private system is set when entering the private system for the first time, multiple passwords can be set to enhance its security. When only one password is set, the secret is a digital password; when multiple passwords are set, in addition to the first basic password that is set as a digital password, the second and subsequent passwords can be digital passwords or pattern passwords or fingerprint passwords.
在一个实施例中,在若第一密钥是正确,则允许进入请求,进入私密系统的步骤S27之后,包括:当检测第一密钥单元拔出时,自动退出私密系统。In one embodiment, if the first key is correct, an entry request is allowed, and after step S27 of entering the private system, the method includes: when the first key unit is detected to be pulled out, the private system is automatically exited.
进入私密系统,使用私密系统结束后,为了防止用户由于匆忙、时间紧急等因素导致忘记退出私密系统而泄露系统内的私密信息,私密系统在检测到第一密钥单元拔出移动终端后,便自动退出系统。After entering the private system, after using the private system, in order to prevent users from forgetting to quit the private system due to factors such as rush and time urgency, the private information in the system is leaked. The private system detects the first key unit and pulls out the mobile terminal. Exit the system automatically.
在一个实施例中,在允许进入请求,进入私密系统的步骤之后,包括:当进入私密系统时,在第二预设时间之后,弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, after the step of allowing the access request to enter the private system, the method includes: when entering the private system, after a second preset time, a prompt window for re-entering the password for entering the private system is displayed.
进入私密系统后,超过第二预设时间,需要再次输入进入私密系统的密码,方可继续操作私密系统。其中,第二预设时间为20分钟;进入私密系统的密码为设置的进入私密系统的第一密码。第二预设时间可由用户根据个人意愿进行设置。例如:当用户进入私密系统阅览文件,20分钟之后,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,恢复到弹出窗口前的页面。After entering the private system, after the second preset time, you need to enter the password to enter the private system again to continue operating the private system. The second preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. The second preset time can be set by the user according to personal wishes. For example, when a user enters a private system to view a file, a window pops up after 20 minutes. The window content includes a password entry box and a confirmation key to enter the private system. When the user enters the first password, the page returns to the page before the popup window.
在一个实施例中,在允许进入请求,进入私密系统的步骤之后,还包括:当进入私密系统时,检测私密系统在第三预设时间内是否存在用户对私密系统进行操作;若在第三预设时间内不存在用户对私密系统进行操作,则弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, after the step of allowing the access request to enter the private system, the method further includes: when entering the private system, detecting whether there is a user operating the private system in the private system within a third preset time; If there is no user operation on the private system within the preset time, a prompt window for re-entering the password for entering the private system pops up.
在进入私密系统后,在第三预设时间内,私密系统检测用户是否有对私密系统进行操作,若是检测不到用户对私密系统有进行操作,则将当前页面转为输入进入私密系统的密码的窗口页面,用户输入进入私密系统的密码后,方可打开私密系统。其中,第三预设时间为20分钟;进入私密系统的密码为设置的进入私密系统的第一密码。例如:进入私密系统阅览文件等时,在20分钟内,私密系统检测不到用户存在翻页文件、输入文字等与移动终端屏幕有接触感应的操作,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,恢复到弹出窗口前的页面。After entering the private system, within the third preset time, the private system detects whether the user has operated the private system. If it is not detected that the user has operated the private system, the current page is converted into the password for entering the private system. Window page, the user can only open the private system after entering the password to enter the private system. The third preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. For example, when accessing a private system to view files, etc., within 20 minutes, the private system cannot detect the presence of page-turning files, text input, and other operations that are in touch with the screen of the mobile terminal. A window pops up. The window content includes information about entering the private system. Password input box and confirmation key. When the user enters the first password, it returns to the page before the pop-up window.
在一个实施例中,在允许进入请求,进入私密系统的步骤之后,还包括:在进入私密系统之后,当识别到语音信息时,判断语音信息中的声纹特征是否与设置录入的声纹特征一致;In an embodiment, after the step of allowing the access request to enter the private system, the method further includes: after entering the private system, when the voice information is recognized, determining whether the voiceprint feature in the voice information is the same as the voiceprint feature set in the input. Consistent
若不一致,则弹出再次输入进入私密系统的密码的提示窗口。If not, a prompt window for re-entering the password to enter the private system will pop up.
在第一次进入私密系统设置进入私密系统的密码时,用户进行了语音录入设置,私密系统获取并储存用户的声纹特征。再次进入私密系统,若使用私密系统的用户发出声音,私密系统收集该语音并判断该语音信息的声纹特征是否与设置录入的声纹特征一致,当检测到不一致,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,方可恢复到弹出窗口前的页面。其中,进入私密系统的密码为设置的进入私密系统的第一密码。When entering the private system for the first time to set the password for entering the private system, the user has set the voice entry setting, and the private system obtains and stores the user's voiceprint characteristics. Enter the private system again. If the user using the private system makes a sound, the private system collects the voice and determines whether the voiceprint characteristics of the voice information are consistent with the voiceprint characteristics of the settings. When a discrepancy is detected, a window pops up. The window content includes Enter the password input box and confirmation key of the private system. After the user enters the first password, the user can return to the page before the pop-up window. The password for entering the private system is the first password for entering the private system.
在一个实施例中,在允许进入请求,进入私密系统的步骤之后,包括:在进入私密系统之后,获取用户的声纹特征;当识别到语音信息时,分析语音信息是否与用户的声纹特征一致;若不一致,则弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, after the step of allowing the access request to enter the private system, the method includes: after entering the private system, obtaining a voiceprint feature of the user; when the voice information is recognized, analyzing whether the voice information is related to the voiceprint feature of the user Consistent; if not, a prompt window for re-entering the password to enter the private system pops up.
进入私密系统后,用户需要录入语音进行声纹特征的采集和储存。当使用私密系统的过 程中,私密系统识别到存在语音信息,便收集该语音信息的声纹特征,并判断该声纹特征是否与用户的声纹特征一致。若检测到不一致,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,方可恢复到弹出窗口前的页面。其中,进入私密系统的密码为设置的进入私密系统的第一密码。例如:在使用私密系统过程中,用户甲和用户乙一起使用私密系统或者由于各种原因为用户乙在使用私密系统,其中,私密系统获取和储存的声纹特征的是用户甲的声纹特征。用户乙在使用私密系统时,发出声音,私密系统收集该语音信息并采集和判断其中的声纹特征,判断到采集的声纹特征不是用户甲的声纹特征,立即关闭当前页面,并弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,只有输入第一密码方可恢复到弹出窗口前的页面。After entering the private system, the user needs to enter the voice to collect and store voiceprint features. When using the private system, the private system recognizes that voice information exists, collects the voiceprint characteristics of the voice information, and determines whether the voiceprint characteristics are consistent with the user's voiceprint characteristics. If an inconsistency is detected, a window pops up. The window content includes a password input box and a confirmation key to enter the private system. After the user enters the first password, the user can return to the page before the pop-up window. The password for entering the private system is the first password for entering the private system. For example, in the process of using the private system, user A and user B use the private system together or user B is using the private system for various reasons. The voiceprint feature acquired and stored by the private system is the voiceprint feature of user A. . User B makes a sound when using the private system. The private system collects the voice information and collects and judges the voiceprint features in it. It is judged that the collected voiceprint features are not the voiceprint features of user A. It immediately closes the current page and pops up a The window contains the password input box and confirmation key for entering the private system. Only the first password can be entered to restore the page before the pop-up window.
综上所述,本发明实施例通过验证密钥单元的密钥和所输入的进入系统的密码正确后进入私密系统,实现了加强私密信息安全保护的有益效果,旨在解决移动终端内私密信息安全保护需要加强的问题。In summary, the embodiment of the present invention achieves the beneficial effect of strengthening the protection of private information security by verifying that the key of the key unit and the entered password for entering the system are correct and entering the private system, and aims to solve the private information in the mobile terminal. Issues that need to be strengthened for security protection.
参照图3,本发明实施例提供一种私密系统的进入的装置1,旨在解决加强私密文件管理的安全性的问题。在本实施例中,私密系统在移动终端中。Referring to FIG. 3, an embodiment of the present invention provides a device 1 for entering a private system, which aims to solve the problem of enhancing the security of private file management. In this embodiment, the privacy system is in a mobile terminal.
私密系统的进入的装置1包括:The access device 1 of the private system includes:
第一检测模块11,用于当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元。A first detection module 11 is configured to detect whether a first key unit is inserted when a user initiates an entry request to enter a private system.
在上述的第一检测模块11中,用户通过点击或滑动移动终端的桌面等方式对进入私密系统发起进入请求,当私密系统接收到该进入请求后,对第一密钥单元是否插入移动终端进行检测。第一密钥单元以一把硬件钥匙的形式控制私密系统的进入。In the first detection module 11 described above, the user initiates an entry request to enter the private system by clicking or sliding the desktop of the mobile terminal, and the like, after the private system receives the entry request, it is determined whether the first key unit is inserted into the mobile terminal. Detection. The first key unit controls the entry of the private system in the form of a hardware key.
第一获取模块12,用于若检测到第一密钥单元已插入,则发送第一加密数据给第一密钥单元。The first obtaining module 12 is configured to send the first encrypted data to the first key unit if it is detected that the first key unit has been inserted.
在上述的第一获取模块12中,若私密系统检测到第一密钥单元插入移动终端后,则将第一加密数据发送给第一密钥单元,第一密钥单元对第一加密数据进行验证。验证其第一加密数据是否为第一密钥单元第一次插入移动终端并与私密系统连接绑定时,私密系统所读取和储存的数据信息。其中,第一加密数据为与第一密钥单元绑定的移动终端的IMEI(International Mobile Equipment Identity)和第一密钥单元的SN(Series Number)。In the above-mentioned first obtaining module 12, if the privacy system detects that the first key unit is inserted into the mobile terminal, it sends the first encrypted data to the first key unit, and the first key unit performs the first encrypted data verification. It is verified whether the first encrypted data is the data information read and stored by the private system when the first key unit is first inserted into the mobile terminal and connected to the private system. The first encrypted data is IMEI (International Mobile Equipment Identity) of the mobile terminal bound to the first key unit and SN (Series ID) of the first key unit.
第一接收模块13,用于当第一密钥单元验证第一加密数据是正确时,接收第一密钥单元发送的第二加密数据。The first receiving module 13 is configured to receive the second encrypted data sent by the first key unit when the first key unit verifies that the first encrypted data is correct.
在上述的第一接收模块13中,当第一密钥单元验证第一加密数据是第一密钥单元第一次插入移动终端并与私密系统连接绑定时,私密系统所读取和储存的数据信息时,发送第二加密数据给私密系统。即当第一密钥单元验证到当前插入的移动终端为与其绑定的移动终端时,发送第二加密数据给移动终端。其中第二加密数据为与第一密钥单元绑定的移动终端的IMEI信息和第一密钥单元的SN信息。In the above-mentioned first receiving module 13, when the first key unit verifies that the first encrypted data is the first time that the first key unit is inserted into the mobile terminal and connected to the private system, the data read and stored by the private system When data information is sent, the second encrypted data is sent to the private system. That is, when the first key unit verifies that the currently inserted mobile terminal is a mobile terminal bound to it, it sends the second encrypted data to the mobile terminal. The second encrypted data is IMEI information of the mobile terminal bound to the first key unit and SN information of the first key unit.
第一验证模块14,用于验证第二加密数据是否正确。The first verification module 14 is configured to verify whether the second encrypted data is correct.
在上述的第一验证模块14中,私密系统接收到当前插入的第一密钥单元发送的第二加密数据时,验证第二加密数据是否是第一次与第一密钥单元绑定时读取并储存的第一密钥单元的加密数据信息。即验证当前插入的第一密钥单元是否是与其绑定的第一密钥单元。第二获取模块15,用于若第二加密数据是正确,则获取进入私密系统的第一密码。In the first verification module 14 described above, when the privacy system receives the second encrypted data sent by the currently inserted first key unit, it verifies whether the second encrypted data is read for the first time when it is bound to the first key unit. Fetch and store the encrypted data information of the first key unit. That is, it is verified whether the currently inserted first key unit is the first key unit bound to it. The second obtaining module 15 is configured to obtain a first password for entering the private system if the second encrypted data is correct.
在上述的第二获取模块15中,私密系统验证到所接收到的第二加密数据是正确(即验证到当前插入的第一密钥单元是与其绑定的第一密钥单元)后,可通过用户输入进入私密系统的密码或私密系统自动读取第一密钥单元储存的进入私密系统的密码等方式在私密系统中输 入进入私密系统的密码,私密系统读取输入私密系统的进入私密系统的密码,即第一密码。In the above-mentioned second obtaining module 15, after the privacy system verifies that the received second encrypted data is correct (that is, it is verified that the currently inserted first key unit is the first key unit bound to it), it may The user enters the password into the private system or the private system automatically reads the password to enter the private system stored in the first key unit. The password to enter the private system is entered in the private system, and the private system reads the private system and enters the private system. Password, which is the first password.
第二验证模块16,用于当获取到第一密码时,验证第一密码是否正确。The second verification module 16 is configured to verify whether the first password is correct when the first password is obtained.
在上述的第二验证模块16中,私密系统获取所输入的进入私密系统的第一密码后,验证所输入的进入私密系统的第一密码与私密系统内储存的进入系统的密码是否一致。In the second verification module 16 described above, after the private system obtains the first password entered into the private system, it verifies whether the first password entered into the private system is consistent with the password entered into the system stored in the private system.
第一进入模块17,用于若第一密码是正确,则允许进入请求,进入私密系统。A first entry module 17 is used to allow an entry request to enter the private system if the first password is correct.
在上述的第一进入模块17中,私密系统验证到所输入的进入私密系统的第一密码与私密系统内储存的进入系统的密码一致后,接受用户发起的进入私密系统的请求,即进入请求,进入私密系统。In the first access module 17 described above, the privacy system verifies that the entered first password for accessing the private system is consistent with the password for accessing the system stored in the private system, and then accepts the user's request to enter the private system, that is, the access request To enter the private system.
在一个实施例中,私密系统的进入的装置1还包括:第一提示模块,用于当第一次进入私密系统时,提示用户设置进入私密系统的第一密码;第二提示模块,用于在完成设置第一密码之后,提示用户绑定第一密钥单元。In one embodiment, the device 1 for entering a private system further includes: a first prompting module for prompting a user to set a first password for entering the private system when entering the private system for the first time; a second prompting module for After setting the first password, the user is prompted to bind the first key unit.
在上述的第一提示模块和第二提示模块中,当第一次进入私密系统时,私密系统通过弹出一个设置密码的窗口等形式提示用户设置进入私密系统的密码,该密码为第一密码。私密系统将所设置的进入私密系统的密码储存起来,作为之后每次进入私密系统所需要输入的密码,也作为之后每次进入私密系统时验证所输入密码是否正确的比对内容。在完成设置第一密码之后,私密系统通过弹出一个提示绑定窗口等形式提示用户绑定第一密钥单元。私密系统识别到第一密钥单元第一次插入移动终端,私密系统并储存第一密钥单元的安全芯片内储存信息,即第一密钥单元的SN信息;同时,也读取和储存移动终端的信息,即移动终端的IMEI信息,进而生成第一加密数据,用于之后进入私密系统时验证所插入的密钥单元中是否为所绑定的第一密钥单元的比对条件内容。第一密钥单元也会读取和储存所插入的移动终端的IMEI信息,并将自身的SN信息和IMEI信息生成第二加密数据。其中,绑定的第一密钥单元的数量为一个。In the first prompting module and the second prompting module described above, when entering the private system for the first time, the private system prompts the user to set a password for entering the private system by popping up a window for setting a password, and the password is the first password. The private system stores the set password for entering the private system, as the password required for each subsequent entry into the private system, and as the comparison content for verifying whether the entered password is correct each time after entering the private system. After setting the first password, the privacy system prompts the user to bind the first key unit by popping up a prompt binding window and the like. The private system recognizes that the first key unit is inserted into the mobile terminal for the first time, and the private system stores the information stored in the security chip of the first key unit, that is, the SN information of the first key unit; at the same time, it also reads and stores the mobile The terminal information, that is, the IMEI information of the mobile terminal, further generates first encrypted data for verifying whether the inserted key unit is the comparison condition content of the bound first key unit when entering the private system later. The first key unit also reads and stores the IMEI information of the inserted mobile terminal, and generates its own SN information and IMEI information to generate the second encrypted data. The number of bound first key units is one.
在一个实施例中,上述的第一密钥单元为一个密钥单元,或者一个以上的密钥单元。In one embodiment, the first key unit is one key unit, or more than one key unit.
上述所绑定的第一密钥单元的数量可以为一个或者多个,一般绑定的第一密钥单元的数量最多为两个。绑定多个密钥单元是为了在丢失一个密钥单元时还能通过另外一个密钥单元进入私密系统。绑定数量太多不利于私密系统安全性的保障,因而最多绑定两个密钥单元,当所绑定的密钥单元都丢失时,将无法进入私密系统,这保证了相对绝对的安全。The number of the first key units bound may be one or more. Generally, the number of the first key units bound is two at most. Binding multiple key units is to enable the private system to enter the private system through another key unit when one key unit is lost. Too many bindings is not conducive to the security of the private system. Therefore, at most two key units are bound. When the bound key units are lost, the private system cannot be entered, which guarantees relatively absolute security.
在一个实施例中,上述的第一密码为一个密码,或者一个以上的密码。In one embodiment, the first password is a password, or more than one password.
上述的第一密码的数量可以一个或一个以上。即在第一次进入私密系统时设置进入私密系统的密码时,可以设置多个密码,增强其安全性。当只设置一个密码时,该秘密为数字密码;当设置多个密码时,除了设置的第一个基础密码为数字密码外,第二个之后的密码可为数字密码或者图案密码或指纹密码。The number of the first passwords described above may be one or more. That is, when the password for entering the private system is set when entering the private system for the first time, multiple passwords can be set to enhance its security. When only one password is set, the secret is a digital password; when multiple passwords are set, in addition to the first basic password that is set as a digital password, the second and subsequent passwords can be digital passwords or pattern passwords or fingerprint passwords.
在一个实施例中,第二提示模块还包括:In one embodiment, the second prompt module further includes:
储存模块,用于在完成绑定第一密钥单元之后,将第一密码储存在第一密钥单元。The storage module is configured to store the first password in the first key unit after binding the first key unit.
在上述的储存模块中,在私密系统与第一密钥单元绑定完成后,弹出一个提示是否授予密钥单元解密权限的窗口,用户确认后,私密系统发送第一密码给所绑定的第一密钥单元,第一密钥单元储存其第一密码,之后,若进入私密系统,用户在发起进入私密系统的进入请求后,将第一密钥单元插入移动终端中,当私密系统验证到所插入的密钥单元为所绑定的第一密钥单元时,自动读取和验证当前插入的第一密钥单元内储存的第一密码,验证其第一密码正确后,接受进入请求,进入私密系统。即插入所绑定的密钥单元后,无需再输入进入私密系统的密码便可进入私密系统。In the above storage module, after the binding between the private system and the first key unit is completed, a window prompting whether to grant the decryption authority of the key unit pops up. After the user confirms, the private system sends the first password to the bound first A key unit. The first key unit stores its first password. After entering the private system, the user inserts the first key unit into the mobile terminal after initiating an entry request to enter the private system. When the private system verifies that When the inserted key unit is the bound first key unit, the first password stored in the currently inserted first key unit is automatically read and verified, and after verifying that the first password is correct, the access request is accepted, Enter a private system. That is, after inserting the bound key unit, you do not need to enter the password to enter the private system to enter the private system.
在一个实施例中,在获取进入私密系统的第一密码的步骤之前,包括:第一输入模块, 用于当第二加密数据是正确时,在预设第一时间之后,输入进入私密系统的密码。In one embodiment, before the step of obtaining the first password for entering the private system, the method includes: a first input module, configured to: when the second encrypted data is correct, enter a password for entering the private system after a preset first time; password.
在上述的第一输入模块中,私密系统验证到所插入的第一密钥单元为所绑定的第一密钥单元时,在预设第一时间后,弹出输入进入私密系统的密码的提示窗口,用户输入第一密码,或者,在预设第一时间后,私密系统方可读取所插入的第一密钥单元内储存的第一密码。其中,预设第一时间可设为1分钟。In the above-mentioned first input module, when the privacy system verifies that the inserted first key unit is the bound first key unit, after a preset first time, a prompt for entering a password to enter the private system pops up. Window, the user enters the first password, or the private system can read the first password stored in the inserted first key unit after the preset first time. The preset first time can be set to 1 minute.
在一个实施例中,私密系统的进入的装置1还包括:In one embodiment, the apparatus 1 for entering the private system further includes:
退出模块,用于当检测第一密钥单元拔出时,自动退出私密系统。The exit module is configured to automatically exit the private system when detecting the first key unit is pulled out.
在上述的退出模块中,进入私密系统,使用私密系统结束后,为了防止用户由于匆忙、时间紧急等因素导致忘记退出私密系统而泄露系统内的私密信息,私密系统在检测到第一密钥单元拔出移动终端后,自动退出系统。In the above exit module, after entering the private system, after the use of the private system ends, in order to prevent users from forgetting to exit the private system due to factors such as rush and time urgency, the private system detects the first key unit. After unplugging the mobile terminal, it will exit the system automatically.
在一个实施例中,私密系统的进入的装置1还包括:第一弹出模块,用于当进入私密系统时,在第二预设时间之后,弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, the device 1 for entering the private system further includes: a first pop-up module, configured to pop up a prompt window for re-entering the password for entering the private system after the second preset time when entering the private system.
在上述的第一弹出模块中,进入私密系统后,超过第二预设时间,需要再次输入进入私密系统的密码,方可继续操作私密系统。其中,第二预设时间为20分钟;进入私密系统的密码为设置的进入私密系统的第一密码。第二预设时间可由用户根据个人意愿进行设置。例如:当用户进入私密系统阅览文件,20分钟之后,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,恢复到弹出窗口前的页面。In the above-mentioned first pop-up module, after entering the private system, after a second preset time, the password for entering the private system needs to be entered again before the private system can continue to operate. The second preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. The second preset time can be set by the user according to personal wishes. For example, when a user enters a private system to view a file, a window pops up after 20 minutes. The window content includes a password entry box and a confirmation key to enter the private system. When the user enters the first password, the page returns to the page before the popup window.
在一个实施例中,私密系统的进入的装置1还包括:第三检测模块,用于当进入私密系统时,检测私密系统在第三预设时间内是否存在用户对私密系统进行操作;第二弹出模块,用于若在第三预设时间内不存在用户对私密系统进行操作,则弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, the device 1 for entering the private system further includes: a third detection module, configured to detect whether there is a user operating the private system within the third preset time when entering the private system; the second A pop-up module is configured to pop up a prompt window for re-entering the password for entering the private system if there is no user operation on the private system within the third preset time.
在上述的第三检测模块和第二弹出模块中,在进入私密系统后,在第三预设时间内,私密系统检测用户是否有对私密系统进行操作,若是检测不到用户对私密系统有进行操作,则将当前页面转为输入进入私密系统的密码的窗口页面,用户输入进入私密系统的密码后,方可打开私密系统。其中,第三预设时间为20分钟;进入私密系统的密码为设置的进入私密系统的第一密码。例如:进入私密系统阅览文件等时,在20分钟内,私密系统检测不到用户存在翻页文件、输入文字等与移动终端屏幕有接触感应的操作,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,恢复到弹出窗口前的页面。In the third detection module and the second pop-up module described above, after entering the private system, within a third preset time, the private system detects whether the user has operated the private system, and if it is not detected that the user has performed the private system Operation, the current page is converted into a window page for entering the password for entering the private system, and the user can enter the password for entering the private system before opening the private system. The third preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. For example, when accessing a private system to view files, etc., within 20 minutes, the private system cannot detect the presence of page-turning files, text input, and other operations that are in touch with the screen of the mobile terminal. A window pops up. The window content includes information about entering the private system. Password input box and confirmation key. When the user enters the first password, it returns to the page before the pop-up window.
在一个实施例中,私密系统的进入的装置1还包括:第一判断模块,用于在进入私密系统之后,当识别到语音信息时,判断语音信息中的声纹特征是否与设置录入的声纹特征一致;In one embodiment, the device 1 for entering a private system further includes: a first judgment module, configured to determine whether the voiceprint feature in the voice information is consistent with the input voice when the voice information is recognized after entering the private system. Pattern characteristics are consistent;
第三弹出模块,用于若不一致,则弹出再次输入进入私密系统的密码的提示窗口。The third pop-up module is used to pop up a prompt window for re-entering the password for entering the private system if they are not consistent.
在上述的第一判断模块和第三弹出模块中,在第一次进入私密系统设置进入私密系统的密码时,用户进行了语音录入设置,私密系统获取并储存用户的声纹特征。再次进入私密系统,若使用私密系统的用户发出声音,私密系统收集该语音并判断该语音信息的声纹特征是否与设置录入的声纹特征一致,当检测到不一致,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,方可恢复到弹出窗口前的页面。其中,进入私密系统的密码为设置的进入私密系统的第一密码。In the first judgment module and the third pop-up module described above, when the user enters the private system for the first time to set the password for entering the private system, the user performs a voice entry setting, and the private system acquires and stores the user's voiceprint characteristics. Enter the private system again. If the user using the private system makes a sound, the private system collects the voice and determines whether the voiceprint characteristics of the voice information are consistent with the voiceprint characteristics of the settings. When a discrepancy is detected, a window pops up. The window content includes Enter the password input box and confirmation key of the private system. After the user enters the first password, the user can return to the page before the pop-up window. The password for entering the private system is the first password for entering the private system.
在一个实施例中,私密系统的进入的装置1还包括:第三获取模块,用于在进入私密系统之后,获取用户的声纹特征;分析模块,用于当识别到语音信息时,分析语音信息是否与用户的声纹特征一致;第四弹出模块,用于若不一致,则弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, the device 1 for entering the private system further includes: a third acquisition module for acquiring the voiceprint characteristics of the user after entering the private system; and an analysis module for analyzing the voice when the voice information is recognized Whether the information is consistent with the user's voiceprint characteristics; a fourth pop-up module is used to pop up a prompt window for re-entering the password for entering the private system if they are not consistent.
在上述的第三获取模块、分析模块和第四弹出模块中,进入私密系统后,用户需要录入 语音进行声纹特征的采集和储存。当使用私密系统的过程中,私密系统识别到存在语音信息,便收集该语音信息的声纹特征,并判断该声纹特征是否与用户的声纹特征一致。若检测到不一致,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,方可恢复到弹出窗口前的页面。其中,进入私密系统的密码为设置的进入私密系统的第一密码。例如:在使用私密系统过程中,用户甲和用户乙一起使用私密系统或者由于各种原因为用户乙在使用私密系统,其中,私密系统获取和储存的声纹特征的是用户甲的声纹特征。用户乙在使用私密系统时,发出声音,私密系统收集该语音信息并采集和判断其中的声纹特征,判断到采集的声纹特征不是用户甲的声纹特征,立即关闭当前页面,并弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,只有输入第一密码方可恢复到弹出窗口前的页面。In the above-mentioned third acquisition module, analysis module, and fourth pop-up module, after entering the private system, the user needs to input voice to collect and store voiceprint features. When using the private system, the private system recognizes that voice information exists, collects the voiceprint characteristics of the voice information, and determines whether the voiceprint characteristics are consistent with the user's voiceprint characteristics. If an inconsistency is detected, a window pops up. The window content includes a password input box and a confirmation key to enter the private system. After the user enters the first password, the user can return to the page before the pop-up window. The password for entering the private system is the first password for entering the private system. For example, in the process of using the private system, user A and user B use the private system together or user B is using the private system for various reasons. The voiceprint feature acquired and stored by the private system is the voiceprint feature of user A. . User B makes a sound when using the private system. The private system collects the voice information and collects and judges the voiceprint features in it. It is judged that the collected voiceprint features are not the voiceprint features of user A. It immediately closes the current page and pops up a The window contains the password input box and confirmation key for entering the private system. Only the first password can be entered to restore the page before the pop-up window.
综上所述,本发明实施例通过验证密钥单元的密钥和所输入的进入系统的密码正确后进入私密系统,实现了加强私密信息安全保护的有益效果,旨在解决移动终端内私密信息安全保护需要加强的问题。In summary, the embodiment of the present invention achieves the beneficial effect of strengthening the protection of private information security by verifying that the key of the key unit and the entered password for entering the system are correct and entering the private system, and aims to solve the private information in the mobile terminal. Issues that need to be strengthened for security protection.
参照图4,在另一个实施例中,本发明还提供一种私密系统的进入的装置2,该私密系统的进入的装置2包括:Referring to FIG. 4, in another embodiment, the present invention further provides a device 2 for entering a private system. The device 2 for entering the private system includes:
第二获取模块21,用于当用户发起进入私密系统的进入请求时,获取进入私密系统的第一密码。The second obtaining module 21 is configured to obtain a first password for entering the private system when the user initiates an entry request to enter the private system.
在上述的第三获取模块21中,用户通过点击或滑动移动终端的桌面等方式对进入私密系统发起进入请求,当私密系统接收到该进入请求后,获取进入私密系统的密码,即第一密码。In the third obtaining module 21 described above, the user initiates an entry request to enter the private system by clicking or sliding the desktop of the mobile terminal, etc. After the private system receives the entry request, it obtains the password for entering the private system, that is, the first password. .
第三验证模块22,用于当获取到第一密码时,验证第一密码是否正确。The third verification module 22 is configured to verify whether the first password is correct when the first password is obtained.
在上述的第三验证模块22中,私密系统获取所输入的进入私密系统的第一密码后,验证所输入的进入私密系统的第一密码与私密系统内储存的进入系统的密码是否一致。In the third verification module 22 described above, after the private system obtains the entered first password for entering the private system, it verifies whether the entered first password for entering the private system is consistent with the password for entering the system stored in the private system.
第二检测模块23,用于若第一密码是正确,则检测是否插入第一密钥单元。The second detecting module 23 is configured to detect whether the first key unit is inserted if the first password is correct.
在上述的第二检测模块23中,私密系统验证到所输入的进入私密系统的第一密码与私密系统内储存的进入系统的密码一致后,检测第一密钥单元是否插入移动终端。第一密钥单元以一把硬件钥匙的形式控制私密系统的进入。In the above-mentioned second detection module 23, the privacy system verifies that the entered first password for entering the private system is consistent with the password for entering the system stored in the private system, and then detects whether the first key unit is inserted into the mobile terminal. The first key unit controls the entry of the private system in the form of a hardware key.
第二发送模块24,用于若检测到第一密钥单元已插入,则发送第一加密数据给第一密钥单元。The second sending module 24 is configured to send the first encrypted data to the first key unit if it is detected that the first key unit has been inserted.
在上述的第二发送模块24中,若私密系统检测到第一密钥单元插入移动终端后,则将第一加密数据发送给第一密钥单元,第一密钥单元对第一加密数据进行验证。验证其第一加密数据是否为第一密钥单元第一次插入移动终端并与私密系统连接绑定时,私密系统所读取和储存的数据信息。其中,第一加密数据为与第一密钥单元绑定的移动终端的IMEI(International Mobile Equipment Identity)和第一密钥单元的SN(Series Number)。In the above-mentioned second sending module 24, if the privacy system detects that the first key unit is inserted into the mobile terminal, it sends the first encrypted data to the first key unit, and the first key unit performs the first encrypted data verification. It is verified whether the first encrypted data is the data information read and stored by the private system when the first key unit is first inserted into the mobile terminal and connected to the private system. The first encrypted data is IMEI (International Mobile Equipment Identity) of the mobile terminal bound to the first key unit and SN (Series ID) of the first key unit.
第二接收模块25,用于当第一密钥单元验证第一加密数据是正确时,接收第一密钥单元发送的第二加密数据。The second receiving module 25 is configured to receive the second encrypted data sent by the first key unit when the first key unit verifies that the first encrypted data is correct.
在上述的第二接收模块25中,当第一密钥单元验证第一加密数据是第一密钥单元第一次插入移动终端并与私密系统连接绑定时,私密系统所读取和储存的数据信息时,发送第二加密数据给私密系统。即当第一密钥单元验证到当前插入的移动终端为与其绑定的移动终端时,发送第二加密数据给移动终端。其中第二加密数据为与第一密钥单元绑定的移动终端的IMEI信息和第一密钥单元的SN信息。In the above-mentioned second receiving module 25, when the first key unit verifies that the first encrypted data is the first time that the first key unit is inserted into the mobile terminal and connected to the private system, the data read and stored by the private system When data information is sent, the second encrypted data is sent to the private system. That is, when the first key unit verifies that the currently inserted mobile terminal is a mobile terminal bound to it, it sends the second encrypted data to the mobile terminal. The second encrypted data is IMEI information of the mobile terminal bound to the first key unit and SN information of the first key unit.
第四验证模块26,用于验证第二加密数据是否正确。The fourth verification module 26 is configured to verify whether the second encrypted data is correct.
在上述的第四验证模块26中,私密系统接收到当前插入的第一密钥单元发送的第二加密 数据时,验证第二加密数据是否是第一次与第一密钥单元绑定时读取并储存的第一密钥单元的加密数据信息。即验证当前插入的第一密钥单元是否是与其绑定的第一密钥单元。In the aforementioned fourth verification module 26, when the privacy system receives the second encrypted data sent by the currently inserted first key unit, it verifies whether the second encrypted data is read for the first time when it is bound to the first key unit Fetch and store the encrypted data information of the first key unit. That is, it is verified whether the currently inserted first key unit is the first key unit bound to it.
第二进入模块27,用于若第一密钥是正确,则允许进入请求,进入私密系统。A second entry module 27 is used to allow an entry request to enter the private system if the first key is correct.
在上述的第二进入模块27中,私密系统验证到所获取的第二加密数据正确后,接受用户发起的进入私密系统的请求,即进入请求,进入私密系统。In the above-mentioned second entry module 27, after the private system verifies that the obtained second encrypted data is correct, it accepts a user-initiated request to enter the private system, that is, an entry request, to enter the private system.
在一个实施例中,私密系统的进入的装置1还包括:In one embodiment, the apparatus 1 for entering the private system further includes:
第三提示模块,用于当第一次进入所述私密系统时,提示用户设置进入私密系统的第一密码;A third prompt module, configured to prompt a user to set a first password to enter the private system when entering the private system for the first time;
第四提示模块,用于在完成设置第一密码之后,提示用户绑定第一密钥单元。A fourth prompting module is configured to prompt the user to bind the first key unit after the first password is set.
在上述的第三提示模块和第四提示模块中,当第一次进入私密系统时,私密系统通过弹出一个设置密码的窗口等形式提示用户设置进入私密系统的密码,该密码为第一密码。私密系统将所设置的进入私密系统的密码储存起来,作为之后每次进入私密系统所需要输入的密码,也作为之后每次进入私密系统时验证所输入密码是否正确的比对内容。在完成设置第一密码之后,私密系统通过弹出一个提示绑定窗口等形式提示用户绑定第一密钥单元。私密系统识别到第一密钥单元第一次插入移动终端,读取并储存第一密钥单元的安全芯片内储存的信息,即第一密钥单元的SN信息;同时,也读取和储存移动终端的信息,即移动终端的IMEI信息,进而生成第一加密数据,用于之后进入私密系统时验证所插入的密钥单元中是否为所绑定的第一密钥单元的比对条件内容。第一密钥单元也会读取和储存所插入的移动终端的IMEI信息,并将自身的SN信息和IMEI信息生成第二加密数据。其中,绑定的第一密钥单元的数量为一个。In the third prompting module and the fourth prompting module described above, when entering the private system for the first time, the private system prompts the user to set a password for entering the private system by popping up a window for setting a password, and the password is the first password. The private system stores the set password for entering the private system, as the password required for each subsequent entry into the private system, and as the comparison content for verifying whether the entered password is correct each time after entering the private system. After setting the first password, the privacy system prompts the user to bind the first key unit by popping up a prompt binding window and the like. The privacy system recognizes that the first key unit is inserted into the mobile terminal for the first time, and reads and stores the information stored in the security chip of the first key unit, that is, the SN information of the first key unit; at the same time, it also reads and stores The information of the mobile terminal, that is, the IMEI information of the mobile terminal, and then generate the first encrypted data for verifying whether the inserted key unit is the comparison condition content of the bound first key unit when entering the private system later. . The first key unit also reads and stores the IMEI information of the inserted mobile terminal, and generates its own SN information and IMEI information to generate the second encrypted data. The number of bound first key units is one.
在一个实施例中,上述的第一密钥单元为一个密钥单元,或者一个以上的密钥单元。In one embodiment, the first key unit is one key unit, or more than one key unit.
上述所绑定的第一密钥单元的数量可以为一个或者多个,一般绑定的第一密钥单元的数量最多为两个。绑定多个密钥单元是为了在丢失一个密钥单元时还能通过另外一个密钥单元进入私密系统。绑定数量太多不利于私密系统安全性的保障,因而最多绑定两个密钥单元,当所绑定的密钥单元都丢失时,将无法进入私密系统,这保证了相对绝对的安全。The number of the first key units bound may be one or more. Generally, the number of the first key units bound is two at most. Binding multiple key units is to enable the private system to enter the private system through another key unit when one key unit is lost. Too many bindings is not conducive to the security of the private system. Therefore, at most two key units are bound. When the bound key units are lost, the private system cannot be entered, which guarantees relatively absolute security.
在一个实施例中,上述的第一密码为一个密码,或者一个以上的密码。In one embodiment, the first password is a password, or more than one password.
上述的第一密码的数量可以一个或一个以上。即在第一次进入私密系统时设置进入私密系统的密码时,可以设置多个密码,增强其安全性。当只设置一个密码时,该秘密为数字密码;当设置多个密码时,除了设置的第一个基础密码为数字密码外,第二个之后的密码可为数字密码或者图案密码或指纹密码。The number of the first passwords described above may be one or more. That is, when the password for entering the private system is set when entering the private system for the first time, multiple passwords can be set to enhance its security. When only one password is set, the secret is a digital password; when multiple passwords are set, in addition to the first basic password that is set as a digital password, the second and subsequent passwords can be digital passwords or pattern passwords or fingerprint passwords.
在一个实施例中,私密系统的进入的装置1还包括:In one embodiment, the apparatus 1 for entering the private system further includes:
第一退出模块,用于当检测第一密钥单元拔出时,自动退出私密系统。The first exit module is configured to automatically exit the private system when detecting that the first key unit is pulled out.
在上述的第一退出模块中,进入私密系统,使用私密系统结束后,为了防止用户由于匆忙、时间紧急等因素导致忘记退出私密系统而泄露系统内的私密信息,私密系统在检测到第一密钥单元拔出移动终端后,自动退出系统。In the first exit module mentioned above, after entering the private system, after using the private system, in order to prevent users from forgetting to exit the private system due to factors such as rush and time urgency, the private system detects the first secret. After the key unit is pulled out of the mobile terminal, it automatically exits the system.
在一个实施例中,私密系统的进入的装置2还包括:第五弹出模块,用于当进入私密系统时,在第二预设时间之后,弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, the device 2 for entering the private system further includes a fifth pop-up module, configured to pop up a prompt window for re-entering the password for entering the private system after the second preset time when entering the private system.
在上述的第五弹出模块中,进入私密系统后,超过第二预设时间,需要再次输入进入私密系统的密码,方可继续操作私密系统。其中,第二预设时间为20分钟;进入私密系统的密码为设置的进入私密系统的第一密码。第二预设时间可由用户根据个人意愿进行设置。例如:当用户进入私密系统阅览文件,20分钟之后,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,恢复到弹出窗口前的页面。In the fifth pop-up module described above, after entering the private system, after the second preset time, the password for entering the private system needs to be entered again before the private system can continue to operate. The second preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. The second preset time can be set by the user according to personal wishes. For example, when a user enters a private system to view a file, a window pops up after 20 minutes. The window content includes a password entry box and a confirmation key to enter the private system. When the user enters the first password, the page returns to the page before the popup window.
在一个实施例中,私密系统的进入的装置2还包括:第四检测模块,用于当进入私密系统时,检测私密系统在第三预设时间内是否存在用户对私密系统进行操作;第六弹出模块,用于若在第三预设时间内不存在用户对私密系统进行操作,则弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, the device 2 for entering the private system further includes: a fourth detection module, configured to detect whether there is a user operating the private system within the third preset time when entering the private system; the sixth A pop-up module is configured to pop up a prompt window for re-entering the password for entering the private system if there is no user operation on the private system within the third preset time.
在上述的第四检测模块和第六弹出模块中,在进入私密系统后,在第三预设时间内,私密系统检测用户是否有对私密系统进行操作,若是检测不到用户对私密系统有进行操作,则将当前页面转为输入进入私密系统的密码的窗口页面,用户输入进入私密系统的密码后,方可打开私密系统。其中,第三预设时间为20分钟;进入私密系统的密码为设置的进入私密系统的第一密码。例如:进入私密系统阅览文件等时,在20分钟内,私密系统检测不到用户存在翻页文件、输入文字等与移动终端屏幕有接触感应的操作,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,恢复到弹出窗口前的页面。In the above-mentioned fourth detection module and sixth pop-up module, after entering the private system, within a third preset time, the private system detects whether the user has operated the private system, and if it is not detected that the user has performed the private system Operation, the current page is converted into a window page for entering the password for entering the private system, and the user can enter the password for entering the private system before opening the private system. The third preset time is 20 minutes; the password for entering the private system is the first password for entering the private system. For example, when accessing a private system to view files, etc., within 20 minutes, the private system cannot detect the presence of page-turning files, text input, and other operations that are in touch with the screen of the mobile terminal. A window pops up. The window content includes information about entering the private system. Password input box and confirmation key. When the user enters the first password, it returns to the page before the pop-up window.
在一个实施例中,私密系统的进入的装置2还包括:第二判断模块,用于在进入私密系统之后,当识别到语音信息时,判断语音信息中的声纹特征是否与设置录入的声纹特征一致;In one embodiment, the device 2 for entering the private system further includes: a second judgment module, configured to determine whether the voiceprint feature in the voice information is consistent with the input voice when the voice information is recognized after entering the private system. Pattern characteristics are consistent;
第七弹出模块,用于若不一致,则弹出再次输入进入私密系统的密码的提示窗口。A seventh pop-up module is used to pop up a prompt window for re-entering the password for entering the private system if they are not consistent.
在上述的第二判断模块和第七弹出模块中,在第一次进入私密系统设置进入私密系统的密码时,用户进行了语音录入设置,私密系统获取并储存用户的声纹特征。再次进入私密系统,若使用私密系统的用户发出声音,私密系统收集该语音并判断该语音信息的声纹特征是否与设置录入的声纹特征一致,当检测到不一致,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,方可恢复到弹出窗口前的页面。其中,进入私密系统的密码为设置的进入私密系统的第一密码。In the above-mentioned second judgment module and seventh pop-up module, when the user enters the private system for the first time to set the password for entering the private system, the user performs a voice entry setting, and the private system acquires and stores the user's voiceprint characteristics. Enter the private system again. If the user using the private system makes a sound, the private system collects the voice and determines whether the voiceprint characteristics of the voice information are consistent with the voiceprint characteristics of the settings. When a discrepancy is detected, a window pops up. The window content includes Enter the password input box and confirmation key of the private system. After the user enters the first password, the user can return to the page before the pop-up window. The password for entering the private system is the first password for entering the private system.
在一个实施例中,私密系统的进入的装置2还包括:第四获取模块,用于在进入私密系统之后,获取用户的声纹特征;第一分析模块,用于当识别到语音信息时,分析语音信息是否与用户的声纹特征一致;第八弹出模块,用于若不一致,则弹出再次输入进入私密系统的密码的提示窗口。In one embodiment, the device 2 for entering the private system further includes: a fourth obtaining module, configured to obtain a voiceprint feature of the user after entering the private system; and a first analysis module, configured to recognize voice information, Analyze whether the voice information is consistent with the user's voiceprint characteristics; the eighth pop-up module is used to pop up a prompt window for re-entering the password to enter the private system if they are not consistent.
在上述的第四获取模块、第一分析模块和第八弹出模块中,进入私密系统后,用户需要录入语音进行声纹特征的采集和储存。当使用私密系统的过程中,私密系统识别到存在语音信息,便收集该语音信息的声纹特征,并判断该声纹特征是否与用户的声纹特征一致。若检测到不一致,弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,当用户输入第一密码后,方可恢复到弹出窗口前的页面。其中,进入私密系统的密码为设置的进入私密系统的第一密码。例如:在使用私密系统过程中,用户甲和用户乙一起使用私密系统或者由于各种原因为用户乙在使用私密系统,其中,私密系统获取和储存的声纹特征的是用户甲的声纹特征。用户乙在使用私密系统时,发出声音,私密系统收集该语音信息并采集和判断其中的声纹特征,判断到采集的声纹特征不是用户甲的声纹特征,立即关闭当前页面,并弹出一个窗口,窗口内容包括进入私密系统的密码输入框和确认键,只有输入第一密码方可恢复到弹出窗口前的页面。In the fourth acquisition module, the first analysis module, and the eighth pop-up module described above, after entering the private system, the user needs to record voice to collect and store voiceprint features. When using the private system, the private system recognizes that voice information exists, collects the voiceprint characteristics of the voice information, and determines whether the voiceprint characteristics are consistent with the user's voiceprint characteristics. If an inconsistency is detected, a window pops up. The window content includes a password input box and a confirmation key to enter the private system. After the user enters the first password, the user can return to the page before the pop-up window. The password for entering the private system is the first password for entering the private system. For example, in the process of using the private system, user A and user B use the private system together or user B is using the private system for various reasons. The voiceprint feature acquired and stored by the private system is the voiceprint feature of user A. . User B makes a sound when using the private system. The private system collects the voice information and collects and judges the voiceprint features in it. It is judged that the collected voiceprint features are not the voiceprint features of user A. It immediately closes the current page and pops up a The window contains the password input box and confirmation key for entering the private system. Only the first password can be entered to restore the page before the pop-up window.
综上所述,本发明实施例通过验证密钥单元的密钥和所输入的进入系统的密码正确后进入私密系统,实现了加强私密信息安全保护的有益效果,旨在解决移动终端内私密信息安全保护需要加强的问题。In summary, the embodiment of the present invention achieves the beneficial effect of strengthening the protection of private information security by verifying that the key of the key unit and the entered password for entering the system are correct and entering the private system, and aims to solve the private information in the mobile terminal. Issues that need to be strengthened for security protection.
参照图5,本发明实施例还提供一种移动终端,包括处理器1080和存储器1020,所述存储器1020用于存储私密系统的进入的装置执行上述的私密系统的进入的方法的程序;所述处理器1080被配置为用于执行所述存储器中存储的程序。Referring to FIG. 5, an embodiment of the present invention further provides a mobile terminal, including a processor 1080 and a memory 1020, where the memory 1020 is configured to store a program for a device for entering a private system to execute the method for accessing the private system described above; The processor 1080 is configured to execute a program stored in the memory.
为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照 本发明实施例方法部分。该移动终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,以移动终端为手机为例:For convenience of explanation, only the parts related to the embodiment of the present invention are shown, and specific technical details are not disclosed, please refer to the method part of the embodiment of the present invention. The mobile terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), and a vehicle-mounted computer. Taking the mobile terminal as a mobile phone as an example:
图5示出的是与本发明实施例提供的移动终端相关的手机的部分结构的框图。参考图5,手机包括:射频(Radio Frequency,RF)电路1010、存储器1020、输入单元1030、显示单元1040、传感器1050、音频电路1060、无线保真(wireless fidelity,WiFi)模块1070、处理器1080、以及电源1090等部件。本领域技术人员可以理解,图5中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 5 is a block diagram showing a partial structure of a mobile phone related to a mobile terminal according to an embodiment of the present invention. Referring to FIG. 5, the mobile phone includes: a radio frequency (RF) circuit 1010, a memory 1020, an input unit 1030, a display unit 1040, a sensor 1050, an audio circuit 1060, a wireless fidelity (WiFi) module 1070, and a processor 1080 , And power supply 1090 and other components. Those skilled in the art can understand that the structure of the mobile phone shown in FIG. 5 does not constitute a limitation on the mobile phone, and may include more or fewer components than those shown in the figure, or combine some components, or arrange different components.
下面结合图5对手机的各个构成部件进行具体的介绍:The following describes each component of the mobile phone in detail with reference to FIG. 5:
RF电路1010可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1080处理;另外,将设计上行的数据发送给基站。通常,RF电路1010包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1010还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 1010 can be used for receiving and transmitting signals during information transmission and reception or during a call. In particular, the downlink information of the base station is received and processed by the processor 1080; in addition, the uplink data of the design is transmitted to the base station. Generally, the RF circuit 1010 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 1010 can also communicate with a network and other devices through wireless communication. The above wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division Multiple Access) Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), etc.
存储器1020可用于存储软件程序以及模块,处理器1080通过运行存储在存储器1020的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1020可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1020可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 1020 may be used to store software programs and modules. The processor 1080 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 1020. The memory 1020 may mainly include a storage program area and a storage data area, where the storage program area may store an operating system, at least one function required application program (such as a sound playback function, an image playback function, etc.), etc .; the storage data area may store data according to Data (such as audio data, phone book, etc.) created by the use of mobile phones. In addition, the memory 1020 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
输入单元1030可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1030可包括触控面板1031以及其他输入设备1032。触控面板1031,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1031上或在触控面板1031附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1031可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1080,并能接收处理器1080发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1031。除了触控面板1031,输入单元1030还可以包括其他输入设备1032。具体地,其他输入设备1032可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 1030 can be used to receive inputted numeric or character information, and generate key signal inputs related to user settings and function control of the mobile phone. Specifically, the input unit 1030 may include a touch panel 1031 and other input devices 1032. Touch panel 1031, also known as touch screen, can collect user's touch operations on or near it (such as the user using a finger, stylus, etc. any suitable object or accessory on touch panel 1031 or near touch panel 1031 Operation), and drive the corresponding connection device according to a preset program. Optionally, the touch panel 1031 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch position, and detects the signal caused by the touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into contact coordinates, and sends it To the processor 1080, and can receive the commands sent by the processor 1080 and execute them. In addition, various types such as resistive, capacitive, infrared, and surface acoustic wave can be used to implement the touch panel 1031. In addition to the touch panel 1031, the input unit 1030 may include other input devices 1032. Specifically, other input devices 1032 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, an operation lever, and the like.
显示单元1040可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1040可包括显示面板1041,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1041。进一步的,触控面板1031可覆盖显示面板1041,当触控面板1031检测到在其上或附近的触摸操作后,传送给处理器1080以确定触摸事件的类型,随后处理器1080根据触摸事件的类 型在显示面板1041上提供相应的视觉输出。虽然在图5中,触控面板1031与显示面板1041是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1031与显示面板1041集成而实现手机的输入和输出功能。The display unit 1040 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 1040 may include a display panel 1041, and optionally, the display panel 1041 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like. Further, the touch panel 1031 may cover the display panel 1041. When the touch panel 1031 detects a touch operation on or near the touch panel 1031, the touch panel 1031 transmits the touch operation to the processor 1080 to determine the type of the touch event. The type provides corresponding visual output on the display panel 1041. Although in FIG. 5, the touch panel 1031 and the display panel 1041 are implemented as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1031 and the display panel 1041 can be integrated and Realize the input and output functions of the mobile phone.
手机还可包括至少一种传感器1050,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1041的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1041和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The mobile phone may further include at least one sensor 1050, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1041 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1041 and / Or backlight. As a type of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when it is stationary. It can be used for applications that recognize the attitude of mobile phones (such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc .; as for the mobile phone can also be equipped with gyroscope, barometer, hygrometer, thermometer, infrared sensor and other sensors, no longer here To repeat.
音频电路1060、扬声器1061,传声器1062可提供用户与手机之间的音频接口。音频电路1060可将接收到的音频数据转换后的电信号,传输到扬声器1061,由扬声器1061转换为声音信号输出;另一方面,传声器1062将收集的声音信号转换为电信号,由音频电路1060接收后转换为音频数据,再将音频数据输出处理器1080处理后,经RF电路1010以发送给比如另一手机,或者将音频数据输出至存储器1020以便进一步处理。The audio circuit 1060, the speaker 1061, and the microphone 1062 can provide an audio interface between the user and the mobile phone. The audio circuit 1060 can transmit the received electrical data converted electrical signal to the speaker 1061, and the speaker 1061 converts the sound signal to an audio signal output. On the other hand, the microphone 1062 converts the collected sound signal into an electrical signal, and the audio circuit 1060 After receiving, it is converted into audio data, and then the audio data is output to the processor 1080 for processing, and then sent to, for example, another mobile phone via the RF circuit 1010, or the audio data is output to the memory 1020 for further processing.
WiFi属于短距离无线传输技术,手机通过WiFi模块1070可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图5示出了WiFi模块1070,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology. The mobile phone can help users send and receive emails, browse web pages, and access streaming media through the WiFi module 1070. It provides users with wireless broadband Internet access. Although FIG. 5 shows the WiFi module 1070, it can be understood that it does not belong to the necessary structure of the mobile phone, and can be omitted as needed without changing the essence of the invention.
处理器1080是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1020内的软件程序和/或模块,以及调用存储在存储器1020内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1080可包括一个或多个处理单元;优选的,处理器1080可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1080中。The processor 1080 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. The processor 1080 runs or executes software programs and / or modules stored in the memory 1020, and calls data stored in the memory 1020 to execute. Various functions and processing data of the mobile phone, so as to monitor the mobile phone as a whole. Optionally, the processor 1080 may include one or more processing units; preferably, the processor 1080 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, and an application program, etc. The modem processor mainly handles wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 1080.
手机还包括给各个部件供电的电源1090(比如电池),优选的,电源可以通过电源管理系统与处理器1080逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile phone also includes a power supply 1090 (such as a battery) for supplying power to various components. Preferably, the power supply can be logically connected to the processor 1080 through a power management system, so as to implement functions such as management of charging, discharging, and power consumption management through the power management system.
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
参照图5,在本发明实施例中,该移动终端所包括的处理器1080还具有以下功能:Referring to FIG. 5, in an embodiment of the present invention, the processor 1080 included in the mobile terminal also has the following functions:
当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元;When the user initiates an entry request to enter the private system, detecting whether the first key unit is inserted;
若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;If it is detected that the first key unit has been inserted, sending first encrypted data to the first key unit;
当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;When the first key unit verifies that the first encrypted data is correct, receiving the second encrypted data sent by the first key unit;
验证所述第二加密数据是否正确;Verifying whether the second encrypted data is correct;
若所述第二加密数据是正确,则获取进入所述私密系统的第一密码;If the second encrypted data is correct, obtaining a first password to enter the private system;
当获取到所述第一密码时,验证所述第一密码是否正确;When the first password is obtained, verifying whether the first password is correct;
若所述第一密码是正确,则允许所述进入请求,进入所述私密系统。If the first password is correct, the entry request is allowed to enter the privacy system.
参照图5,在本发明实施例中,该移动终端所包括的处理器1080还具有以下功能:Referring to FIG. 5, in an embodiment of the present invention, the processor 1080 included in the mobile terminal also has the following functions:
当用户发起进入私密系统的进入请求时,获取进入所述私密系统的第一密码;When the user initiates an entry request to enter the private system, obtaining a first password to enter the private system;
当获取到所述第一密码时,验证所述第一密码是否正确;When the first password is obtained, verifying whether the first password is correct;
若所述第一密码是正确,则检测是否插入第一密钥单元;If the first password is correct, detecting whether a first key unit is inserted;
若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;If it is detected that the first key unit has been inserted, sending first encrypted data to the first key unit;
当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;When the first key unit verifies that the first encrypted data is correct, receiving the second encrypted data sent by the first key unit;
验证所述第二加密数据是否正确;Verifying whether the second encrypted data is correct;
若所述第二加密数据是正确,则允许所述进入请求,进入所述私密系统。If the second encrypted data is correct, the entry request is allowed to enter the private system.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices, and units described above can refer to the corresponding processes in the foregoing method embodiments, and are not repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit. The above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。A person of ordinary skill in the art may understand that all or part of the steps in the method of the foregoing embodiment may be implemented by a program instructing related hardware. The program may be stored in a computer-readable storage medium. The medium may be a read-only memory, a magnetic disk, or an optical disk.
以上所述仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above is only a preferred embodiment of the present invention, and thus does not limit the patent scope of the present invention. Any equivalent structure or equivalent process transformation made by using the description and drawings of the present invention, or directly or indirectly used in other related The technical field is included in the patent protection scope of the present invention.

Claims (16)

  1. 一种私密系统的进入的方法,其中,所述方法包括步骤:A method for entering a private system, wherein the method includes steps:
    当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元;When the user initiates an entry request to enter the private system, detecting whether the first key unit is inserted;
    若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;If it is detected that the first key unit has been inserted, sending first encrypted data to the first key unit;
    当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;When the first key unit verifies that the first encrypted data is correct, receiving the second encrypted data sent by the first key unit;
    验证所述第二加密数据是否正确;Verifying whether the second encrypted data is correct;
    若所述第二加密数据是正确,则获取进入所述私密系统的第一密码;If the second encrypted data is correct, obtaining a first password to enter the private system;
    当获取到所述第一密码时,验证所述第一密码是否正确;When the first password is obtained, verifying whether the first password is correct;
    若所述第一密码是正确,则允许所述进入请求,进入所述私密系统。If the first password is correct, the entry request is allowed to enter the privacy system.
  2. 根据权利要求1所述的私密系统的进入的方法,其中,所述当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元的步骤之前,包括:The method for entering a private system according to claim 1, wherein before the step of detecting whether to insert the first key unit when the user initiates an entry request to enter the private system, the method includes:
    当第一次进入所述私密系统时,提示用户设置进入所述私密系统的第一密码;When entering the private system for the first time, prompting the user to set a first password to enter the private system;
    在完成设置所述第一密码之后,提示用户绑定所述第一密钥单元。After setting the first password, the user is prompted to bind the first key unit.
  3. 根据权利要求1所述的私密系统的进入的方法,其中,所述第一密钥单元为一个以上的密钥单元;和/或,所述第一密码为一个以上的密码。The method for entering the privacy system according to claim 1, wherein the first key unit is more than one key unit; and / or the first password is more than one password.
  4. 根据权利要求2所述的私密系统的进入的方法,其中,在所述在完成设置所述第一密码之后,提示用户绑定所述第一密钥单元的步骤之后,所述方法包括:The method for entering a privacy system according to claim 2, wherein after the step of prompting a user to bind the first key unit after the setting of the first password is completed, the method includes:
    在完成绑定所述第一密钥单元之后,将所述第一密码储存在所述第一密钥单元。After the binding of the first key unit is completed, the first password is stored in the first key unit.
  5. 根据权利要求1所述的私密系统的进入的方法,其中,在所述获取进入所述私密系统的第一密码的步骤之前,所述方法包括:The method for entering a private system according to claim 1, wherein before the step of obtaining a first password for entering the private system, the method comprises:
    当所述第二加密数据是正确时,在预设第一时间之后,输入进入所述私密系统的密码。When the second encrypted data is correct, after a preset first time, a password for entering the private system is input.
  6. 根据权利要求1所述的私密系统的进入的方法,其中,在所述若所述第一密码是正确,则允许所述进入请求,进入所述私密系统的步骤之后,所述方法包括:The method for entering a private system according to claim 1, wherein after the step of allowing the entry request to enter the private system if the first password is correct, the method includes:
    当检测所述第一密钥单元拔出时,自动退出所述私密系统。When it is detected that the first key unit is pulled out, the private system is automatically exited.
  7. 根据权利要求1所述的私密系统的进入的方法,其中,在所述允许所述进入请求,进入所述私密系统的步骤之后,所述方法还包括以下至少一个步骤:The method for entering a private system according to claim 1, wherein after the step of allowing the entry request to enter the private system, the method further comprises at least one of the following steps:
    当进入所述私密系统时,在第二预设时间之后,弹出再次输入进入所述私密系统的密码的提示窗口;When entering the private system, after a second preset time, a prompt window for re-entering the password for entering the private system pops up;
    当进入所述私密系统时,检测所述私密系统在第三预设时间内是否存在用户对所述私密系统进行操作;若在所述第三预设时间内不存在用户对所述私密系统进行操作,则弹出再次输入进入所述私密系统的密码的提示窗口;When entering the private system, detecting whether there is a user operating the private system in the private system within a third preset time; if there is no user performing the private system in the third preset time Operation, a prompt window for re-entering the password to enter the private system pops up;
    在进入所述私密系统之后,当识别到语音信息时,判断所述语音信息中的声纹特征是否与设置录入的声纹特征一致;若不一致,则弹出再次输入进入所述私密系统的密码的提示窗口;After entering the private system, when the voice information is recognized, it is judged whether the voiceprint feature in the voice information is consistent with the entered voiceprint feature; if they are not the same, then pop-up and enter the password to enter the private system again. Prompt window
    在进入所述私密系统之后,获取用户的声纹特征;当识别到语音信息时,分析所述语音信息是否与所述用户的声纹特征一致;若不一致,则弹出再次输入进入所述私密系统的密码的提示窗口。After entering the private system, obtain the voiceprint characteristics of the user; when the voice information is recognized, analyze whether the voice information is consistent with the user's voiceprint characteristics; if they are not consistent, pop up and enter again to enter the private system Prompt window for password.
  8. 一种私密系统的进入的方法,其中,所述方法包括步骤:A method for entering a private system, wherein the method includes steps:
    当用户发起进入私密系统的进入请求时,获取进入所述私密系统的第一密码;When the user initiates an entry request to enter the private system, obtaining a first password to enter the private system;
    当获取到所述第一密码时,验证所述第一密码是否正确;When the first password is obtained, verifying whether the first password is correct;
    若所述第一密码是正确,则检测是否插入第一密钥单元;If the first password is correct, detecting whether a first key unit is inserted;
    若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;If it is detected that the first key unit has been inserted, sending first encrypted data to the first key unit;
    当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;When the first key unit verifies that the first encrypted data is correct, receiving the second encrypted data sent by the first key unit;
    验证所述第二加密数据是否正确;Verifying whether the second encrypted data is correct;
    若所述第二加密数据是正确,则允许所述进入请求,进入所述私密系统。If the second encrypted data is correct, the entry request is allowed to enter the private system.
  9. 根据权利要求8所述的私密系统的进入的方法,其中,所述当用户发起进入私密系统的进入请求时,获取进入所述私密系统的第一密码的步骤之前,包括:The method for entering a private system according to claim 8, wherein before the step of obtaining a first password for entering the private system when the user initiates an entry request to enter the private system, comprising:
    当第一次进入所述私密系统时,提示用户设置进入所述私密系统的第一密码;When entering the private system for the first time, prompting the user to set a first password to enter the private system;
    在完成设置所述第一密码之后,提示用户绑定所述第一密钥单元。After setting the first password, the user is prompted to bind the first key unit.
  10. 根据权利要求8所述的私密系统的进入的方法,其中,所述第一密钥单元为一个以上的密钥单元;和/或,所述第一密码为一个以上的密码。The method for entering a privacy system according to claim 8, wherein the first key unit is more than one key unit; and / or the first password is more than one password.
  11. 根据权利要求8所述的私密系统的进入的方法,其中,在所述若所述第二加密数据是正确,则允许所述进入请求,进入所述私密系统的步骤之后,所述方法包括:The method for entering a private system according to claim 8, wherein after the step of allowing the entry request to enter the private system if the second encrypted data is correct, the method includes:
    当检测所述第一密钥单元拔出时,自动退出所述私密系统。When it is detected that the first key unit is pulled out, the private system is automatically exited.
  12. 根据权利要求8所述的私密系统的进入的方法,其中,在所述允许所述进入请求,进入所述私密系统的步骤之后,所述方法还包括以下至少一个步骤:The method for entering a private system according to claim 8, wherein after the step of allowing the entry request to enter the private system, the method further comprises at least one of the following steps:
    当进入所述私密系统时,在第二预设时间之后,弹出再次输入进入所述私密系统的密码的提示窗口;When entering the private system, after a second preset time, a prompt window for re-entering the password for entering the private system pops up;
    当进入所述私密系统时,检测所述私密系统在第三预设时间内是否存在用户对所述私密系统进行操作;若在所述第三预设时间内不存在用户对所述私密系统进行操作,则弹出再次输入进入所述私密系统的密码的提示窗口;When entering the private system, detecting whether there is a user operating the private system in the private system within a third preset time; if there is no user performing the private system in the third preset time Operation, a prompt window for re-entering the password to enter the private system pops up;
    在进入所述私密系统之后,当识别到语音信息时,判断所述语音信息中的声纹特征是否与设置录入的声纹特征一致;若不一致,则弹出再次输入进入所述私密系统的密码的提示窗口;After entering the private system, when the voice information is recognized, it is judged whether the voiceprint feature in the voice information is consistent with the entered voiceprint feature; if they are not the same, then pop-up and enter the password to enter the private system again. Prompt window
    在进入所述私密系统之后,获取用户的声纹特征;当识别到语音信息时,分析所述语音信息是否与所述用户的声纹特征一致;若不一致,则弹出再次输入进入所述私密系统的密码的提示窗口。After entering the private system, obtain the voiceprint characteristics of the user; when the voice information is recognized, analyze whether the voice information is consistent with the user's voiceprint characteristics; if they are not consistent, pop up and enter again to enter the private system Prompt window for password.
  13. 一种私密系统的进入的装置,其中,所述装置包括:A device for entering a private system, wherein the device includes:
    第一检测模块,用于当用户发起进入私密系统的进入请求时,检测是否插入第一密钥单元;A first detection module, configured to detect whether a first key unit is inserted when a user initiates an entry request to enter a private system;
    第一发送模块,用于若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;A first sending module, configured to send first encrypted data to the first key unit if it is detected that the first key unit has been inserted;
    第一接收模块,用于当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;A first receiving module, configured to receive second encrypted data sent by the first key unit when the first key unit verifies that the first encrypted data is correct;
    第一验证模块,用于验证所述第二加密数据是否正确;A first verification module, configured to verify whether the second encrypted data is correct;
    第一获取模块,用于若所述第二加密数据是正确,则获取进入所述私密系统的第一密码;A first obtaining module, configured to obtain a first password for entering the private system if the second encrypted data is correct;
    第二验证模块,用于当获取到所述第一密码时,验证所述第一密码是否正确;A second verification module, configured to verify whether the first password is correct when the first password is obtained;
    第一进入模块,用于若所述第一密码是正确,则允许所述进入请求,进入所述私密系统。A first entry module is configured to allow the entry request to enter the private system if the first password is correct.
  14. 根据权利要求13所述的私密系统的进入的装置,其中,所述装置还包括:The device for entering a privacy system according to claim 13, wherein the device further comprises:
    第一提示模块,用于当第一次进入所述私密系统时,提示用户设置进入所述私密系统的第一密码;A first prompting module, configured to prompt a user to set a first password to enter the private system when entering the private system for the first time;
    第二提示模块,用于在完成设置所述第一密码之后,提示用户绑定第一密钥单元。The second prompting module is configured to prompt the user to bind the first key unit after the first password is set.
  15. 一种私密系统的进入的装置,其中,所述装置包括:A device for entering a private system, wherein the device includes:
    第二获取模块,用于当用户发起进入私密系统的进入请求时,获取进入所述私密系统的第一密码;A second obtaining module, configured to obtain a first password to enter the private system when a user initiates an entry request to enter the private system;
    第三验证模块,用于当获取到所述第一密码时,验证所述第一密码是否正确;A third verification module, configured to verify whether the first password is correct when the first password is obtained;
    第二检测模块,用于若所述第一密码是正确,则检测是否插入第一密钥单元;A second detection module, configured to detect whether the first key unit is inserted if the first password is correct;
    第二发送模块,用于若检测到所述第一密钥单元已插入,则发送第一加密数据给所述第一密钥单元;A second sending module, configured to send first encrypted data to the first key unit if it is detected that the first key unit has been inserted;
    第二接收模块,用于当所述第一密钥单元验证所述第一加密数据是正确时,接收所述第一密钥单元发送的第二加密数据;A second receiving module, configured to receive the second encrypted data sent by the first key unit when the first key unit verifies that the first encrypted data is correct;
    第四验证模块,用于验证所述第二加密数据是否正确;A fourth verification module, configured to verify whether the second encrypted data is correct;
    第二进入模块,用于若所述第二加密数据是正确,则允许所述进入请求,进入所述私密系统。A second entry module is configured to allow the entry request to enter the private system if the second encrypted data is correct.
  16. 一种移动终端,其中,包括处理器和存储器,A mobile terminal including a processor and a memory,
    所述存储器用于存储私密系统的进入的装置执行权1至权7或权8至权12中任一项所述的私密系统的进入的方法的程序;The memory is configured to store a program for the device for entering the private system to execute the method for accessing the private system according to any one of rights 1 to 7 or rights 8 to 12;
    所述处理器被配置为用于执行所述存储器中存储的程序。The processor is configured to execute a program stored in the memory.
PCT/CN2019/098718 2018-08-03 2019-07-31 Mobile terminal, and entering method and device of privacy system WO2020025005A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810877795.2A CN109327597A (en) 2018-08-03 2018-08-03 The method, apparatus of the entrance of mobile terminal and secret system
CN201810877795.2 2018-08-03

Publications (1)

Publication Number Publication Date
WO2020025005A1 true WO2020025005A1 (en) 2020-02-06

Family

ID=65263263

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/098718 WO2020025005A1 (en) 2018-08-03 2019-07-31 Mobile terminal, and entering method and device of privacy system

Country Status (2)

Country Link
CN (1) CN109327597A (en)
WO (1) WO2020025005A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109327597A (en) * 2018-08-03 2019-02-12 奇酷互联网络科技(深圳)有限公司 The method, apparatus of the entrance of mobile terminal and secret system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904719A (en) * 2011-07-27 2013-01-30 国民技术股份有限公司 USB (universal serial bus)-key and application method thereof
CN103051631A (en) * 2012-12-21 2013-04-17 国云科技股份有限公司 Unified security authentication method for PaaS (Platform as a Service) platform and SaaS (Software as a Service) application system
CN103109510A (en) * 2012-10-16 2013-05-15 华为技术有限公司 Resource safety access method and device
CN103218716A (en) * 2013-03-06 2013-07-24 交通银行股份有限公司 Safety certification terminal USBkey (Ukey), internet bank operation method and internet bank operation equipment
CN104951409A (en) * 2015-06-12 2015-09-30 中国科学院信息工程研究所 System and method for full disk encryption based on hardware
US20160105436A1 (en) * 2013-06-18 2016-04-14 Tencent Technology (Shenzhen) Company Limited Security verification method, apparatus and terminal
CN109327597A (en) * 2018-08-03 2019-02-12 奇酷互联网络科技(深圳)有限公司 The method, apparatus of the entrance of mobile terminal and secret system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN105429937B (en) * 2015-10-22 2018-07-06 同济大学 Identity identifying method and system based on keystroke behavior
CN106973054B (en) * 2017-03-29 2021-03-30 山东超越数控电子有限公司 Trusted platform based operating system login authentication method and system
CN107145773B (en) * 2017-04-17 2020-07-24 深圳市汤诚科技有限公司 Information prompting method and device based on full-screen fingerprint identification
CN106982224A (en) * 2017-04-28 2017-07-25 南京网博计算机软件系统有限公司 The method and system of real time identity checking identification

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904719A (en) * 2011-07-27 2013-01-30 国民技术股份有限公司 USB (universal serial bus)-key and application method thereof
CN103109510A (en) * 2012-10-16 2013-05-15 华为技术有限公司 Resource safety access method and device
CN103051631A (en) * 2012-12-21 2013-04-17 国云科技股份有限公司 Unified security authentication method for PaaS (Platform as a Service) platform and SaaS (Software as a Service) application system
CN103218716A (en) * 2013-03-06 2013-07-24 交通银行股份有限公司 Safety certification terminal USBkey (Ukey), internet bank operation method and internet bank operation equipment
US20160105436A1 (en) * 2013-06-18 2016-04-14 Tencent Technology (Shenzhen) Company Limited Security verification method, apparatus and terminal
CN104951409A (en) * 2015-06-12 2015-09-30 中国科学院信息工程研究所 System and method for full disk encryption based on hardware
CN109327597A (en) * 2018-08-03 2019-02-12 奇酷互联网络科技(深圳)有限公司 The method, apparatus of the entrance of mobile terminal and secret system

Also Published As

Publication number Publication date
CN109327597A (en) 2019-02-12

Similar Documents

Publication Publication Date Title
WO2018161743A1 (en) Fingerprint recognition method and related product
US20150294101A1 (en) Running applications, and authenticating users
CN106778175B (en) Interface locking method and device and terminal equipment
WO2018032661A1 (en) Information displaying method for terminal device, and terminal device
WO2018086259A1 (en) Authentication method and electronic device
CN108038393B (en) Application privacy protection method and mobile terminal
WO2017084288A1 (en) Method and device for verifying identity
WO2018045487A1 (en) Data sharing method and terminal
CN107483213B (en) Security authentication method, related device and system
CN106331370B (en) A kind of data transmission method and terminal device
CN108881103B (en) Network access method and device
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
WO2019011109A1 (en) Permission control method and related product
WO2018000370A1 (en) Mobile terminal authentication method and mobile terminal
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN107885991A (en) A kind of locking screen interface control method, mobile terminal and computer-readable recording medium
CN106255102B (en) Terminal equipment identification method and related equipment
CN107609363B (en) Unlocking method and mobile terminal
CN110149628B (en) Information processing method and terminal equipment
WO2015010578A1 (en) Method and device for access control of application
WO2016192511A1 (en) Method and apparatus for remotely deleting information
CN111125770A (en) Privacy protection method and electronic equipment
WO2018223402A1 (en) Function control method and terminal
CN108196762A (en) A kind of terminal control method, terminal and computer readable storage medium
CN108038360B (en) Operation mode switching method and mobile terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19843973

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19843973

Country of ref document: EP

Kind code of ref document: A1