CN106156562A - A kind of private space protection device, mobile terminal and method - Google Patents

A kind of private space protection device, mobile terminal and method Download PDF

Info

Publication number
CN106156562A
CN106156562A CN201610490444.7A CN201610490444A CN106156562A CN 106156562 A CN106156562 A CN 106156562A CN 201610490444 A CN201610490444 A CN 201610490444A CN 106156562 A CN106156562 A CN 106156562A
Authority
CN
China
Prior art keywords
password
private space
user
private
space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610490444.7A
Other languages
Chinese (zh)
Other versions
CN106156562B (en
Inventor
陆元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201610490444.7A priority Critical patent/CN106156562B/en
Publication of CN106156562A publication Critical patent/CN106156562A/en
Application granted granted Critical
Publication of CN106156562B publication Critical patent/CN106156562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of private space protection device, mobile terminal and method, described method includes: when private space is opened, first display to the user that password creates interface, then receive the first password of user's input and verify, after first password is verified, open the private space corresponding with this first password, when first password checking is not passed through, the private space establishment interface prompt user being directly entered routine completes private space establishment, whether make other people cannot determine this mobile terminal holder opens private space, thus reach to hide whether user opens the purpose of private space, namely the private space guard method provided by the present invention, while not hiding private space entrance, also privacy of user can be hidden, further enhance the safety of privacy of user, and then promote the experience of user.

Description

A kind of private space protection device, mobile terminal and method
Technical field
The present invention relates to network communication technology field, more particularly, it relates to a kind of private space protection device, movement are eventually End and method.
Background technology
At present, on mobile terminal, the privacy of user data of storage get more and more, and need private space to hide privacy of user. Existing private space implementation, is all the private data encrypting user by arranging password, checks private data every time Being required for inputting correct password and could enter private space, the password of input error then can not enter private space.But, only Will be at private space entrance prompting input password, it is possible to determine whether this user opens private space, and then determine this user Whether there is privacy.Therefore, existing private space implementation can not well hide privacy of user, thus reduces privacy of user Safety.
Summary of the invention
The technical problem to be solved in the present invention is that existing private space protected mode safety is poor, thus affects use Family is experienced, for this technical problem, it is provided that a kind of private space protection device, mobile terminal and method.
For solving above-mentioned technical problem, the embodiment of the present invention provides a private space protection device, including:
Display module, shows that when private space is opened password creates interface;
Password authentication module, for receiving the first password of user's input and verifying;
Private space opening module, for when described first password is verified, opens corresponding with described first password Private space;
Private space creation module, for when described first password authentication failed, enters private space and creates interface.
Wherein, described password authentication module be additionally operable to receive user input first password, and judge whether to store with The private space password that private space is corresponding, if having stored described private space password, then according to described private space password pair Described first password is verified.
Wherein, also include:
Password recovery module, for after entering private space establishment interface, receive user's triggering gives Password Operations for change Instruction, and give Password Operations command prompt user for change carry out Information Authentication according to described.
Wherein, described private space opening module, for when private space includes at least two, is opened and described first At least two private space that password is corresponding, or open and described first password private space one to one.
The invention provides a kind of mobile terminal, including private space protection device as above.
Present invention also offers a kind of private space guard method, including:
Private space shows when opening that password creates interface;
Receive the first password of user's input and verify;
When described first password is verified, open the private space corresponding with described first password;
When described first password authentication failed, enter private space and create interface.
Wherein, the described first password receiving user's input carry out checking and include:
Receive the first password of user's input, and judge whether to store private space password;
If having stored described private space password, then according to described private space password, described first password is tested Card.
Wherein, after described entrance private space creates interface, described method also includes:
Receive user's triggering gives Password Operations instruction for change;
Give Password Operations command prompt user for change carry out Information Authentication according to described.
Wherein, the private space that described unlatching is corresponding with described first password includes:
When private space includes at least two, open at least two private space corresponding with described first password;Or Open and described first password private space one to one.
Wherein, described private space password is stored in local terminal or high in the clouds.
Beneficial effect
Private space protection device, mobile terminal and the method that the embodiment of the present invention proposes, when private space is opened, first First display to the user that password creates interface, then receive the first password of user's input and verify, when first password is verified By rear, open the private space corresponding with this first password, when first password checking is not passed through, be directly entered the private of routine Close space creates interface prompt user and completes private space establishment so that other people cannot determine whether this mobile terminal holder opens Open private space, thus reach to hide whether user opens the technique effect of private space, namely the private provided by the present invention Close space protection method, while not hiding private space entrance, also can hide privacy of user, further enhance user The safety of privacy, and then promote the experience of user.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention;
The private space protection device schematic diagram that Fig. 2 provides for first embodiment of the invention;
The private space interface schematic diagram that first password that Fig. 3 provides for first embodiment of the invention is corresponding;
The pattern password that Fig. 4 provides for first embodiment of the invention creates interface schematic diagram;
The numerical ciphers that Fig. 5 provides for first embodiment of the invention creates interface schematic diagram;
The password that Fig. 6 provides for first embodiment of the invention creates interface schematic diagram;
The private space that Fig. 7 provides for first embodiment of the invention creates interface schematic diagram;
The mobile terminal schematic diagram that Fig. 8 provides for second embodiment of the invention;
The private space guard method flow chart that Fig. 9 provides for third embodiment of the invention;
The private space guard method flow chart that Figure 10 provides for fourth embodiment of the invention.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use For representing the suffix explanation only for the beneficially present invention of such as " module " or " unit " of element, itself is the most special Fixed meaning.Therefore, " module " can mixedly use with " unit ".
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can include such as moving The mobile end of phone, smart phone, notebook computer, PDA (personal digital assistant), PAD (panel computer), guider etc. The fixed terminal of end and such as numeral TV, desk computer etc..Hereinafter it is assumed that terminal is mobile terminal.But, this area Skilled artisan will appreciate that, in addition to being used in particular for the element of mobile purpose, also being able to according to the structure of the present embodiment should Terminal for fixed type.
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention.
Mobile terminal 100 include A/V (audio/video) input block 120, user input unit 130, output unit 150, Memorizer 160, interface unit 170, controller 180 and power subsystem 190 etc..Fig. 1 shows the movement with various assembly Terminal, it should be understood that be not required for implementing all assemblies illustrated.Can alternatively implement more or less of group Part.Will be discussed in more detail below the element of mobile terminal.
A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can include mike 122, Mike 122 can receive via mike in telephone calling model, logging mode, speech recognition mode etc. operational mode Sound (voice data), and can be voice data by such acoustic processing.Audio frequency (voice) data after process are permissible In the case of telephone calling model, be converted to can be sent to the form of mobile communication base station via mobile communication module 112 defeated Go out.Mike 122 can be implemented various types of noise elimination (or suppression) algorithm and receive and transmission to eliminate (or suppression) The noise produced during audio signal or interference.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user's input Plant operation.User input unit 130 allows user to input various types of information, and can include keyboard, metal dome, touch Plate (such as, detection due to touched and cause resistance, pressure, the sensitive component of change of electric capacity etc.), roller, rocking bar etc. Deng.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch screen can be formed.
Interface unit 170 is used as at least one external device (ED) and is connected, with mobile terminal 100, the interface that can pass through.Such as, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, for connect have the port of device of identification module, audio frequency input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be that storage is for verifying that user uses each of mobile terminal 100 Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included Etc..It addition, the device (hereinafter referred to as " identifying device ") with identification module can be to take the form of smart card, therefore, know Other device can be connected with mobile terminal 100 via port or other attachment means.Interface unit 170 may be used for receive from The input (such as, data message, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100 One or more elements or may be used between mobile terminal and external device (ED) transmit data.
It addition, when mobile terminal 100 is connected with external base, interface unit 170 can serve as allowing electricity by it Power provides the path of mobile terminal 100 from base or can serve as allowing from the various command signals of base input by it It is transferred to the path of mobile terminal.May serve as identifying that mobile terminal is from various command signals or the electric power of base input The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio frequency and/or tactile manner Go out signal (such as, audio signal, video signal, alarm signal, vibration signal etc.).
Output unit 150 can include display unit 151 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 100.Such as, it is in electricity when mobile terminal 100 During words call mode, display unit 151 can show and call or other (such as, text messaging, multimedia file that communicate Download etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern Or during image capture mode, display unit 151 can show image and/or the image of reception of capture, illustrate video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad the most superposed on one another with formed touch screen time, display unit 151 can serve as input equipment and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least A kind of.Some in these display may be constructed such that transparence is watched from outside with permission user, and this is properly termed as transparent Display, typical transparent display can for example, TOLED (transparent organic light emitting diode) display etc..According to specific The embodiment wanted, mobile terminal 100 can include two or more display units (or other display device), such as, move Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detection and touches Input pressure and touch input position and touch input area.
Memorizer 160 can store the process performed by controller 180 and the software program controlling operation etc., or can Temporarily to store the data (such as, telephone directory, message, still image, video etc.) that oneself maybe will export through output.And And, memorizer 160 can with storage about when touch be applied to touch screen time the vibration of various modes of output and audio signal Data.
Memorizer 160 can include that the storage medium of at least one type, described storage medium include flash memory, hard disk, many Media card, card-type memorizer (such as, SD or DX memorizer etc.), random access storage device (RAM), static random-access store Device (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 100 can be connected execution memorizer with by network The network storage device cooperation of the storage function of 160.
Controller 180 generally controls the overall operation of mobile terminal.Such as, controller 180 performs and voice call, data Control that communication etc. is relevant and process.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Suitable electric power needed for part and assembly.
Various embodiment described herein can be to use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implemented.Implementing for hardware, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Program gate array (FPGA), processor, controller, microcontroller, microprocessor, be designed to perform function described herein At least one in electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180. Software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation Software module is implemented.Software code can be come by the software application (or program) write with any suitable programming language Implementing, software code can be stored in memorizer 160 and be performed by controller 180.
So far, oneself is through describing mobile terminal according to its function.Below, for the sake of brevity, will describe such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is as showing Example.Therefore, the present invention can be applied to any kind of mobile terminal, and is not limited to slide type mobile terminal.
It is described in detail below by way of specific embodiment.
First embodiment
Present embodiments providing a kind of private space protection device, the application scenarios of this private space protection device is, When at least one private space of user setup, its objective is not want to allow other people know some privacy of oneself, do not want to allow him People knows that oneself is provided with private space, based under this premise, by the private space protection device of this enforcement offer, it is possible to In the case of user setup private space, whether make other people cannot determine user opens private space, namely do not hiding secret While space entry, whether also can make other people cannot determine user opens private space, hide the privacy of user, thus strengthen The safety of privacy of user, and then promote the experience of user.
Refer to the private space protection device schematic diagram that Fig. 2, Fig. 2 provide, this private space protection dress for the present embodiment Put and include:
Display module 21, shows that when private space is opened password creates interface;
Password authentication module 22, for receiving the first password of user's input and verifying;
Private space opening module 23, for when first password is verified, opens the secret corresponding with first password Space.
Password authentication module 22 is additionally operable to receive the first password of user's input, and judges whether to store and private space Corresponding private space password, if having stored private space password, then verifies first password according to private space password.
Private space creation module 24, for when described first password authentication failed, enters private space and creates interface.
Further, this private space protection device also includes:
Password recovery module 25, for after entering private space establishment interface, receive user's triggering gives password behaviour for change Instruct, and carry out Information Authentication according to giving Password Operations command prompt user for change.
Aforementioned private space opening module 23 is additionally operable to when private space includes at least two, opens and first password pair At least two private space answered, or open and first password private space one to one.
The private space protection device provided by this enforcement, it is possible in the case of user setup private space, make him People cannot determine whether user opens private space, namely while not hiding private space entrance, also can make other people cannot Determine whether user opens private space, hide the privacy of user, thus strengthen the safety of privacy of user, and then promote user Experience.
Concrete, the function that above-mentioned each functional module performs can be realized by the fractional hardware in Fig. 1, and retouches follow-up Illustrating various embodiments of the present invention with particular hardware in stating, certainly, the function that each hardware performs also can be by above-mentioned functions mould Block realizes.The function of above-mentioned each functional module is specifically realized by following hardware:
The password of display module 21 display is created interface and can be realized by display unit 151, display unit 151 display terminal Current password creates interface for users and checks.Display unit 151 can serve as input equipment and output device, and display is correlated with User interface (UI) or graphic user interface (GUI).This display unit 151 can include LCDs (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least A kind of.
Password authentication module 22 is when receiving the first password of user's input, and user can input password by touch screen, its In, touch screen is display unit 151 and the structure of touch pad formation the most superposed on one another, and touch pad is that user inputs list One in unit 130, can allow for user by this user input unit 130 and inputs various types of information.Password authentification mould After block 22 receives the first password of user's input, this first password is sent to controller 180 and carries out password authentification process, with Judge whether this first password exists the private space of correspondence.
Private space opening module 23 is opened the function of private space and can be realized by controller 180, and controller is to the After one password authentification is passed through, directly open the private space corresponding with first password.Accordingly, private space creation module 24 institute The function realized can be completed by controller 180 equally, and controller 180, after first password authentication failed, is directly entered secret Establishment interface, space, guides user to carry out the establishment of private space by display unit 151 so that other people cannot determine user Whether open private space, if having privacy, further promote the safety of privacy of user.
Further, the function of password recovery module 25 also can be realized by controller 180, when controller 180 passes through After display unit 151 points out user to enter private space establishment interface, display unit 151 shows whole establishment circle of private space Face, user trigger in this establishment interface give for change Password Operations instruction, controller 180 according to this instruction by display unit 151 Prompting user carries out Information Authentication step by step, and then creates new password or show that user forgets by display unit 151 Password.
When user triggers private space entrance by display unit 151, controller 180 recalls password and creates interface and pass through Display unit 151 shows, and points out user to create password, and user, after password establishment interface creates password by touch screen, is controlled This password will be verified by device 180 processed, after being verified, show that the secret that first password is corresponding is empty by display unit 151 Between, end user checks various privacy in private space, specifically refers to the first password that Fig. 3, Fig. 3 provide for the present embodiment Corresponding private space interface schematic diagram, the content shown in figure is only used for explaining the present invention, is not intended to invention Restriction;If checking is not passed through, show that private space creates at the beginning of interface, namely display private space by display unit 151 Beginningization interface, initializes behind interface when entering private space, and other people will be considered that user does not open private space, accordingly, The most there is not privacy, by this private space protection device, greatly improve crypticity and the safety of user's private space.
Concrete, as user or after other people enter private space entrance, controller 180 is shown by display unit 151 Showing that password creates interface, prompting user creates password.Need to understand, display password creates the purpose at interface and is, when other people enter After entering private space entrance, if being shown that interface for password input, first will be considered that this user has turned on private space, this secret Space has privacy of user so that the safety of private space is substantially reduced;On the contrary, private space entrance is entered when other people After, if being shown that password to create interface, prompting user creates a password, first will be considered that this private space is in initialization State, needs to create a password, and then creates a private space, it is thus regarded that this user does not also open private space, yet There is not privacy, greatly improve the safety of private space, simultaneously without hiding private space entrance, improve operation multiple Miscellaneous degree.
Controller 180 is when pointing out user to create password by display unit 151, and this password can be pattern password, refer to The cipher modes well known to those skilled in the art such as stricture of vagina password, vocal print password, face password, numerical ciphers, mixed cipher, its In, mixed cipher refers at least two in numeral, character, letter is mixed the password generated.
In a kind of embodiment, as a example by pattern password, referring to Fig. 4, Fig. 4 is that pattern password creates interface schematic diagram, This password creates interface " please draw a design password " displayed above, and user (include user or other people) draws figure according to prompting Case password, user input unit 130 captures the pattern password of user's input, and this password is sent to controller 180 carries out Checking.
In a kind of embodiment, as a example by numerical ciphers, refer to the numerical ciphers wound that Fig. 5, Fig. 5 provide for the present embodiment Building interface schematic diagram, this password creates interface " please create numerical ciphers " displayed above, and user is according to prompting input 4 numbers Word, the numerical ciphers that user inputs is sent to controller 180 and verifies by user input unit 130, this group numeral include but Being not limited at least two, digit is the most, and safe class is the highest, and the safety of privacy of user is the highest.
In a kind of embodiment, as a example by finger-print cipher, if creating cryptographic interface prompting " to ask typing fingerprint ", then user's root According to prompting typing fingerprint.
In another embodiment, in conjunction with above-mentioned three kinds of embodiments, user one of which is selected to carry out password establishment, Specifically referring to Fig. 6, Fig. 6 and create interface schematic diagram for the password that the present embodiment provides, this password establishment interface is displayed above " please Password is selected to create type ", thereunder three kinds of passwords of display create types, such as numerical ciphers, pattern password, finger-print cipher, According to the selection that user is different, controller 180 jumps to different interfaces, and is shown by display unit 151, such as, If user-selected number word password, then enter numerical ciphers as shown in Figure 5 and create interface;If user selects pattern password, then enter Enter password as indicated at 4 and create interface.
After user is according to prompting input password (i.e. first password), controller 180 receives the first password of user's input Verifying this password afterwards, concrete, controller 180 receives the first password of user's input, and judges whether in storage Device 160 storing private space password, if having stored private space password, then according to this private space password, first password being entered Row checking;If not storing private space password, then it is directly entered private space establishment interface and guides user to complete private space wound Build process.
When verifying first password according to this private space password, its concrete proof procedure is as follows:
First password is mated with the private space password stored, if first password and private space password match Success, then be verified, and controller 180 is opened the private space corresponding with this password and presents to use by display unit 151 Family;If first password and the failure of private space password match, then verifying and do not pass through, controller 180 is opened private space and is created boundary Face, presents private space by display unit 151 for user and initializes scene, and then user further thinks that user is also Do not open private space, the most there is not privacy.On the contrary, if memorizer 160 does not stores private space password, then controller 180 Think that private space is never opened, create interface automatically into private space, present private space for user and initialize field Scape, and using the password that creates before as private space password, certainly, it is empty as secret that user also can re-create a password Between password.
More specifically, the controller 180 private space password that prestored in memorizer 160 is corresponding with private space Table, mates first password with the private space password of storage in corresponding table, and when the match is successful, first password is private Close space password, opens the private space corresponding with first password;When it fails to match, likewise enter private space and create boundary Face.After entering private space establishment interface, user can be triggered by user input unit 130 give Password Operations instruction for change, moves Dynamic terminal receive this give for change Password Operations instruction, and according to this give for change Password Operations instruction point out user by display unit 151 Carry out Information Authentication.Wherein, memorizer 160 can include that the storage medium of at least one type, described storage medium include dodging Deposit, hard disk, multimedia card, card-type memorizer (such as, SD or DX memorizer etc.), random access storage device (RAM), static with Machine access memorizer (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), able to programme Read memorizer (PROM), magnetic storage, disk, CD etc..
After entering private space establishment interface, the content that user presents according to display unit 151, input list by user Unit 130 inputs corresponding information, and after input, controller 180 shows next interface by display unit 151, points out user Input other information, progressively guide user to complete private space and create process.Such as, referring to Fig. 7, Fig. 7 is that the present embodiment carries The private space of confession creates interface schematic diagram, in this private space creates interface, including opening private space option, arranging peace Full problem input frame, give the functions such as cryptographic options for change, and point out " kindly remember it password and safety problem answer ", each function setting Purpose is specific as follows:
Open private space option for selecting safety problem user by user input unit 130, and input right After the answer answered, trigger this unlatching private space option and can enter next interface is set or to be directly entered newly created secret empty Between;
Safety problem input frame is set after forgetting Password as user, during giving password for change, user can be pointed out Recall the password forgotten according to this safety problem, or after user answers correct safety problem, controller 180 is directly from storage Device 160 obtain the password forgotten and is shown to user by display unit 151, or whether being that secret is empty as checking user Between corresponding user, in the case of verifying that this user be private space correspondence user, prompting user re-creates a password, this Password is the second password;Wherein, safety problem is by user setup, and user can directly select a problem, it is possible to self-defined one Problem.
Give cryptographic options for change after forgetting Password as user, can be triggered this and give cryptographic options for change, then prompting user's root Recall, according to safety problem and other verification modes, the password forgotten, or pass through in safety problem and other verification modes After, from memorizer 160, find the password forgotten and be shown to user, or passing through in safety problem and other verification modes After, re-create a password as private space password.
Re-create a password as private space password after, controller 180 by this private space password replace deposit The password that in reservoir 160, the private space of storage is corresponding, namely after user forgets Password, re-created the second password, control Device 180 processed controls memorizer 160 and second password is replaced original first password so that the second password is corresponding with private space, Wherein, corresponding with first password before this private space.When user inputs the second password next time, controller 180 is direct Control display unit 151 and enter the private space that first password is corresponding.
In order to ensure that user's private space password cannot will not be given for change because of forgetting, each secret that mobile terminal will create Space password is stored in memorizer 160, and when carrying out password authentification next time, the secret directly and stored in memorizer 160 is empty Between password mate.It may be noted that the corresponding table of private space password and the private space of storage in memorizer 160, it should enter The dynamic renewal of line period, or the most dynamically update, to ensure that user just may be used after inputting password whenever creating password Open the private space of correspondence, it is to avoid reset private space password because of forgetting Password, the most corresponding table do not updated, Corresponding private space is caused to open.Additionally, private space password is stored in memorizer 160 and (is i.e. stored in movement by removing Terminal local), it is possible to private space password is stored in high in the clouds, when forgetting Password, directly can obtain from high in the clouds and forget Password, so that user forgets brought inconvenience without having to worry about password.
Further, after first password is verified, the private space that first password is corresponding opened by controller 180, should Private space can be one, it is also possible to is multiple, namely first password and private space one_to_one corresponding, or one-to-many is corresponding, Each private space is distinguished by password.When private space includes at least two, open at least two corresponding with first password Individual private space, or open and first password private space one to one.It may be noted that one_to_one corresponding here refer to one close The only corresponding private space of code, aforesaid plurality of refers to two or more.Preferably, a password and a secret sky Between corresponding, distinguish each private space by password, and be that private space sets safe class by the degree that is difficult to of password.
Concrete, when first password is mated with multiple private space passwords, if finding first password and wherein One private space password is corresponding, and the corresponding multiple private spaces of this private space password, then can be opened by first password Multiple private spaces;If finding, first password is corresponding with one of them private space password, and this private space password is the most corresponding One private space, then can open a private space by first password, empty compared to a multiple secret of Password Management Between, this man-to-man way to manage more can guarantee that privacy of user, even if one of them password is decoded by other people, but other people are only Can obtain the private space under this password, and the private space of other Password Managements still safety, and also by the difficulty of password It is that each private space arranges different safe classes with degree, further ensures privacy of user.
Additionally, private space and private space password correspondence table are periodically screened by private space protection device, according to The conditions such as file size, use frequency delete useless private space, the private space of such as other people establishment or maloperation The private space created, thus save mobile terminal internal memory, and improve password authentification efficiency.
The private space protection device provided by embodiment, determines whether to there is corresponding private according to the password of input Close space, if there is corresponding private space, then opening the private space of correspondence, if there is not the private space of correspondence, then entering Enter private space and create interface so that other people cannot determine whether the user of mobile terminal opens secret when using mobile terminal Space, thus reach to hide whether user opens the effect of private space, use the private space protection dress that the present embodiment provides Put, both without hiding private space entrance, can reach again to hide the purpose of private space, further enhance privacy of user Safety.
Second embodiment
Refer to the mobile terminal schematic diagram that Fig. 8, Fig. 8 provide for the present embodiment.This mobile terminal includes first embodiment In private space protection device 81, for the related description of private space protection device 81, the present embodiment will be the most superfluous State, specifically refer to first embodiment.Power subsystem 190 in mobile terminal receives external electrical under the control of controller 180 Power or internal power also provide the suitable electric power operated needed for each element and assembly, in the case, the secret in mobile terminal Space protection device 81 is verified by the password creating user, to determine entrance which interface of private space, if checking Pass through, then open the private space corresponding with this password, if authentication failed, then enter private space and create interface.Thus, can protect Demonstrate,prove other people and cannot confirm whether user opens private space, and then cannot confirm whether user has privacy, further improve The safety of privacy of user.
When private space protection device 81 creates type using vocal print password as password, mobile terminal is inputted by A/V Unit 120 receives the sound of user's input, and A/V input block 120 includes mike 122, and mike 122 can be in telephone relation Pattern, logging mode, speech recognition mode etc. operational mode receives sound (voice data), and can be by such sound Sound is processed as voice data, and audio frequency (voice) data after then processing send to controller 180, controller 180 complete Voice match, if the match is successful, then enters the private space corresponding with this vocal print password, if it fails to match, then enters secret empty Between create interface.Mike 122 can be implemented various types of noise elimination (or suppression) algorithm and connect to eliminate (or suppression) The noise produced during receiving and send audio signal or interference.
When private space protection device 81 creates type using face password as password, mobile terminal calls photographic head and sweeps Retouching user face, and process the figure of scanning, the figure after processing mates with the figure stored before, if It is made into merit, then enters the private space corresponding with this face password, if it fails to match, then enter private space and create interface.
When private space protection device 81 creates type using finger-print cipher as password, mobile terminal is inputted by user Sensor on unit 130 is drawn finger print information and processes, the finger print information after processing and the fingerprint image stored before Shape is mated, if the match is successful, then enters the private space corresponding with this finger-print cipher, if it fails to match, then enters secret Establishment interface, space.Sensor as aforementioned includes but not limited to capacitance type sensor, optical pickocff.
The mobile terminal provided by this enforcement, determines which kind of boundary entering private space according to the password of user's input Face, the password the most even inputted is correct, then enter the private space that this password is corresponding, if the code error of input, then enters private Establishment interface, close space, thus reach to hide whether user opens the technique effect of private space.
3rd embodiment
As it is shown in figure 9, the private space guard method flow chart that Fig. 9 provides for the present embodiment, the private that the present embodiment provides The close space protection method private space protection device corresponding with first embodiment is corresponding, therefore no longer does partial content specifically Bright, illustrate the relevant portion referring to first embodiment.The method comprises the following steps:
S91, private space shows when opening that password creates interface.
Concrete, as user or after other people enter private space entrance, first show password establishment interface, and point out User creates password.Need to understand, display password creates the purpose at interface and is, after other people enter private space entrance, if It is shown that interface for password input, first will be considered that this user has turned on private space, this private space has privacy of user, The safety making private space is substantially reduced;On the contrary, after other people enter private space entrance, if being shown that password wound Building interface, prompting user creates a password, first will be considered that this private space is in init state, need to create one close Code, and then create a private space, it is thus regarded that this user does not also open private space, the most there is not privacy, greatly carry Rise the safety of private space, simultaneously without hiding private space entrance, improve operation complexity.
Point out user create password time, this password can be pattern password, finger-print cipher, vocal print password, face password, The cipher mode well known to those skilled in the art such as numerical ciphers, mixed cipher, wherein, mixed cipher refer to by numeral, character, The password that at least two mixing in letter generates.Or, creating interface at password, prompting user selects to use which kind of cipher type Type, the password type selected according to user enters corresponding interface and completes password establishment.
S92, receives the first password of user's input and verifies.
Concrete, while receiving first password, it may be judged whether stored private space password, if it is empty to have stored secret Between password, then according to this private space password, first password is verified;If not storing private space password, then it is directly entered Private space creates interface and guides user to complete private space establishment process.Described private space password can be stored in local terminal or High in the clouds.
More specifically, when verifying first password according to this private space password, its concrete proof procedure is: will First password mates with the private space password stored, if first password and the success of private space password match, then tests Card passes through, and opens the private space corresponding with this password and presents to user;If first password loses with private space password match Lose, then verify and do not pass through, enter private space and create interface, present private space for user and initialize scene, then use Person further thinks that user does not open private space, the most there is not privacy.On the contrary, empty if mobile terminal does not stores secret Between password, then it is assumed that private space is never opened, automatically into private space create interface, present private space for user Initialize scene, and using the password that creates before as private space password, certainly, user also can re-create a password and make For private space password.
After entering private space establishment interface, user inputs corresponding information according to the content presented, after input, Show that next interface, prompting user input other information, progressively guide user to complete private space and create process;Or progressively draw Lead user and carry out Information Authentication, to give the password forgotten for change or to re-create password.
S93, when described first password is verified, opens the private space corresponding with described first password.
Concrete, after opening the private space that first password is corresponding, this private space can be one, it is also possible to is many Individual, namely first password and private space one_to_one corresponding, or one-to-many is corresponding, distinguishes each private space by password.Work as private When close space includes at least two, open at least two private space corresponding with first password, or open and first password one The private space of one correspondence.It may be noted that one_to_one corresponding here refers to the only corresponding private space of a password, aforesaid plurality of Refer to two or more.Preferably, a password is corresponding with a private space, distinguishes each secret by password Space, and be that private space sets safe class by the degree that is difficult to of password.
More specifically, when first password is mated with multiple private space passwords, if find first password and its In private space password corresponding, and corresponding multiple private spaces of this private space password, then can be beaten by first password Open multiple private space;If finding, first password is corresponding with one of them private space password, and this private space password is the most right Answer a private space, then can open a private space, compared to a multiple secret of Password Management by first password Space, this man-to-man way to manage more can guarantee that privacy of user, even if one of them password is decoded by other people, but other people It is only capable of obtaining the private space under this password, and the private space of other Password Managements still safety, and also by password Being difficult to degree is that each private space arranges different safe classes, further ensures privacy of user.
S94, when described first password authentication failed, enters private space and creates interface.
Further, receiving the first password of user's input and after verifying, if first password authentication failed, then Entering private space and create interface, then receive user's triggering gives Password Operations instruction for change, and gives Password Operations for change according to this Command prompt user carries out Information Authentication.
Additionally, also can periodically private space and private space password correspondence table be screened, according to file size, use The conditions such as frequency delete useless private space, and private space or the secret of maloperation establishment that such as other people create are empty Between, thus save mobile terminal internal memory, and improve password authentification efficiency.
Enforcement based on above-mentioned steps, determines whether to there is corresponding private space by the password of input, if existing Corresponding private space, then open the private space of correspondence, if there is not the private space of correspondence, then enters private space and creates Interface so that other people cannot determine whether the user of mobile terminal opens private space when using mobile terminal, thus reaches Whether hiding user opens the effect of private space.
4th embodiment
The present embodiment provides based on phonetics transfer method by the 3rd embodiment, opens flow process as field with private space entirety The present invention will be described for scape, specifically refers to the private space guard method flow chart that Figure 10, Figure 10 provide for the present embodiment. Detailed process is as follows:
S101, enters private space entrance.
Concrete, private space entrance is password and creates interface, when opening private space, is shown to the interface of user i.e. Interface is created for password.This password creates in interface, the password type of establishment include but not limited to finger-print cipher, vocal print password, Face password, numerical ciphers, mixed cipher, pattern password.
S102, receives the password of user's input.
S103, it may be judged whether there is private space, if there is private space, then performs S104 step, if there is not secret Space, then perform S107 step.
Concrete, mobile phone judges that inside has stored private space password, the most if having stored private space password.Then think There is private space.Certainly, it is possible to judge internal other information whether storing private space, such as safety problem, telephone number Deng, if having stored, then it is assumed that there is private space, otherwise, do not exist.
S104, password active user inputted mates with the private space password of storage in mobile phone successively.
Concrete, the private space of usual user setup has multiple, when user setup at least two private space, each The corresponding private space password of private space, or the corresponding private space password of at least two private space, in mobile phone Storage have multiple private space password, accordingly, it would be desirable to the password that user is currently entered successively with storage multiple private spaces Password mates.
S105, it is judged that the password of input is the most successful with certain private space password match, if the match is successful, then performs S106 Step, if it fails to match, then performs S107 step.
S106, opens the private space corresponding with this password.
Concrete, after opening this private space, user can carry out private information and check or the operation such as storage.
S107, enters private space and creates interface.
Concrete, enter private space and create interface and there are two kinds of situations, one is never to open secret before user Space, causes the information not storing any mark private space inside mobile terminal, and therefore, mobile terminal enters private space After creating interface, user is guided to create private space.Concrete, if user never opened private space, when using for the first time Then can enter private space and create interface.Another kind is Password Input mistake, and such as, user forgets Password and causes have input mistake Password, or other people have input bad password.After entering private space establishment interface, user can complete secret according to prompting The establishment in space, or select to give cryptographic options for change, progressively carry out Information Authentication according to prompting, and then give the password forgotten for change, Or re-creating a password as the password corresponding with private space, this private space is corresponding with the password forgotten.
The private space guard method that the present embodiment provides, after either other people or user open private space, all Enter and create cryptographic interface so that other people think that this private space was not gated on, after other people or user create password, Enter different private space interfaces according to password, if this password and the private space password match the most stored, then enter The private space corresponding with this password, this private space is the private space that store the various privacy of user;If this password is therewith Before the private space that stored do not mate, then enter private space and create interface, mislead other people user further and do not open private Whether close space, cause other people cannot determine user opens private space all the time, or think that user is not turned on private all the time Close space.Use this private space protected mode, neither hide the entrance of private space, can reach again to hide user's secret Purpose, further enhancing the safety of privacy of user, and then promotes the experience of user.
It should be noted that in this article, term " includes ", " comprising " or its any other variant are intended to non-row Comprising of his property, so that include that the process of a series of key element, method, article or device not only include those key elements, and And also include other key elements being not expressly set out, or also include intrinsic for this process, method, article or device Key element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including this The process of key element, method, article or device there is also other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive above-described embodiment side Method can add the mode of required general hardware platform by software and realize, naturally it is also possible to by hardware, but a lot of in the case of The former is more preferably embodiment.Based on such understanding, prior art is done by technical scheme the most in other words The part going out contribution can embody with the form of software product, and this computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal equipment (can be mobile phone, computer, take Business device, air-conditioner, or the network equipment etc.) perform the method described in each embodiment of the present invention.
Above in conjunction with accompanying drawing, embodiments of the invention are described, but the invention is not limited in above-mentioned concrete Embodiment, above-mentioned detailed description of the invention is only schematic rather than restrictive, those of ordinary skill in the art Under the enlightenment of the present invention, in the case of without departing from present inventive concept and scope of the claimed protection, it may also be made that a lot Form, within these belong to the protection of the present invention.

Claims (10)

1. a private space protection device, it is characterised in that including:
Display module, shows that when private space is opened password creates interface;
Password authentication module, for receiving the first password of user's input and verifying;
Private space opening module, for when described first password is verified, opens the private corresponding with described first password Close space;
Private space creation module, for when described first password authentication failed, enters private space and creates interface.
2. private space protection device as claimed in claim 1, it is characterised in that described password authentication module is additionally operable to receive The first password of user's input, and judge whether to store the private space password corresponding with private space, if having stored described Private space password, then verify described first password according to described private space password.
3. private space protection device as claimed in claim 2, it is characterised in that also include:
Password recovery module, for after entering private space establishment interface, receive user's triggering gives Password Operations instruction for change, And give Password Operations command prompt user for change carry out Information Authentication according to described.
4. the private space protection device as described in any one of claim 1-3, it is characterised in that described private space opens mould Block, for when private space includes at least two, is opened at least two private space corresponding with described first password, or is opened Open and described first password private space one to one.
5. a mobile terminal, it is characterised in that include the private space protection device as described in any one of claim 1-4.
6. a private space guard method, it is characterised in that including:
Private space shows when opening that password creates interface;
Receive the first password of user's input and verify;
When described first password is verified, open the private space corresponding with described first password;
When described first password authentication failed, enter private space and create interface.
7. private space guard method as claimed in claim 6, it is characterised in that the first password of described reception user input And carry out checking and include:
Receive the first password of user's input, and judge whether to store private space password;
If having stored described private space password, then according to described private space password, described first password is verified.
8. private space guard method as claimed in claim 7, it is characterised in that
After described entrance private space creates interface, described method also includes:
Receive user's triggering gives Password Operations instruction for change;
Give Password Operations command prompt user for change carry out Information Authentication according to described.
9. the private space guard method as described in any one of claim 6-8, it is characterised in that described unlatching and described first The private space that password is corresponding includes:
When private space includes at least two, open at least two private space corresponding with described first password;Or
Open and described first password private space one to one.
10. the private space guard method as described in any one of claim 6-8, it is characterised in that by close for described private space Code is stored in local terminal or high in the clouds.
CN201610490444.7A 2016-06-28 2016-06-28 A kind of private space protective device, mobile terminal and method Active CN106156562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610490444.7A CN106156562B (en) 2016-06-28 2016-06-28 A kind of private space protective device, mobile terminal and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610490444.7A CN106156562B (en) 2016-06-28 2016-06-28 A kind of private space protective device, mobile terminal and method

Publications (2)

Publication Number Publication Date
CN106156562A true CN106156562A (en) 2016-11-23
CN106156562B CN106156562B (en) 2019-01-15

Family

ID=57350106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610490444.7A Active CN106156562B (en) 2016-06-28 2016-06-28 A kind of private space protective device, mobile terminal and method

Country Status (1)

Country Link
CN (1) CN106156562B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106775480A (en) * 2016-12-21 2017-05-31 中国航空工业集团公司雷华电子技术研究所 A kind of real-time monitoring system data recording method based on LabVIEW
CN106874786A (en) * 2017-01-19 2017-06-20 北京奇虎科技有限公司 image information storage method, device and intelligent terminal
CN106886416A (en) * 2017-03-08 2017-06-23 北京小米移动软件有限公司 Multi-User Dimension processing method and processing device
CN107392039A (en) * 2017-09-22 2017-11-24 华北理工大学 Computer hard disk data encrypting method and its device
CN109271764A (en) * 2018-08-30 2019-01-25 北京珠穆朗玛移动通信有限公司 Private data guard method, mobile terminal and storage medium
CN111709054A (en) * 2020-06-12 2020-09-25 腾讯科技(深圳)有限公司 Privacy space information access control method and device and computer equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067612A (en) * 2013-01-30 2013-04-24 广东欧珀移动通信有限公司 Private information viewing method and system based on mobile terminal equipment
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN102750497B (en) * 2012-07-20 2014-04-16 腾讯科技(深圳)有限公司 Method and device for deciphering private information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN102750497B (en) * 2012-07-20 2014-04-16 腾讯科技(深圳)有限公司 Method and device for deciphering private information
CN103067612A (en) * 2013-01-30 2013-04-24 广东欧珀移动通信有限公司 Private information viewing method and system based on mobile terminal equipment
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
喵小跳: "《知乎网》", 27 September 2015 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106775480A (en) * 2016-12-21 2017-05-31 中国航空工业集团公司雷华电子技术研究所 A kind of real-time monitoring system data recording method based on LabVIEW
CN106874786A (en) * 2017-01-19 2017-06-20 北京奇虎科技有限公司 image information storage method, device and intelligent terminal
CN106886416A (en) * 2017-03-08 2017-06-23 北京小米移动软件有限公司 Multi-User Dimension processing method and processing device
CN106886416B (en) * 2017-03-08 2020-03-17 北京小米移动软件有限公司 Multi-user spatial processing method and device
CN107392039A (en) * 2017-09-22 2017-11-24 华北理工大学 Computer hard disk data encrypting method and its device
CN107392039B (en) * 2017-09-22 2020-06-30 华北理工大学 Computer hard disk data encryption method and device
CN109271764A (en) * 2018-08-30 2019-01-25 北京珠穆朗玛移动通信有限公司 Private data guard method, mobile terminal and storage medium
CN109271764B (en) * 2018-08-30 2023-10-17 北京珠穆朗玛移动通信有限公司 Private data protection method, mobile terminal and storage medium
CN111709054A (en) * 2020-06-12 2020-09-25 腾讯科技(深圳)有限公司 Privacy space information access control method and device and computer equipment

Also Published As

Publication number Publication date
CN106156562B (en) 2019-01-15

Similar Documents

Publication Publication Date Title
CN106156562B (en) A kind of private space protective device, mobile terminal and method
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
AU2013305606B2 (en) Method for producing dynamic data structures for authentication and/or password identification
US9419966B2 (en) Method for producing dynamic data structures for authentication and/or password identification
EP1857954A1 (en) Portable electronic apparatus and recording medium for changing the access permission of an application or file upon user biometric identification
CN104216742B (en) Brush machine control method and device based on password
CN102968587B (en) A kind of electronic equipment and the method giving electronic equipment unlocking information for change
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
US20150199016A1 (en) Mobile terminal device and password input method
CN104573550A (en) Method and device for protecting data
CN104219053B (en) Method for information display, information concealing method and device
CN106453802A (en) Cipher verification method and device, and terminal
CN103645838A (en) Mobile terminal and unlocking method thereof
EP3367286A1 (en) Methods, apparatuses, computer program and recording medium for protecting information
WO2020253197A1 (en) Method and apparatus for managing virtual user identification card, terminal device and storage medium
JP2022002103A (en) Privacy protecting method and protecting device for mobile terminal and mobile terminal
CN105046127A (en) Encryption and decryption method and apparatus
CN105808107A (en) Picture processing device and method
KR100351264B1 (en) Communication terminal apparatus embedded the function generating One Time Password based on the challenge/response
CN106407788A (en) Unlocking method, unlocking apparatus, and terminal
US11442620B2 (en) Method and device providing multimodal input mechanism
CN106650397B (en) password generation method and device based on pattern lock and terminal
KR20150009660A (en) Smart Phone for possibling a Cryptography-Input of revenge and Drive Method of the Same
WO2016028626A1 (en) Method for producing dynamic data structures for authentication and/or password identification
CN105608350A (en) Screen input keyboard generation method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant