CN106156562A - A kind of private space protection device, mobile terminal and method - Google Patents
A kind of private space protection device, mobile terminal and method Download PDFInfo
- Publication number
- CN106156562A CN106156562A CN201610490444.7A CN201610490444A CN106156562A CN 106156562 A CN106156562 A CN 106156562A CN 201610490444 A CN201610490444 A CN 201610490444A CN 106156562 A CN106156562 A CN 106156562A
- Authority
- CN
- China
- Prior art keywords
- password
- private space
- user
- private
- space
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of private space protection device, mobile terminal and method, described method includes: when private space is opened, first display to the user that password creates interface, then receive the first password of user's input and verify, after first password is verified, open the private space corresponding with this first password, when first password checking is not passed through, the private space establishment interface prompt user being directly entered routine completes private space establishment, whether make other people cannot determine this mobile terminal holder opens private space, thus reach to hide whether user opens the purpose of private space, namely the private space guard method provided by the present invention, while not hiding private space entrance, also privacy of user can be hidden, further enhance the safety of privacy of user, and then promote the experience of user.
Description
Technical field
The present invention relates to network communication technology field, more particularly, it relates to a kind of private space protection device, movement are eventually
End and method.
Background technology
At present, on mobile terminal, the privacy of user data of storage get more and more, and need private space to hide privacy of user.
Existing private space implementation, is all the private data encrypting user by arranging password, checks private data every time
Being required for inputting correct password and could enter private space, the password of input error then can not enter private space.But, only
Will be at private space entrance prompting input password, it is possible to determine whether this user opens private space, and then determine this user
Whether there is privacy.Therefore, existing private space implementation can not well hide privacy of user, thus reduces privacy of user
Safety.
Summary of the invention
The technical problem to be solved in the present invention is that existing private space protected mode safety is poor, thus affects use
Family is experienced, for this technical problem, it is provided that a kind of private space protection device, mobile terminal and method.
For solving above-mentioned technical problem, the embodiment of the present invention provides a private space protection device, including:
Display module, shows that when private space is opened password creates interface;
Password authentication module, for receiving the first password of user's input and verifying;
Private space opening module, for when described first password is verified, opens corresponding with described first password
Private space;
Private space creation module, for when described first password authentication failed, enters private space and creates interface.
Wherein, described password authentication module be additionally operable to receive user input first password, and judge whether to store with
The private space password that private space is corresponding, if having stored described private space password, then according to described private space password pair
Described first password is verified.
Wherein, also include:
Password recovery module, for after entering private space establishment interface, receive user's triggering gives Password Operations for change
Instruction, and give Password Operations command prompt user for change carry out Information Authentication according to described.
Wherein, described private space opening module, for when private space includes at least two, is opened and described first
At least two private space that password is corresponding, or open and described first password private space one to one.
The invention provides a kind of mobile terminal, including private space protection device as above.
Present invention also offers a kind of private space guard method, including:
Private space shows when opening that password creates interface;
Receive the first password of user's input and verify;
When described first password is verified, open the private space corresponding with described first password;
When described first password authentication failed, enter private space and create interface.
Wherein, the described first password receiving user's input carry out checking and include:
Receive the first password of user's input, and judge whether to store private space password;
If having stored described private space password, then according to described private space password, described first password is tested
Card.
Wherein, after described entrance private space creates interface, described method also includes:
Receive user's triggering gives Password Operations instruction for change;
Give Password Operations command prompt user for change carry out Information Authentication according to described.
Wherein, the private space that described unlatching is corresponding with described first password includes:
When private space includes at least two, open at least two private space corresponding with described first password;Or
Open and described first password private space one to one.
Wherein, described private space password is stored in local terminal or high in the clouds.
Beneficial effect
Private space protection device, mobile terminal and the method that the embodiment of the present invention proposes, when private space is opened, first
First display to the user that password creates interface, then receive the first password of user's input and verify, when first password is verified
By rear, open the private space corresponding with this first password, when first password checking is not passed through, be directly entered the private of routine
Close space creates interface prompt user and completes private space establishment so that other people cannot determine whether this mobile terminal holder opens
Open private space, thus reach to hide whether user opens the technique effect of private space, namely the private provided by the present invention
Close space protection method, while not hiding private space entrance, also can hide privacy of user, further enhance user
The safety of privacy, and then promote the experience of user.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention;
The private space protection device schematic diagram that Fig. 2 provides for first embodiment of the invention;
The private space interface schematic diagram that first password that Fig. 3 provides for first embodiment of the invention is corresponding;
The pattern password that Fig. 4 provides for first embodiment of the invention creates interface schematic diagram;
The numerical ciphers that Fig. 5 provides for first embodiment of the invention creates interface schematic diagram;
The password that Fig. 6 provides for first embodiment of the invention creates interface schematic diagram;
The private space that Fig. 7 provides for first embodiment of the invention creates interface schematic diagram;
The mobile terminal schematic diagram that Fig. 8 provides for second embodiment of the invention;
The private space guard method flow chart that Fig. 9 provides for third embodiment of the invention;
The private space guard method flow chart that Figure 10 provides for fourth embodiment of the invention.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use
For representing the suffix explanation only for the beneficially present invention of such as " module " or " unit " of element, itself is the most special
Fixed meaning.Therefore, " module " can mixedly use with " unit ".
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can include such as moving
The mobile end of phone, smart phone, notebook computer, PDA (personal digital assistant), PAD (panel computer), guider etc.
The fixed terminal of end and such as numeral TV, desk computer etc..Hereinafter it is assumed that terminal is mobile terminal.But, this area
Skilled artisan will appreciate that, in addition to being used in particular for the element of mobile purpose, also being able to according to the structure of the present embodiment should
Terminal for fixed type.
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention.
Mobile terminal 100 include A/V (audio/video) input block 120, user input unit 130, output unit 150,
Memorizer 160, interface unit 170, controller 180 and power subsystem 190 etc..Fig. 1 shows the movement with various assembly
Terminal, it should be understood that be not required for implementing all assemblies illustrated.Can alternatively implement more or less of group
Part.Will be discussed in more detail below the element of mobile terminal.
A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can include mike 122,
Mike 122 can receive via mike in telephone calling model, logging mode, speech recognition mode etc. operational mode
Sound (voice data), and can be voice data by such acoustic processing.Audio frequency (voice) data after process are permissible
In the case of telephone calling model, be converted to can be sent to the form of mobile communication base station via mobile communication module 112 defeated
Go out.Mike 122 can be implemented various types of noise elimination (or suppression) algorithm and receive and transmission to eliminate (or suppression)
The noise produced during audio signal or interference.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user's input
Plant operation.User input unit 130 allows user to input various types of information, and can include keyboard, metal dome, touch
Plate (such as, detection due to touched and cause resistance, pressure, the sensitive component of change of electric capacity etc.), roller, rocking bar etc.
Deng.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch screen can be formed.
Interface unit 170 is used as at least one external device (ED) and is connected, with mobile terminal 100, the interface that can pass through.Such as,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, for connect have the port of device of identification module, audio frequency input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be that storage is for verifying that user uses each of mobile terminal 100
Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included
Etc..It addition, the device (hereinafter referred to as " identifying device ") with identification module can be to take the form of smart card, therefore, know
Other device can be connected with mobile terminal 100 via port or other attachment means.Interface unit 170 may be used for receive from
The input (such as, data message, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100
One or more elements or may be used between mobile terminal and external device (ED) transmit data.
It addition, when mobile terminal 100 is connected with external base, interface unit 170 can serve as allowing electricity by it
Power provides the path of mobile terminal 100 from base or can serve as allowing from the various command signals of base input by it
It is transferred to the path of mobile terminal.May serve as identifying that mobile terminal is from various command signals or the electric power of base input
The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio frequency and/or tactile manner
Go out signal (such as, audio signal, video signal, alarm signal, vibration signal etc.).
Output unit 150 can include display unit 151 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 100.Such as, it is in electricity when mobile terminal 100
During words call mode, display unit 151 can show and call or other (such as, text messaging, multimedia file that communicate
Download etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern
Or during image capture mode, display unit 151 can show image and/or the image of reception of capture, illustrate video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad the most superposed on one another with formed touch screen time, display unit
151 can serve as input equipment and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
A kind of.Some in these display may be constructed such that transparence is watched from outside with permission user, and this is properly termed as transparent
Display, typical transparent display can for example, TOLED (transparent organic light emitting diode) display etc..According to specific
The embodiment wanted, mobile terminal 100 can include two or more display units (or other display device), such as, move
Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detection and touches
Input pressure and touch input position and touch input area.
Memorizer 160 can store the process performed by controller 180 and the software program controlling operation etc., or can
Temporarily to store the data (such as, telephone directory, message, still image, video etc.) that oneself maybe will export through output.And
And, memorizer 160 can with storage about when touch be applied to touch screen time the vibration of various modes of output and audio signal
Data.
Memorizer 160 can include that the storage medium of at least one type, described storage medium include flash memory, hard disk, many
Media card, card-type memorizer (such as, SD or DX memorizer etc.), random access storage device (RAM), static random-access store
Device (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..And, mobile terminal 100 can be connected execution memorizer with by network
The network storage device cooperation of the storage function of 160.
Controller 180 generally controls the overall operation of mobile terminal.Such as, controller 180 performs and voice call, data
Control that communication etc. is relevant and process.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Suitable electric power needed for part and assembly.
Various embodiment described herein can be to use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implemented.Implementing for hardware, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Program gate array (FPGA), processor, controller, microcontroller, microprocessor, be designed to perform function described herein
At least one in electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180.
Software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation
Software module is implemented.Software code can be come by the software application (or program) write with any suitable programming language
Implementing, software code can be stored in memorizer 160 and be performed by controller 180.
So far, oneself is through describing mobile terminal according to its function.Below, for the sake of brevity, will describe such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is as showing
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and is not limited to slide type mobile terminal.
It is described in detail below by way of specific embodiment.
First embodiment
Present embodiments providing a kind of private space protection device, the application scenarios of this private space protection device is,
When at least one private space of user setup, its objective is not want to allow other people know some privacy of oneself, do not want to allow him
People knows that oneself is provided with private space, based under this premise, by the private space protection device of this enforcement offer, it is possible to
In the case of user setup private space, whether make other people cannot determine user opens private space, namely do not hiding secret
While space entry, whether also can make other people cannot determine user opens private space, hide the privacy of user, thus strengthen
The safety of privacy of user, and then promote the experience of user.
Refer to the private space protection device schematic diagram that Fig. 2, Fig. 2 provide, this private space protection dress for the present embodiment
Put and include:
Display module 21, shows that when private space is opened password creates interface;
Password authentication module 22, for receiving the first password of user's input and verifying;
Private space opening module 23, for when first password is verified, opens the secret corresponding with first password
Space.
Password authentication module 22 is additionally operable to receive the first password of user's input, and judges whether to store and private space
Corresponding private space password, if having stored private space password, then verifies first password according to private space password.
Private space creation module 24, for when described first password authentication failed, enters private space and creates interface.
Further, this private space protection device also includes:
Password recovery module 25, for after entering private space establishment interface, receive user's triggering gives password behaviour for change
Instruct, and carry out Information Authentication according to giving Password Operations command prompt user for change.
Aforementioned private space opening module 23 is additionally operable to when private space includes at least two, opens and first password pair
At least two private space answered, or open and first password private space one to one.
The private space protection device provided by this enforcement, it is possible in the case of user setup private space, make him
People cannot determine whether user opens private space, namely while not hiding private space entrance, also can make other people cannot
Determine whether user opens private space, hide the privacy of user, thus strengthen the safety of privacy of user, and then promote user
Experience.
Concrete, the function that above-mentioned each functional module performs can be realized by the fractional hardware in Fig. 1, and retouches follow-up
Illustrating various embodiments of the present invention with particular hardware in stating, certainly, the function that each hardware performs also can be by above-mentioned functions mould
Block realizes.The function of above-mentioned each functional module is specifically realized by following hardware:
The password of display module 21 display is created interface and can be realized by display unit 151, display unit 151 display terminal
Current password creates interface for users and checks.Display unit 151 can serve as input equipment and output device, and display is correlated with
User interface (UI) or graphic user interface (GUI).This display unit 151 can include LCDs (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
A kind of.
Password authentication module 22 is when receiving the first password of user's input, and user can input password by touch screen, its
In, touch screen is display unit 151 and the structure of touch pad formation the most superposed on one another, and touch pad is that user inputs list
One in unit 130, can allow for user by this user input unit 130 and inputs various types of information.Password authentification mould
After block 22 receives the first password of user's input, this first password is sent to controller 180 and carries out password authentification process, with
Judge whether this first password exists the private space of correspondence.
Private space opening module 23 is opened the function of private space and can be realized by controller 180, and controller is to the
After one password authentification is passed through, directly open the private space corresponding with first password.Accordingly, private space creation module 24 institute
The function realized can be completed by controller 180 equally, and controller 180, after first password authentication failed, is directly entered secret
Establishment interface, space, guides user to carry out the establishment of private space by display unit 151 so that other people cannot determine user
Whether open private space, if having privacy, further promote the safety of privacy of user.
Further, the function of password recovery module 25 also can be realized by controller 180, when controller 180 passes through
After display unit 151 points out user to enter private space establishment interface, display unit 151 shows whole establishment circle of private space
Face, user trigger in this establishment interface give for change Password Operations instruction, controller 180 according to this instruction by display unit 151
Prompting user carries out Information Authentication step by step, and then creates new password or show that user forgets by display unit 151
Password.
When user triggers private space entrance by display unit 151, controller 180 recalls password and creates interface and pass through
Display unit 151 shows, and points out user to create password, and user, after password establishment interface creates password by touch screen, is controlled
This password will be verified by device 180 processed, after being verified, show that the secret that first password is corresponding is empty by display unit 151
Between, end user checks various privacy in private space, specifically refers to the first password that Fig. 3, Fig. 3 provide for the present embodiment
Corresponding private space interface schematic diagram, the content shown in figure is only used for explaining the present invention, is not intended to invention
Restriction;If checking is not passed through, show that private space creates at the beginning of interface, namely display private space by display unit 151
Beginningization interface, initializes behind interface when entering private space, and other people will be considered that user does not open private space, accordingly,
The most there is not privacy, by this private space protection device, greatly improve crypticity and the safety of user's private space.
Concrete, as user or after other people enter private space entrance, controller 180 is shown by display unit 151
Showing that password creates interface, prompting user creates password.Need to understand, display password creates the purpose at interface and is, when other people enter
After entering private space entrance, if being shown that interface for password input, first will be considered that this user has turned on private space, this secret
Space has privacy of user so that the safety of private space is substantially reduced;On the contrary, private space entrance is entered when other people
After, if being shown that password to create interface, prompting user creates a password, first will be considered that this private space is in initialization
State, needs to create a password, and then creates a private space, it is thus regarded that this user does not also open private space, yet
There is not privacy, greatly improve the safety of private space, simultaneously without hiding private space entrance, improve operation multiple
Miscellaneous degree.
Controller 180 is when pointing out user to create password by display unit 151, and this password can be pattern password, refer to
The cipher modes well known to those skilled in the art such as stricture of vagina password, vocal print password, face password, numerical ciphers, mixed cipher, its
In, mixed cipher refers at least two in numeral, character, letter is mixed the password generated.
In a kind of embodiment, as a example by pattern password, referring to Fig. 4, Fig. 4 is that pattern password creates interface schematic diagram,
This password creates interface " please draw a design password " displayed above, and user (include user or other people) draws figure according to prompting
Case password, user input unit 130 captures the pattern password of user's input, and this password is sent to controller 180 carries out
Checking.
In a kind of embodiment, as a example by numerical ciphers, refer to the numerical ciphers wound that Fig. 5, Fig. 5 provide for the present embodiment
Building interface schematic diagram, this password creates interface " please create numerical ciphers " displayed above, and user is according to prompting input 4 numbers
Word, the numerical ciphers that user inputs is sent to controller 180 and verifies by user input unit 130, this group numeral include but
Being not limited at least two, digit is the most, and safe class is the highest, and the safety of privacy of user is the highest.
In a kind of embodiment, as a example by finger-print cipher, if creating cryptographic interface prompting " to ask typing fingerprint ", then user's root
According to prompting typing fingerprint.
In another embodiment, in conjunction with above-mentioned three kinds of embodiments, user one of which is selected to carry out password establishment,
Specifically referring to Fig. 6, Fig. 6 and create interface schematic diagram for the password that the present embodiment provides, this password establishment interface is displayed above " please
Password is selected to create type ", thereunder three kinds of passwords of display create types, such as numerical ciphers, pattern password, finger-print cipher,
According to the selection that user is different, controller 180 jumps to different interfaces, and is shown by display unit 151, such as,
If user-selected number word password, then enter numerical ciphers as shown in Figure 5 and create interface;If user selects pattern password, then enter
Enter password as indicated at 4 and create interface.
After user is according to prompting input password (i.e. first password), controller 180 receives the first password of user's input
Verifying this password afterwards, concrete, controller 180 receives the first password of user's input, and judges whether in storage
Device 160 storing private space password, if having stored private space password, then according to this private space password, first password being entered
Row checking;If not storing private space password, then it is directly entered private space establishment interface and guides user to complete private space wound
Build process.
When verifying first password according to this private space password, its concrete proof procedure is as follows:
First password is mated with the private space password stored, if first password and private space password match
Success, then be verified, and controller 180 is opened the private space corresponding with this password and presents to use by display unit 151
Family;If first password and the failure of private space password match, then verifying and do not pass through, controller 180 is opened private space and is created boundary
Face, presents private space by display unit 151 for user and initializes scene, and then user further thinks that user is also
Do not open private space, the most there is not privacy.On the contrary, if memorizer 160 does not stores private space password, then controller 180
Think that private space is never opened, create interface automatically into private space, present private space for user and initialize field
Scape, and using the password that creates before as private space password, certainly, it is empty as secret that user also can re-create a password
Between password.
More specifically, the controller 180 private space password that prestored in memorizer 160 is corresponding with private space
Table, mates first password with the private space password of storage in corresponding table, and when the match is successful, first password is private
Close space password, opens the private space corresponding with first password;When it fails to match, likewise enter private space and create boundary
Face.After entering private space establishment interface, user can be triggered by user input unit 130 give Password Operations instruction for change, moves
Dynamic terminal receive this give for change Password Operations instruction, and according to this give for change Password Operations instruction point out user by display unit 151
Carry out Information Authentication.Wherein, memorizer 160 can include that the storage medium of at least one type, described storage medium include dodging
Deposit, hard disk, multimedia card, card-type memorizer (such as, SD or DX memorizer etc.), random access storage device (RAM), static with
Machine access memorizer (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), able to programme
Read memorizer (PROM), magnetic storage, disk, CD etc..
After entering private space establishment interface, the content that user presents according to display unit 151, input list by user
Unit 130 inputs corresponding information, and after input, controller 180 shows next interface by display unit 151, points out user
Input other information, progressively guide user to complete private space and create process.Such as, referring to Fig. 7, Fig. 7 is that the present embodiment carries
The private space of confession creates interface schematic diagram, in this private space creates interface, including opening private space option, arranging peace
Full problem input frame, give the functions such as cryptographic options for change, and point out " kindly remember it password and safety problem answer ", each function setting
Purpose is specific as follows:
Open private space option for selecting safety problem user by user input unit 130, and input right
After the answer answered, trigger this unlatching private space option and can enter next interface is set or to be directly entered newly created secret empty
Between;
Safety problem input frame is set after forgetting Password as user, during giving password for change, user can be pointed out
Recall the password forgotten according to this safety problem, or after user answers correct safety problem, controller 180 is directly from storage
Device 160 obtain the password forgotten and is shown to user by display unit 151, or whether being that secret is empty as checking user
Between corresponding user, in the case of verifying that this user be private space correspondence user, prompting user re-creates a password, this
Password is the second password;Wherein, safety problem is by user setup, and user can directly select a problem, it is possible to self-defined one
Problem.
Give cryptographic options for change after forgetting Password as user, can be triggered this and give cryptographic options for change, then prompting user's root
Recall, according to safety problem and other verification modes, the password forgotten, or pass through in safety problem and other verification modes
After, from memorizer 160, find the password forgotten and be shown to user, or passing through in safety problem and other verification modes
After, re-create a password as private space password.
Re-create a password as private space password after, controller 180 by this private space password replace deposit
The password that in reservoir 160, the private space of storage is corresponding, namely after user forgets Password, re-created the second password, control
Device 180 processed controls memorizer 160 and second password is replaced original first password so that the second password is corresponding with private space,
Wherein, corresponding with first password before this private space.When user inputs the second password next time, controller 180 is direct
Control display unit 151 and enter the private space that first password is corresponding.
In order to ensure that user's private space password cannot will not be given for change because of forgetting, each secret that mobile terminal will create
Space password is stored in memorizer 160, and when carrying out password authentification next time, the secret directly and stored in memorizer 160 is empty
Between password mate.It may be noted that the corresponding table of private space password and the private space of storage in memorizer 160, it should enter
The dynamic renewal of line period, or the most dynamically update, to ensure that user just may be used after inputting password whenever creating password
Open the private space of correspondence, it is to avoid reset private space password because of forgetting Password, the most corresponding table do not updated,
Corresponding private space is caused to open.Additionally, private space password is stored in memorizer 160 and (is i.e. stored in movement by removing
Terminal local), it is possible to private space password is stored in high in the clouds, when forgetting Password, directly can obtain from high in the clouds and forget
Password, so that user forgets brought inconvenience without having to worry about password.
Further, after first password is verified, the private space that first password is corresponding opened by controller 180, should
Private space can be one, it is also possible to is multiple, namely first password and private space one_to_one corresponding, or one-to-many is corresponding,
Each private space is distinguished by password.When private space includes at least two, open at least two corresponding with first password
Individual private space, or open and first password private space one to one.It may be noted that one_to_one corresponding here refer to one close
The only corresponding private space of code, aforesaid plurality of refers to two or more.Preferably, a password and a secret sky
Between corresponding, distinguish each private space by password, and be that private space sets safe class by the degree that is difficult to of password.
Concrete, when first password is mated with multiple private space passwords, if finding first password and wherein
One private space password is corresponding, and the corresponding multiple private spaces of this private space password, then can be opened by first password
Multiple private spaces;If finding, first password is corresponding with one of them private space password, and this private space password is the most corresponding
One private space, then can open a private space by first password, empty compared to a multiple secret of Password Management
Between, this man-to-man way to manage more can guarantee that privacy of user, even if one of them password is decoded by other people, but other people are only
Can obtain the private space under this password, and the private space of other Password Managements still safety, and also by the difficulty of password
It is that each private space arranges different safe classes with degree, further ensures privacy of user.
Additionally, private space and private space password correspondence table are periodically screened by private space protection device, according to
The conditions such as file size, use frequency delete useless private space, the private space of such as other people establishment or maloperation
The private space created, thus save mobile terminal internal memory, and improve password authentification efficiency.
The private space protection device provided by embodiment, determines whether to there is corresponding private according to the password of input
Close space, if there is corresponding private space, then opening the private space of correspondence, if there is not the private space of correspondence, then entering
Enter private space and create interface so that other people cannot determine whether the user of mobile terminal opens secret when using mobile terminal
Space, thus reach to hide whether user opens the effect of private space, use the private space protection dress that the present embodiment provides
Put, both without hiding private space entrance, can reach again to hide the purpose of private space, further enhance privacy of user
Safety.
Second embodiment
Refer to the mobile terminal schematic diagram that Fig. 8, Fig. 8 provide for the present embodiment.This mobile terminal includes first embodiment
In private space protection device 81, for the related description of private space protection device 81, the present embodiment will be the most superfluous
State, specifically refer to first embodiment.Power subsystem 190 in mobile terminal receives external electrical under the control of controller 180
Power or internal power also provide the suitable electric power operated needed for each element and assembly, in the case, the secret in mobile terminal
Space protection device 81 is verified by the password creating user, to determine entrance which interface of private space, if checking
Pass through, then open the private space corresponding with this password, if authentication failed, then enter private space and create interface.Thus, can protect
Demonstrate,prove other people and cannot confirm whether user opens private space, and then cannot confirm whether user has privacy, further improve
The safety of privacy of user.
When private space protection device 81 creates type using vocal print password as password, mobile terminal is inputted by A/V
Unit 120 receives the sound of user's input, and A/V input block 120 includes mike 122, and mike 122 can be in telephone relation
Pattern, logging mode, speech recognition mode etc. operational mode receives sound (voice data), and can be by such sound
Sound is processed as voice data, and audio frequency (voice) data after then processing send to controller 180, controller 180 complete
Voice match, if the match is successful, then enters the private space corresponding with this vocal print password, if it fails to match, then enters secret empty
Between create interface.Mike 122 can be implemented various types of noise elimination (or suppression) algorithm and connect to eliminate (or suppression)
The noise produced during receiving and send audio signal or interference.
When private space protection device 81 creates type using face password as password, mobile terminal calls photographic head and sweeps
Retouching user face, and process the figure of scanning, the figure after processing mates with the figure stored before, if
It is made into merit, then enters the private space corresponding with this face password, if it fails to match, then enter private space and create interface.
When private space protection device 81 creates type using finger-print cipher as password, mobile terminal is inputted by user
Sensor on unit 130 is drawn finger print information and processes, the finger print information after processing and the fingerprint image stored before
Shape is mated, if the match is successful, then enters the private space corresponding with this finger-print cipher, if it fails to match, then enters secret
Establishment interface, space.Sensor as aforementioned includes but not limited to capacitance type sensor, optical pickocff.
The mobile terminal provided by this enforcement, determines which kind of boundary entering private space according to the password of user's input
Face, the password the most even inputted is correct, then enter the private space that this password is corresponding, if the code error of input, then enters private
Establishment interface, close space, thus reach to hide whether user opens the technique effect of private space.
3rd embodiment
As it is shown in figure 9, the private space guard method flow chart that Fig. 9 provides for the present embodiment, the private that the present embodiment provides
The close space protection method private space protection device corresponding with first embodiment is corresponding, therefore no longer does partial content specifically
Bright, illustrate the relevant portion referring to first embodiment.The method comprises the following steps:
S91, private space shows when opening that password creates interface.
Concrete, as user or after other people enter private space entrance, first show password establishment interface, and point out
User creates password.Need to understand, display password creates the purpose at interface and is, after other people enter private space entrance, if
It is shown that interface for password input, first will be considered that this user has turned on private space, this private space has privacy of user,
The safety making private space is substantially reduced;On the contrary, after other people enter private space entrance, if being shown that password wound
Building interface, prompting user creates a password, first will be considered that this private space is in init state, need to create one close
Code, and then create a private space, it is thus regarded that this user does not also open private space, the most there is not privacy, greatly carry
Rise the safety of private space, simultaneously without hiding private space entrance, improve operation complexity.
Point out user create password time, this password can be pattern password, finger-print cipher, vocal print password, face password,
The cipher mode well known to those skilled in the art such as numerical ciphers, mixed cipher, wherein, mixed cipher refer to by numeral, character,
The password that at least two mixing in letter generates.Or, creating interface at password, prompting user selects to use which kind of cipher type
Type, the password type selected according to user enters corresponding interface and completes password establishment.
S92, receives the first password of user's input and verifies.
Concrete, while receiving first password, it may be judged whether stored private space password, if it is empty to have stored secret
Between password, then according to this private space password, first password is verified;If not storing private space password, then it is directly entered
Private space creates interface and guides user to complete private space establishment process.Described private space password can be stored in local terminal or
High in the clouds.
More specifically, when verifying first password according to this private space password, its concrete proof procedure is: will
First password mates with the private space password stored, if first password and the success of private space password match, then tests
Card passes through, and opens the private space corresponding with this password and presents to user;If first password loses with private space password match
Lose, then verify and do not pass through, enter private space and create interface, present private space for user and initialize scene, then use
Person further thinks that user does not open private space, the most there is not privacy.On the contrary, empty if mobile terminal does not stores secret
Between password, then it is assumed that private space is never opened, automatically into private space create interface, present private space for user
Initialize scene, and using the password that creates before as private space password, certainly, user also can re-create a password and make
For private space password.
After entering private space establishment interface, user inputs corresponding information according to the content presented, after input,
Show that next interface, prompting user input other information, progressively guide user to complete private space and create process;Or progressively draw
Lead user and carry out Information Authentication, to give the password forgotten for change or to re-create password.
S93, when described first password is verified, opens the private space corresponding with described first password.
Concrete, after opening the private space that first password is corresponding, this private space can be one, it is also possible to is many
Individual, namely first password and private space one_to_one corresponding, or one-to-many is corresponding, distinguishes each private space by password.Work as private
When close space includes at least two, open at least two private space corresponding with first password, or open and first password one
The private space of one correspondence.It may be noted that one_to_one corresponding here refers to the only corresponding private space of a password, aforesaid plurality of
Refer to two or more.Preferably, a password is corresponding with a private space, distinguishes each secret by password
Space, and be that private space sets safe class by the degree that is difficult to of password.
More specifically, when first password is mated with multiple private space passwords, if find first password and its
In private space password corresponding, and corresponding multiple private spaces of this private space password, then can be beaten by first password
Open multiple private space;If finding, first password is corresponding with one of them private space password, and this private space password is the most right
Answer a private space, then can open a private space, compared to a multiple secret of Password Management by first password
Space, this man-to-man way to manage more can guarantee that privacy of user, even if one of them password is decoded by other people, but other people
It is only capable of obtaining the private space under this password, and the private space of other Password Managements still safety, and also by password
Being difficult to degree is that each private space arranges different safe classes, further ensures privacy of user.
S94, when described first password authentication failed, enters private space and creates interface.
Further, receiving the first password of user's input and after verifying, if first password authentication failed, then
Entering private space and create interface, then receive user's triggering gives Password Operations instruction for change, and gives Password Operations for change according to this
Command prompt user carries out Information Authentication.
Additionally, also can periodically private space and private space password correspondence table be screened, according to file size, use
The conditions such as frequency delete useless private space, and private space or the secret of maloperation establishment that such as other people create are empty
Between, thus save mobile terminal internal memory, and improve password authentification efficiency.
Enforcement based on above-mentioned steps, determines whether to there is corresponding private space by the password of input, if existing
Corresponding private space, then open the private space of correspondence, if there is not the private space of correspondence, then enters private space and creates
Interface so that other people cannot determine whether the user of mobile terminal opens private space when using mobile terminal, thus reaches
Whether hiding user opens the effect of private space.
4th embodiment
The present embodiment provides based on phonetics transfer method by the 3rd embodiment, opens flow process as field with private space entirety
The present invention will be described for scape, specifically refers to the private space guard method flow chart that Figure 10, Figure 10 provide for the present embodiment.
Detailed process is as follows:
S101, enters private space entrance.
Concrete, private space entrance is password and creates interface, when opening private space, is shown to the interface of user i.e.
Interface is created for password.This password creates in interface, the password type of establishment include but not limited to finger-print cipher, vocal print password,
Face password, numerical ciphers, mixed cipher, pattern password.
S102, receives the password of user's input.
S103, it may be judged whether there is private space, if there is private space, then performs S104 step, if there is not secret
Space, then perform S107 step.
Concrete, mobile phone judges that inside has stored private space password, the most if having stored private space password.Then think
There is private space.Certainly, it is possible to judge internal other information whether storing private space, such as safety problem, telephone number
Deng, if having stored, then it is assumed that there is private space, otherwise, do not exist.
S104, password active user inputted mates with the private space password of storage in mobile phone successively.
Concrete, the private space of usual user setup has multiple, when user setup at least two private space, each
The corresponding private space password of private space, or the corresponding private space password of at least two private space, in mobile phone
Storage have multiple private space password, accordingly, it would be desirable to the password that user is currently entered successively with storage multiple private spaces
Password mates.
S105, it is judged that the password of input is the most successful with certain private space password match, if the match is successful, then performs S106
Step, if it fails to match, then performs S107 step.
S106, opens the private space corresponding with this password.
Concrete, after opening this private space, user can carry out private information and check or the operation such as storage.
S107, enters private space and creates interface.
Concrete, enter private space and create interface and there are two kinds of situations, one is never to open secret before user
Space, causes the information not storing any mark private space inside mobile terminal, and therefore, mobile terminal enters private space
After creating interface, user is guided to create private space.Concrete, if user never opened private space, when using for the first time
Then can enter private space and create interface.Another kind is Password Input mistake, and such as, user forgets Password and causes have input mistake
Password, or other people have input bad password.After entering private space establishment interface, user can complete secret according to prompting
The establishment in space, or select to give cryptographic options for change, progressively carry out Information Authentication according to prompting, and then give the password forgotten for change,
Or re-creating a password as the password corresponding with private space, this private space is corresponding with the password forgotten.
The private space guard method that the present embodiment provides, after either other people or user open private space, all
Enter and create cryptographic interface so that other people think that this private space was not gated on, after other people or user create password,
Enter different private space interfaces according to password, if this password and the private space password match the most stored, then enter
The private space corresponding with this password, this private space is the private space that store the various privacy of user;If this password is therewith
Before the private space that stored do not mate, then enter private space and create interface, mislead other people user further and do not open private
Whether close space, cause other people cannot determine user opens private space all the time, or think that user is not turned on private all the time
Close space.Use this private space protected mode, neither hide the entrance of private space, can reach again to hide user's secret
Purpose, further enhancing the safety of privacy of user, and then promotes the experience of user.
It should be noted that in this article, term " includes ", " comprising " or its any other variant are intended to non-row
Comprising of his property, so that include that the process of a series of key element, method, article or device not only include those key elements, and
And also include other key elements being not expressly set out, or also include intrinsic for this process, method, article or device
Key element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including this
The process of key element, method, article or device there is also other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive above-described embodiment side
Method can add the mode of required general hardware platform by software and realize, naturally it is also possible to by hardware, but a lot of in the case of
The former is more preferably embodiment.Based on such understanding, prior art is done by technical scheme the most in other words
The part going out contribution can embody with the form of software product, and this computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal equipment (can be mobile phone, computer, take
Business device, air-conditioner, or the network equipment etc.) perform the method described in each embodiment of the present invention.
Above in conjunction with accompanying drawing, embodiments of the invention are described, but the invention is not limited in above-mentioned concrete
Embodiment, above-mentioned detailed description of the invention is only schematic rather than restrictive, those of ordinary skill in the art
Under the enlightenment of the present invention, in the case of without departing from present inventive concept and scope of the claimed protection, it may also be made that a lot
Form, within these belong to the protection of the present invention.
Claims (10)
1. a private space protection device, it is characterised in that including:
Display module, shows that when private space is opened password creates interface;
Password authentication module, for receiving the first password of user's input and verifying;
Private space opening module, for when described first password is verified, opens the private corresponding with described first password
Close space;
Private space creation module, for when described first password authentication failed, enters private space and creates interface.
2. private space protection device as claimed in claim 1, it is characterised in that described password authentication module is additionally operable to receive
The first password of user's input, and judge whether to store the private space password corresponding with private space, if having stored described
Private space password, then verify described first password according to described private space password.
3. private space protection device as claimed in claim 2, it is characterised in that also include:
Password recovery module, for after entering private space establishment interface, receive user's triggering gives Password Operations instruction for change,
And give Password Operations command prompt user for change carry out Information Authentication according to described.
4. the private space protection device as described in any one of claim 1-3, it is characterised in that described private space opens mould
Block, for when private space includes at least two, is opened at least two private space corresponding with described first password, or is opened
Open and described first password private space one to one.
5. a mobile terminal, it is characterised in that include the private space protection device as described in any one of claim 1-4.
6. a private space guard method, it is characterised in that including:
Private space shows when opening that password creates interface;
Receive the first password of user's input and verify;
When described first password is verified, open the private space corresponding with described first password;
When described first password authentication failed, enter private space and create interface.
7. private space guard method as claimed in claim 6, it is characterised in that the first password of described reception user input
And carry out checking and include:
Receive the first password of user's input, and judge whether to store private space password;
If having stored described private space password, then according to described private space password, described first password is verified.
8. private space guard method as claimed in claim 7, it is characterised in that
After described entrance private space creates interface, described method also includes:
Receive user's triggering gives Password Operations instruction for change;
Give Password Operations command prompt user for change carry out Information Authentication according to described.
9. the private space guard method as described in any one of claim 6-8, it is characterised in that described unlatching and described first
The private space that password is corresponding includes:
When private space includes at least two, open at least two private space corresponding with described first password;Or
Open and described first password private space one to one.
10. the private space guard method as described in any one of claim 6-8, it is characterised in that by close for described private space
Code is stored in local terminal or high in the clouds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610490444.7A CN106156562B (en) | 2016-06-28 | 2016-06-28 | A kind of private space protective device, mobile terminal and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610490444.7A CN106156562B (en) | 2016-06-28 | 2016-06-28 | A kind of private space protective device, mobile terminal and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106156562A true CN106156562A (en) | 2016-11-23 |
CN106156562B CN106156562B (en) | 2019-01-15 |
Family
ID=57350106
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610490444.7A Active CN106156562B (en) | 2016-06-28 | 2016-06-28 | A kind of private space protective device, mobile terminal and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106156562B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106775480A (en) * | 2016-12-21 | 2017-05-31 | 中国航空工业集团公司雷华电子技术研究所 | A kind of real-time monitoring system data recording method based on LabVIEW |
CN106874786A (en) * | 2017-01-19 | 2017-06-20 | 北京奇虎科技有限公司 | image information storage method, device and intelligent terminal |
CN106886416A (en) * | 2017-03-08 | 2017-06-23 | 北京小米移动软件有限公司 | Multi-User Dimension processing method and processing device |
CN107392039A (en) * | 2017-09-22 | 2017-11-24 | 华北理工大学 | Computer hard disk data encrypting method and its device |
CN109271764A (en) * | 2018-08-30 | 2019-01-25 | 北京珠穆朗玛移动通信有限公司 | Private data guard method, mobile terminal and storage medium |
CN111709054A (en) * | 2020-06-12 | 2020-09-25 | 腾讯科技(深圳)有限公司 | Privacy space information access control method and device and computer equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067612A (en) * | 2013-01-30 | 2013-04-24 | 广东欧珀移动通信有限公司 | Private information viewing method and system based on mobile terminal equipment |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103366105A (en) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal for implementing private space |
CN102750497B (en) * | 2012-07-20 | 2014-04-16 | 腾讯科技(深圳)有限公司 | Method and device for deciphering private information |
-
2016
- 2016-06-28 CN CN201610490444.7A patent/CN106156562B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366105A (en) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal for implementing private space |
CN102750497B (en) * | 2012-07-20 | 2014-04-16 | 腾讯科技(深圳)有限公司 | Method and device for deciphering private information |
CN103067612A (en) * | 2013-01-30 | 2013-04-24 | 广东欧珀移动通信有限公司 | Private information viewing method and system based on mobile terminal equipment |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
Non-Patent Citations (1)
Title |
---|
喵小跳: "《知乎网》", 27 September 2015 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106775480A (en) * | 2016-12-21 | 2017-05-31 | 中国航空工业集团公司雷华电子技术研究所 | A kind of real-time monitoring system data recording method based on LabVIEW |
CN106874786A (en) * | 2017-01-19 | 2017-06-20 | 北京奇虎科技有限公司 | image information storage method, device and intelligent terminal |
CN106886416A (en) * | 2017-03-08 | 2017-06-23 | 北京小米移动软件有限公司 | Multi-User Dimension processing method and processing device |
CN106886416B (en) * | 2017-03-08 | 2020-03-17 | 北京小米移动软件有限公司 | Multi-user spatial processing method and device |
CN107392039A (en) * | 2017-09-22 | 2017-11-24 | 华北理工大学 | Computer hard disk data encrypting method and its device |
CN107392039B (en) * | 2017-09-22 | 2020-06-30 | 华北理工大学 | Computer hard disk data encryption method and device |
CN109271764A (en) * | 2018-08-30 | 2019-01-25 | 北京珠穆朗玛移动通信有限公司 | Private data guard method, mobile terminal and storage medium |
CN109271764B (en) * | 2018-08-30 | 2023-10-17 | 北京珠穆朗玛移动通信有限公司 | Private data protection method, mobile terminal and storage medium |
CN111709054A (en) * | 2020-06-12 | 2020-09-25 | 腾讯科技(深圳)有限公司 | Privacy space information access control method and device and computer equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106156562B (en) | 2019-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106156562B (en) | A kind of private space protective device, mobile terminal and method | |
US11882221B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
AU2013305606B2 (en) | Method for producing dynamic data structures for authentication and/or password identification | |
US9419966B2 (en) | Method for producing dynamic data structures for authentication and/or password identification | |
EP1857954A1 (en) | Portable electronic apparatus and recording medium for changing the access permission of an application or file upon user biometric identification | |
CN104216742B (en) | Brush machine control method and device based on password | |
CN102968587B (en) | A kind of electronic equipment and the method giving electronic equipment unlocking information for change | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
US20150199016A1 (en) | Mobile terminal device and password input method | |
CN104573550A (en) | Method and device for protecting data | |
CN104219053B (en) | Method for information display, information concealing method and device | |
CN106453802A (en) | Cipher verification method and device, and terminal | |
CN103645838A (en) | Mobile terminal and unlocking method thereof | |
EP3367286A1 (en) | Methods, apparatuses, computer program and recording medium for protecting information | |
WO2020253197A1 (en) | Method and apparatus for managing virtual user identification card, terminal device and storage medium | |
JP2022002103A (en) | Privacy protecting method and protecting device for mobile terminal and mobile terminal | |
CN105046127A (en) | Encryption and decryption method and apparatus | |
CN105808107A (en) | Picture processing device and method | |
KR100351264B1 (en) | Communication terminal apparatus embedded the function generating One Time Password based on the challenge/response | |
CN106407788A (en) | Unlocking method, unlocking apparatus, and terminal | |
US11442620B2 (en) | Method and device providing multimodal input mechanism | |
CN106650397B (en) | password generation method and device based on pattern lock and terminal | |
KR20150009660A (en) | Smart Phone for possibling a Cryptography-Input of revenge and Drive Method of the Same | |
WO2016028626A1 (en) | Method for producing dynamic data structures for authentication and/or password identification | |
CN105608350A (en) | Screen input keyboard generation method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |