Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making all other embodiment that obtain under creative work prerequisite, belong to the scope of protection of the invention.
For making the advantage of technical solution of the present invention clearer, below in conjunction with drawings and Examples, the present invention is elaborated.
One embodiment of the invention provides a kind of method of protecting data safety in terminal, is applied to terminal, and this terminal can be set up and communicate by letter with the subset of coupling, and as shown in Figure 1, described method comprises:
101, terminal receives user's operation indication.
102, after receiving operation indication, terminal sends the first authentication information to subset.
Wherein, described the first authentication information is corresponding with the content information of described operation indication.
Optionally, described operation indication comprising start indication; Before described terminal sends the first authentication information to described subset, described method also comprises: described terminal enters power-up state according to described start indication;
When thesecond authentication information 103, generating with subset when the first authentication information mates, terminal receives the successful sign that subset sends, according to successfully identifying executable operations indication.
When thesecond authentication information 104, generating with subset when the first authentication information does not mate or do not match the second authentication information, terminal receives the failed sign that subset sends, according to unsuccessfully sign refusal executable operations indication.
Optionally, after terminal enters power-up state according to described start indication, when described terminal receives the successful sign of described subset transmission, carry out start; When described terminal receives the failed sign of described subset transmission, carry out shutdown.
Optionally, described terminal can receive the request establishing a communications link sending from subset when Idle state, establishes a communications link with subset; After terminal and subset establish a communications link, receive the successful sign that subset sends, according to successful sign, carry out accordingly and operate.For example, start, release, data access etc.
Wherein, described operation indication is corresponding one by one with described the first authentication information, and described operation indication is corresponding one by one with the successful sign that subset sends.
Optionally, described the first authentication information can corresponding a plurality of operations indications.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind of method of protecting data safety in terminal, is applied to subset, and this subset can be set up and communicate by letter with the terminal of coupling, and as shown in Figure 2, described method comprises:
201, the first authentication information that subset receiving terminal sends.
The content information of the operation indication that wherein, the first authentication information receives with terminal is corresponding.
202, subset is indicated and is generated the second authentication information according to user.
203, subset judges whether the first authentication information and the second authentication information mate.
204, when the first authentication information and the second authentication information coupling, subset sends successfully sign to terminal.
205,, when the first authentication information and the second authentication information do not mate, subset sends unsuccessfully sign to terminal.
Optionally, if described subset does not generate the second authentication information, described subset directly sends unsuccessfully sign to described terminal.
Optionally, user can initiatively indicate to terminal transmit operation by subset, and terminal is controlled.Comprise: subset receives after user's indication, establishes a communications link with terminal; To terminal, send and indicate corresponding successful sign with user.For example, on subset, there is the function key of setting, the operations such as corresponding start, release; User has assigned user's indication to subset after pressing function key, and subset initiatively establishes a communications link with terminal, to terminal, sends the successful sign corresponding with function key; Terminal is carried out operation accordingly after receiving and successfully identifying.
Wherein, described user's indication is corresponding one by one with described the second authentication information.
Optionally, described the second authentication information can corresponding a plurality of users' indications.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind of method of protecting data safety in terminal; be applied to mobile terminal and subset; wherein; terminal is indicated first and is set up and communicate by letter with the subset of coupling according to user, after setting up communication, and the mutual authentication information of terminal and subset; according to interaction results, realize the security control of subset to terminal; the start process of terminal of take is example, and as shown in Figure 3, described method comprises:
301, user presses the key in terminal.
Wherein, user presses after key, and terminal can not started shooting immediately, but in power-up state, through follow-up judgement, carries out start or shutdown process.
302, terminal detects the function of whether opening start authentication according to user's indication, if opened thefunction execution step 303 of start authentication; If do not open the function of start authentication,execution step 311.
Wherein, whether user can open the function of authentication in the middle selection of arranging of terminal, if user has opened authentication functions, needs with subset alternately, could start shooting after completing authentication; If do not open authentication functions, terminal normal boot-strap.
303, terminal sends communication request to subset, carried terminal sign in communication request.
Wherein, terminal before mutual with subset, need to first be set up a communication connection.For fear of establishing a communications link with incoherent subset, in communication request, carry unique terminal iidentification, only have the subset mating with terminal iidentification to establish a communications link with terminal, improve the security of terminal.
304, subset judges whether the terminal iidentification in communication request mates with subset, if coupling,execution step 305; If do not mated,execution step 312.
305, subset is to the terminal message of returning to that the match is successful.
306, after the terminal message that receives that the match is successful, set up communication connection with subset.
For example, terminal can be passed through bluetooth, infrared or WIFI(Wireless Fidelity, Wireless Fidelity) etc. near radio link and subset establish a communications link, also can establish a communications link by wired mode.
307, terminal sends authentication information to subset.
Wherein, the operational order that authentication information is assigned to terminal to user instep 301 is relevant, and each operational order has its authentication information one to one.By multi-level authentication information is set, can more comprehensively protect the data security of terminal.For example, the operations such as start, release, visit data are arranged respectively to different authentication informations, and it is encrypted.
308, subset receives user's indication, according to user, generates corresponding authentication information.
For example, on subset, be provided with different function buttons, the operation of respective user to terminal respectively, such as start, release etc.User presses after corresponding button according to the operation instep 301, in subset, can generate corresponding authentication information, in order to the authentication information sending over terminal, mates.
It should be noted that, if now there is people privately to employ user's terminal, want to carry out start operation, and now user does not press the button on subset, can not generate authentication information.
309, subset judges whether the authentication information self generating mates with the authentication information that terminal sends; If coupling,execution step 310; If do not mateexecution step 312.
Wherein, two authentication informations can be that Default Value is good, also can according to self, need to carry out Function Extension by user, and the corresponding more authentication information of multiple operation type is set.
Optionally, if do not generate authentication information in subset, directly performstep 312.
Optionally, when whether two authentication informations of detection mate, the authentication information first terminal being sent is decrypted, then mates.
310, subset is to the terminal message that sends that the match is successful.
311, terminal normal boot-strap.
312, subset is to the terminal message that sends that it fails to match.
313, terminal closedown.
Optionally, user can initiatively indicate to terminal transmit operation by subset, and terminal is controlled.Comprise: subset receives after user's indication, establishes a communications link with terminal; To terminal, send and indicate corresponding successful sign with user.For example, on subset, there is the function key of setting, the operations such as corresponding start, release; User has assigned user's indication to subset after pressing function key, and subset initiatively establishes a communications link with terminal, to terminal, sends the successful sign corresponding with function key; Terminal is carried out operation accordingly after receiving and successfully identifying.
Optionally; in the function key of subset, can also comprise the function of data access, terminal is deposited into private data in default hidden folder, only has subset to send after corresponding indication to terminal; in terminal, just show this hidden folder, can effectively protect user's private data.
It should be noted that, the flow process of the present embodiment be take starting up of terminal as example is described, and for other flow processs, such as terminal unlocking etc., please refer to above-mentioned flow process, no longer repeats herein.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind of method of protecting data safety in terminal; be applied to mobile terminal and subset; wherein; terminal has been set up and has been communicated by letter with the subset of coupling; when user needs release terminal, the mutual authentication information of terminal and subset, realizes the security control of subset to terminal according to interaction results; as shown in Figure 4, described method comprises:
401, user assigns release indication to terminal.
Concrete, user issues release by modes such as release gesture, input unlocking pins to terminal and indicates.
402, terminal detects whether opened the function of release authentication according to user's release indication, if opened the function execution step 403 of release authentication; If do not open the function of release authentication, execution step 407.
Wherein, whether user can open the function of release authentication in the middle selection of arranging of terminal, if user has opened release authentication functions, needs with subset alternately, and completing after release authentication could release; If do not open release authentication functions, terminal normal release.
403, terminal sends authentication information to subset.
Wherein, the operational order that authentication information is assigned to terminal to user in step 401 is relevant, the corresponding one or more operational orders of each authentication information.By multi-level authentication information is set, can more comprehensively protect the data security of terminal.For example, the operations such as start, release, visit data are arranged respectively to different authentication informations, and it is encrypted.
404, subset receives user's indication, according to user, generates corresponding authentication information.
For example, on subset, be provided with different function buttons, the operation of respective user to terminal respectively, such as start, release etc.User presses after corresponding button according to the operation in step 401, in subset, can generate corresponding authentication information, in order to the authentication information sending over terminal, mates.
It should be noted that, if now there is people privately to employ user's terminal, want to carry out unlocking operation, and now user does not press the button on subset, can not generate authentication information.
405, subset judges whether the authentication information self generating mates with the authentication information that terminal sends; If coupling, execution step 406; If do not mate execution step 408.
Wherein, two authentication informations can be that Default Value is good, also can according to self, need to carry out Function Extension by user, and the corresponding more authentication information of multiple operation type is set.
Optionally, if do not generate authentication information in subset, perform step 408.
Optionally, when whether two authentication informations of detection mate, the authentication information first terminal being sent is decrypted, then mates.
406, subset is to the terminal message that sends that the match is successful.
407, terminal normal release.
408, subset is to the terminal message that sends that it fails to match.
409, terminal keeps lock-out state.
Optionally, user can initiatively indicate to terminal transmit operation by subset, and terminal is controlled.Comprise: subset receives after user's indication, establishes a communications link with terminal; To terminal, send and indicate corresponding successful sign with user.For example, on subset, there is the function key of setting, the operations such as corresponding start, release; User has assigned user's indication to subset after pressing function key, and subset initiatively establishes a communications link with terminal, to terminal, sends the successful sign corresponding with function key; Terminal is carried out operation accordingly after receiving and successfully identifying.
Optionally; in the function key of subset, can also comprise the function of data access, terminal is deposited into private data in default hidden folder, only has subset to send after corresponding indication to terminal; in terminal, just show this hidden folder, can effectively protect user's private data.
It should be noted that, the flow process of the present embodiment be take terminal unlocking as example is described, and for other user's operations, please refer to above-mentioned flow process, no longer repeats herein.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind ofterminal 50, and as shown in Figure 5, describedterminal 50 comprises:
Receivingelement 51, for receiving user's operation indication;
Transmittingelement 52, for receive described operation indication at described receivingelement 51 after, sends the first authentication information to described subset, and described the first authentication information is corresponding with the content information of described operation indication;
Thefirst performance element 53, when the second authentication information generating with described subset for described the first authentication information when sending mates, receives the successful sign that described subset sends, and according to described successfully sign, carries out described operation indication;
Thesecond performance element 54, when the second authentication information generating with described subset for described the first authentication information when sending does not mate or does not match described the second authentication information, receive the failed sign that described subset sends, according to described unsuccessfully sign refusal, carry out described operation indication.
Wherein, described operation indication comprises start indication;
Further, as shown in Figure 6, describedterminal 50 also comprises: upper electric unit 55, for before sending the first authentication information to described subset, enters power-up state according to described start indication;
Described thefirst performance element 53, specifically for when receiving the successful sign of described subset transmission, is carried out start; Described thesecond performance element 54, specifically for when receiving the failed sign of described subset transmission, is carried out shutdown.
Wherein, described operation indication is corresponding one by one with described the first authentication information.
Optionally, corresponding a plurality of operation indications of described the first authentication information.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
Further embodiment of this invention provides a kind ofdevice 60 of protecting data safety in terminal, and as shown in Figure 7, describeddevice 60 comprises:
Receivingelement 61, the first authentication information sending for receiving terminal, the content information of the operation indication that described the first authentication information receives with described terminal is corresponding;
Generation unit 62, generates the second authentication information for indicating according to described user;
Judgingunit 63, for judging whether described the first authentication information and described the second authentication information mate;
Transmittingelement 64, for when described the first authentication information and described second authentication information when coupling, sends successfully and identifies to described terminal; And for when described the first authentication information and described the second authentication information do not mate, to described terminal, send unsuccessfully sign.
Further, described transmittingelement 64 also for: if described generation unit does not generate the second authentication information, directly to described terminal, send unsuccessfully sign.
Wherein, described user's indication is corresponding one by one with described the second authentication information.
Optionally, the corresponding a plurality of user's indications of described the second authentication letter.
In prior art, what the subset of accessory terminal can only be on terminal practical function is auxiliary, but cannot provide safeguard to the data security in terminal.Compared with prior art, the embodiment of the present invention is by establishing a communications link for terminal and subset, then the operation of according to user, terminal being carried out is carried out authentication information with subset and is mated, when the authentication information of the two is when the match is successful, subset notification terminal can be carried out this operation, otherwise does not allow to carry out this operation.By above-mentioned flow process, when terminal receives operation indication, subset can judge and according to judged result granted rights, forbid the execution of the operation of some infringement privacy of user the operation of carrying out in terminal, the safety of user data in protection terminal.
The above-mentioned embodiment of the method providing can be provided for the device of the protection data safety in terminal that the embodiment of the present invention provides and terminal, and concrete function is realized and referred to the explanation in embodiment of the method, does not repeat them here.Method, device and the terminal of the protection data safety in terminal that the embodiment of the present invention provides go for mobile terminal, but are not limited only to this.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, to come the hardware that instruction is relevant to complete by computer program, described program can be stored in a computer read/write memory medium, this program, when carrying out, can comprise as the flow process of the embodiment of above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited to this, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.