CN106503511B - A kind of method and device improving mobile phone removal of home cryptographic check safety - Google Patents

A kind of method and device improving mobile phone removal of home cryptographic check safety Download PDF

Info

Publication number
CN106503511B
CN106503511B CN201610824830.5A CN201610824830A CN106503511B CN 106503511 B CN106503511 B CN 106503511B CN 201610824830 A CN201610824830 A CN 201610824830A CN 106503511 B CN106503511 B CN 106503511B
Authority
CN
China
Prior art keywords
terminal
password
biological characteristic
home
removal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610824830.5A
Other languages
Chinese (zh)
Other versions
CN106503511A (en
Inventor
张海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610824830.5A priority Critical patent/CN106503511B/en
Publication of CN106503511A publication Critical patent/CN106503511A/en
Application granted granted Critical
Publication of CN106503511B publication Critical patent/CN106503511B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the communications fields, provide a kind of method of raising mobile phone removal of home cryptographic check safety, described method includes following steps: the communication request that first terminal is sent to second terminal, includes: the instruction of removal of home in the communication request;First terminal receives second terminal and sends communication response;First terminal receives the first biological characteristic password that user inputs in the password setting page, and first terminal sends Password Input prompt to second terminal;First terminal receives the second biological characteristic password that second terminal is sent, and first terminal compares the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then sends the removal of home file to second terminal.Technical solution provided by the invention has the advantages that user experience is good.

Description

A kind of method and device improving mobile phone removal of home cryptographic check safety
Technical field
The present invention relates to the communications field more particularly to a kind of methods and dress for improving mobile phone removal of home cryptographic check safety It sets.
Background technique
The equipment such as the terminal of the communications field, such as mobile phone, tablet computer are to belong to the common equipment of user, due at present should Equipment all has the operating system of itself, so terminal is also known as intelligent terminal or smart phone, smart phone (English: Smartphone) it is collectivity appellation for those operational capabilities and function mobile phone more stronger than traditional function mobile phone.Intelligence The most commonly used operating system of mobile phone has: Windows Phone, Android, IOS and BlackBerry OS, but between them Application software it is incompatible.Smart phone as PC because can install third party software, their functions It is abundant, and can constantly expand.
Existing terminal all have file storage function, this document for example: photo, text, video, address list etc., As the style of current smart phone is more and more, mobile phone replacement frequency it is higher and higher, the application mobile phone is replaced after number It is commonly called as " mobile phone removal of home " according to transfer, for the removal of home of existing mobile phone, how the file of old mobile phone to be transferred in new cell-phone Be one allow very much the number of people pain the problem of, by taking address list as an example, currently existing scheme is realized by third party software, existing hand Machine not can guarantee the safety of connection in removal of home, the data in mobile phone may be caused to reveal in mobile phone removal of home in this way, user Experience Degree is low.
Summary of the invention
An object of the present invention is to provide a kind of method of raising mobile phone removal of home cryptographic check safety, mainly solves The low disadvantage of existing Experience Degree.
In a first aspect, providing a kind of method of raising mobile phone removal of home cryptographic check safety, the method includes walking as follows It is rapid:
The communication request that first terminal is sent to second terminal includes: the instruction of removal of home in the communication request;
First terminal receives second terminal and sends communication response;
First terminal receives the first biological characteristic password that user inputs in the password setting page, and first terminal is whole to second End sends Password Input prompt;
First terminal receives the second biological characteristic password that second terminal is sent, and it is close that first terminal compares the first biological characteristic Code and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then send out to second terminal Give the removal of home file.
Optionally, the method also includes:
If the first biological characteristic password and the second biological characteristic password mismatch, then first terminal is not to second terminal Send the removal of home file.
Optionally, the biological characteristic password specifically includes:
One of finger-print cipher, vein password, facial password, pupil password or palmmprint password are a variety of.
Optionally, the method can also include: after first terminal does not send the removal of home file to second terminal
The second biological characteristic password is sent to server, and is sent a warning message to server.
Optionally, the method can also include: after first terminal does not send the removal of home file to second terminal
First terminal is sent to second hides Location Request, receives the location response that second terminal is sent, and the positioning is rung It should include: the coordinate of second terminal.
Second aspect, provides a kind of device of raising mobile phone removal of home cryptographic check safety, and described device includes following step It is rapid:
Transmission unit, the communication request for sending to second terminal include: the instruction of removal of home in the communication request;
Receiving unit sends communication response for receiving second terminal;Receive user inputs in the password setting page the One biological characteristic password;
The transmission unit is also used to send Password Input prompt to second terminal;
The receiving unit is also used to receive the second biological characteristic password of second terminal transmission;
Processing unit, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic is close Code and the second biological characteristic password match, then send the removal of home file to second terminal.
Optionally, the processing unit is also used to such as the first biological characteristic password and the second biological characteristic password not Matching, then do not send the removal of home file to second terminal.
Optionally, the biological characteristic password specifically includes:
One of finger-print cipher, vein password, facial password, pupil password or palmmprint password are a variety of.
Optionally, the processing unit, is also used to for the second biological characteristic password being sent to server, and to service Device sends a warning message.
Optionally, the transmission unit is also used to send to second and hides Location Request;
The receiving unit, is also used to receive the location response of second terminal transmission, and the location response includes: second whole The coordinate at end.
The third aspect, provides a kind of terminal, and the terminal includes above-mentioned raising mobile phone removal of home cryptographic check safety Device.
Those of ordinary skill in the art will understand that although following detailed description carries out referenced in schematic embodiment, attached drawing, But the present invention is not limited to these embodiments.But the scope of the present invention is extensive, and is intended to only through appended right It is required that limiting the scope of the invention.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, of the invention other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the method for improving mobile phone removal of home cryptographic check safety provided according to a preferred embodiment of the invention Flow chart.
Fig. 2 is the method for improving mobile phone removal of home cryptographic check safety provided according to another preferred embodiment of the present invention Flow chart.
Fig. 3 is the device for improving mobile phone removal of home cryptographic check safety provided according to the next preferred embodiment of the present invention Structure chart.
Fig. 4 is the hardware structural diagram of terminal provided by the invention.
Specific embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing or method described as flow chart.Although operations are described as the processing of sequence by flow chart, therein to be permitted Multioperation can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of operations can be rearranged.When it The processing can be terminated when operation completion, it is also possible to have the additional step being not included in attached drawing.The processing It can correspond to method, function, regulation, subroutine, subprogram etc..
Alleged " computer equipment " within a context, also referred to as " computer ", referring to can be by running preset program or referring to Enable to execute numerical value and calculate and/or the intelligent electronic device of the predetermined process process such as logic calculation, may include processor with Memory executes the survival prestored in memory instruction by processor to execute predetermined process process, or by ASIC, The hardware such as FPGA, DSP execute predetermined process process, or are realized by said two devices combination.Computer equipment includes but unlimited In server, PC, laptop, tablet computer, smart phone etc..
Method (some of them are illustrated by process) discussed hereafter can be by hardware, software, firmware, centre Part, microcode, hardware description language or any combination thereof are implemented.Implement when with software, firmware, middleware or microcode When, program code or code segment to implement necessary task can be stored in machine or computer-readable medium and (for example deposit Storage media) in.Necessary task can be implemented in (one or more) processor.
Specific structure and function details disclosed herein are only representative, and are for describing the present invention show The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and be not interpreted as It is limited only by the embodiments set forth herein.
Although it should be understood that may have been used term " first ", " second " etc. herein to describe each unit, But these units should not be limited by these terms.The use of these items is only for by a unit and another unit It distinguishes.For example, without departing substantially from the range of exemplary embodiment, it is single that first unit can be referred to as second Member, and similarly second unit can be referred to as first unit.Term "and/or" used herein above include one of them or Any and all combinations of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless Context clearly refers else, otherwise singular used herein above "one", " one " also attempt to include plural number.Also answer When understanding, term " includes " and/or "comprising" used herein above provide stated feature, integer, step, operation, The presence of unit and/or component, and do not preclude the presence or addition of other one or more features, integer, step, operation, unit, Component and/or combination thereof.
It should further be mentioned that the function action being previously mentioned can be attached according to being different from some replace implementations The sequence indicated in figure occurs.For example, related function action is depended on, the two width figures shown in succession actually may be used Substantially simultaneously to execute or can execute in a reverse order sometimes.
Present invention is further described in detail with reference to the accompanying drawing.
According to an aspect of the invention, there is provided a kind of method for improving mobile phone removal of home cryptographic check safety.Wherein, In the terminal, which includes but is not limited to: server, computer, tablet computer, smart phone etc., certainly for this method application In practical applications, the equipment such as smartwatch or Intelligent bracelet can also be increased.
In one embodiment, the method for above-mentioned raising mobile phone removal of home cryptographic check safety can be used in terminal, need It is noted that the terminal is only for example, if other network equipments and user equipment existing or be likely to occur from now on It suitable for the present invention, should also be included within the scope of protection of the present invention, and be incorporated herein by reference.
Referring to FIG. 1, Fig. 1 is cryptographic check peace of being moved according to the raising mobile phone provided of a preferred embodiment of the invention The method of full property, this method are completed by terminal, and this method is as shown in Figure 1, include the following steps:
Step S101, the communication request that first terminal is sent to second terminal includes: the finger of removal of home in the communication request Show;
First terminal in above-mentioned steps S101 can be a variety of communication requests, example to the communication request that second terminal is sent Such as in a concrete scheme of a preferred embodiment of the invention, communication request that above-mentioned first terminal is sent to second terminal It can be the communication request that first terminal is sent by Wireless Fidelity (English: Wireless Fidelity, WIFI), it should The structure of communication request and definition may refer to being specifically defined in IEEE802.1, and which is not described herein again, certainly in invention one In another concrete scheme of a preferred embodiment, the communication request that above-mentioned first terminal is sent to second terminal can be The communication request that one terminal is sent by bluetooth certainly in practical applications can also be using other communication mode hairs The communication request is given, for example, first terminal is led to by what long term evolution (English: Long Term Evolution, LTE) was sent Letter request, can also be certainly, first terminal by CDMA (English: Code Division Multiple Access, CDMA) the communication request sent.The specific embodiment of the invention is not limited to the specific manifestation form of the communication request, also unlimited In the specific standard agreement of the communication request abided by.
The value of the instruction of above-mentioned removal of home is specifically as follows: whether removal of home or not, can be by extending word in communication request Bit embodies in section, for example, setting 1 is removal of home, setting 0 is does not move, certainly in practical applications, above-mentioned setting Can also in turn, such as setting 0 is removal of home, not move, the specific embodiment of the invention does not limit above-mentioned instruction for setting 1 Value concrete meaning.Certainly in practical applications, can also be in other way as the instruction moved, such as carry one The special field of a setting length, such as the modes such as 10 1,10 0,11 1 or 12 0, it is only necessary to first terminal and second Terminal can identify mutually.
Step S102, first terminal receives second terminal and sends communication response;
The communication response that the received second terminal of first terminal in above-mentioned steps S102 is sent can be a variety of communications and ring It answers, such as in a concrete scheme of a preferred embodiment of the invention, the above-mentioned received second terminal of first terminal is sent Communication response can be sent by Wireless Fidelity (English: Wireless Fidelity, WIFI) one of second terminal Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, and which is not described herein again, Certainly in another concrete scheme for inventing a preferred embodiment, the above-mentioned received second terminal of first terminal sends logical Letter response can be that the communication response that second terminal is sent by bluetooth can also use it certainly in practical applications His communication mode sends the communication response, for example, first terminal passes through long term evolution (English: Long Term Evolution, LTE) send communication response, can also be certainly, second terminal by CDMA (English: Code Division Multiple Access, CDMA) send communication response.The specific embodiment of the invention is not limited to the communication The specific manifestation form of request is also not necessarily limited to the specific standard agreement of the communication request abided by.
Step S103, first terminal receives the first biological characteristic password that user inputs in the password setting page, and first eventually It holds to second terminal and sends Password Input prompt.
Password Input prompt in above-mentioned steps is specifically as follows: a specific message, such as short message, certainly in reality In the application of border, or an actual page can also be the prompt of other modes, the specific embodiment of the invention certainly It is not intended to limit the specific manifestation form of above-mentioned prompt.
Above-mentioned biological characteristic password includes but is not limited to: finger-print cipher, palmmprint password, vein password, facial password, pupil One of password is a variety of.
Step S104, first terminal receives the second biological characteristic password that second terminal is sent, and first terminal compares first Biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match, then to Second terminal sends the removal of home file.
Optionally, the above method can also include: after step s 104
If the first biological characteristic password and the second biological characteristic password mismatch, stop sending removal of home text to second terminal Part.
For technical solution provided by the invention after establishing communication connection, first terminal shows the Password Input page to user The first biological characteristic password of user's input is obtained, then sends Password Input prompt to second terminal, second terminal is received and returns The the second biological characteristic password returned, the first biological characteristic password is compared with the second biological characteristic password with determine whether for User mobile phone removal of home, because new and old mobile phone is generally same user, then same user is random for mobile phone removal of home One password of input, the password is not also by network transmission, so its safety is very high, so it, which has, improves network The advantages of safety.
Referring to FIG. 2, Fig. 2 is cryptographic check of being moved according to the raising mobile phone of another preferred embodiment of the present invention provided The method of safety, this method are completed by terminal, and this method is as shown in Fig. 2, include the following steps:
Step S201, the communication request that first terminal is sent to second terminal includes: the finger of removal of home in the communication request Show;
First terminal in above-mentioned steps S201 can be a variety of communication requests, example to the communication request that second terminal is sent Such as in a concrete scheme of a preferred embodiment of the invention, communication request that above-mentioned first terminal is sent to second terminal It can be the communication request that first terminal is sent by Wireless Fidelity (English: Wireless Fidelity, WIFI), it should The structure of communication request and definition may refer to being specifically defined in IEEE802.1, and which is not described herein again, certainly in invention one In another concrete scheme of a preferred embodiment, the communication request that above-mentioned first terminal is sent to second terminal can be The communication request that one terminal is sent by bluetooth certainly in practical applications can also be using other communication mode hairs The communication request is given, for example, first terminal is led to by what long term evolution (English: Long Term Evolution, LTE) was sent Letter request, can also be certainly, first terminal by CDMA (English: Code Division Multiple Access, CDMA) the communication request sent.The specific embodiment of the invention is not limited to the specific manifestation form of the communication request, also unlimited In the specific standard agreement of the communication request abided by.
The value of the instruction of above-mentioned removal of home is specifically as follows: whether removal of home or not, can be by extending word in communication request Bit embodies in section, for example, setting 1 is removal of home, setting 0 is does not move, certainly in practical applications, above-mentioned setting Can also in turn, such as setting 0 is removal of home, not move, the specific embodiment of the invention does not limit above-mentioned instruction for setting 1 Value concrete meaning.Certainly in practical applications, can also be in other way as the instruction moved, such as carry one The special field of a setting length, such as the modes such as 10 1,10 0,11 1 or 12 0, it is only necessary to first terminal and second Terminal can identify mutually.
Step S202, first terminal receives second terminal and sends communication response;
The communication response that the received second terminal of first terminal in above-mentioned steps S202 is sent can be a variety of communications and ring It answers, such as in a concrete scheme of a preferred embodiment of the invention, the above-mentioned received second terminal of first terminal is sent Communication response can be sent by Wireless Fidelity (English: Wireless Fidelity, WIFI) one of second terminal Communication response, the structure of the communication response and definition may refer to being specifically defined in IEEE802.1, and which is not described herein again, Certainly in another concrete scheme for inventing a preferred embodiment, the above-mentioned received second terminal of first terminal sends logical Letter response can be that the communication response that second terminal is sent by bluetooth can also use it certainly in practical applications His communication mode sends the communication response, for example, first terminal passes through long term evolution (English: Long Term Evolution, LTE) send communication response, can also be certainly, second terminal by CDMA (English: Code Division Multiple Access, CDMA) send communication response.The specific embodiment of the invention is not limited to the communication The specific manifestation form of request is also not necessarily limited to the specific standard agreement of the communication request abided by.
Step S203, first terminal receive user password setting the page input biological characteristic password, first terminal to Second terminal sends Password Input prompt;.
Password Input prompt in above-mentioned steps is specifically as follows: a specific message, such as short message, certainly in reality In the application of border, or an actual page can also be the prompt of other modes, the specific embodiment of the invention certainly It is not intended to limit the specific manifestation form of above-mentioned prompt.
Step S204, first terminal receives the second biological characteristic password that second terminal is sent, and first terminal compares first Biological characteristic password and the second biological characteristic password, such as the second biological characteristic password and the first biological characteristic password mismatch, the One terminal does not send removal of home file to second terminal.
Optionally, the above method can also include: after step s 204
The second biological characteristic password is sent to server, and is sent a warning message to server.
For biological characteristic password, since it belongs to the inherent feature of owner, so input error is not present in it Problem is not belonging to the same owner, then just needing second if two biological characteristic passwords mismatch out certainly Second biological characteristic password of terminal input is sent to server, and carries out alarming processing, it is more likely that second terminal has occurred It loses or others surprisingly asks situation.
Optionally, the above method can also include: after step s 204
First terminal is sent to second terminal hides Location Request, receives the location response that second terminal is sent, described fixed Position response includes: the coordinate of second terminal.
Above-mentioned Location Request is hiding Location Request, cannot be known by second terminal, if known by second terminal, Very possible positioning failure.
For technical solution provided by the invention after establishing communication connection, first terminal shows the Password Input page to user The first biological characteristic password of user's input is obtained, then sends Password Input prompt to second terminal, second terminal is received and returns The the second biological characteristic password returned, the first biological characteristic password is compared with the second biological characteristic password with determine whether for User mobile phone removal of home, because new and old mobile phone is generally same user, then same user is random for mobile phone removal of home One password of input, the password is not also by network transmission, so its safety is very high, so it, which has, improves network The advantages of safety.
Refering to Fig. 3, Fig. 3 is that a kind of raising mobile phone is moved the device 300 of cryptographic check safety, and described device is set to the In one terminal, described device includes:
Transmission unit 301, the communication request for sending to second terminal include: the instruction of removal of home in the communication request;
Receiving unit, 32, communication response is sent for receiving second terminal;Receive what user inputted in the password setting page First biological characteristic password;
Transmission unit 301 is also used to send Password Input prompt to second terminal;
Receiving unit 302 is also used to receive the second biological characteristic password of second terminal transmission;
Processing unit 303, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic Password and the second biological characteristic password match, then send the removal of home file to second terminal.
Optionally, the processing unit is also used to such as the first biological characteristic password and the second biological characteristic password not Matching, then do not send the removal of home file to second terminal.
Optionally, the biological characteristic password specifically includes:
One of finger-print cipher, vein password, facial password, pupil password or palmmprint password are a variety of.
Optionally, the processing unit, is also used to for the second biological characteristic password being sent to server, and to service Device sends a warning message.
Optionally, the transmission unit is also used to send to second terminal and hides Location Request;
The receiving unit, is also used to receive the location response of second terminal transmission, and the location response includes: second whole The coordinate at end.
The present invention also provides a kind of terminal, which includes the device of above-mentioned raising mobile phone removal of home cryptographic check safety 300。
The present invention specifically applies the details of example, and without departing from the spirit or essential characteristics of the present invention, can To implemente the invention in other specific forms.Therefore, in all respects, the embodiments should be taken as exemplary, And be non-limiting, the scope of the invention being indicated by the appended claims rather than by the foregoing description, it is intended that will fall in All changes in the meaning and scope of the equivalent requirements of the claims are included in the present invention.It should not be by appointing in claim What appended drawing reference is construed as limiting the claims involved.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, it is single Number is not excluded for plural number.The multiple units or device stated in system claims can also pass through software by a unit or device Or hardware is realized.The first, the second equal words are used to indicate names, and are not indicated any particular order.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, section or code of table, a part of the module, section or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually base Originally it is performed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that It is the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, can uses and execute rule The dedicated hardware based system of fixed function or movement is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Referring to fig. 4, the embodiment of the present invention also provides a kind of terminal 400, which includes but is not limited to: smart phone, Smartwatch, tablet computer, personal computer, laptop or computer group, as shown in figure 4, the terminal 400 includes: Processor 401, memory 402, transceiver 403 and bus 404.Transceiver 403 is used for the sending and receiving data between external equipment.If The quantity of processor 401 in standby 400 can be one or more.In some embodiments of the present application, processor 401, storage Device 402 can be connected with transceiver 403 by bus system or other modes.Equipment 400 can be used for executing side shown in FIG. 1 Method.About the meaning and citing of the term that the present embodiment is related to, the corresponding explanation of Fig. 1 can be referred to.Details are not described herein again.
Wherein, program code is stored in memory 402.Processor 401 is for calling the program generation stored in memory 402 Code, for executing step as shown in Figure 1.
It should be noted that processor 401 here can be a processing element, it is also possible to multiple processing elements It is referred to as.For example, the processing element can be central processing unit (Central Processing Unit, CPU), it is also possible to spy Determine integrated circuit (Application Specific Integrated Circuit, ASIC), or is arranged to implement this Apply for one or more integrated circuits of embodiment, such as: one or more microprocessors (digital signal Processor, DSP), or, one or more field programmable gate array (Field Programmable Gate Array, FPGA)。
Memory 403 can be a storage device, be also possible to the general designation of multiple memory elements, and for storing and can hold Parameter, data required for line program code or application program running gear are run etc..And memory 403 may include random storage Device (RAM) also may include nonvolatile memory (non-volatile memory), such as magnetic disk storage, flash memory (Flash) etc..
It is total that bus 404 can be industry standard architecture (Industry Standard Architecture, ISA) Line, external equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control Bus processed etc..Only to be indicated with a thick line in Fig. 4, it is not intended that an only bus or a type of convenient for indicating Bus.
The user equipment can also include input/output unit, be connected to bus 404, to pass through bus and processor 401 Etc. other parts connection.The input/output unit can provide an input interface for operator, so that operator is by being somebody's turn to do Input interface selects item of deploying to ensure effective monitoring and control of illegal activities, and can also be other interfaces, can pass through the external other equipment of the interface.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, Only a kind of logical function partition, there may be another division manner in actual implementation, in another example, multiple units or components can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be through some communication interfaces, device or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme should all cover within the scope of the claims and the description of the invention.

Claims (5)

1. a kind of method for improving mobile phone removal of home cryptographic check safety, which is characterized in that described method includes following steps:
The communication request that first terminal is sent to second terminal includes: the instruction of removal of home, the finger of the removal of home in the communication request Show the extended field of a setting length in specially communication request;
First terminal receives second terminal and sends communication response;After establishing communication connection, first terminal shows close to user Code input page;
First terminal receives the first biological characteristic password that user inputs in the password setting page, and first terminal is sent out to second terminal Password Input is sent to prompt, the Password Input prompt specifically includes short message or the page;
First terminal receive second terminal send the second biological characteristic password, first terminal compare the first biological characteristic password with Second biological characteristic password, such as the first biological characteristic password and the second biological characteristic password match are then removed to second terminal transmission Family's file;
If the first biological characteristic password and the second biological characteristic password mismatch, then first terminal is not sent to second terminal The removal of home file;
After first terminal does not send the removal of home file to second terminal, the second biological characteristic password is sent to service Device, and send a warning message to server;The first terminal is sent to second terminal hides Location Request, the hiding positioning Request is hiding Location Request, is not known by the second terminal;Receive the location response that second terminal is sent, the positioning Response includes: the coordinate of second terminal.
2. the method according to claim 1, wherein the biological characteristic password specifically includes:
One of finger-print cipher, vein password, facial password, pupil password or palmmprint password are a variety of.
3. a kind of device for improving mobile phone removal of home cryptographic check safety, which is characterized in that described device includes the following steps:
Transmission unit, the communication request for sending to second terminal include: the instruction of removal of home in the communication request, described to remove The instruction of family is specially the extended field of a setting length in communication request;
Receiving unit sends communication response for receiving second terminal;After establishing communication connection, first terminal is aobvious to user Show the Password Input page;Receive the first biological characteristic password that user inputs in the password setting page;
The transmission unit, is also used to send Password Input prompt to second terminal, and the Password Input prompt specifically includes short Message or the page;
The receiving unit is also used to receive the second biological characteristic password of second terminal transmission;
Processing unit, for comparing the first biological characteristic password and the second biological characteristic password, such as the first biological characteristic password and Second biological characteristic password match then sends removal of home file to second terminal;
The processing unit is also used to such as the first biological characteristic password and the second biological characteristic password and mismatches, then not to Second terminal sends the removal of home file;
The processing unit is also used to for the second biological characteristic password being sent to server, and sends and alert to server Information;
The transmission unit is also used to send to second terminal and hides Location Request;The hiding Location Request be hide determine Position request, is not known by the second terminal;
The receiving unit is also used to receive the location response of second terminal transmission, and the location response includes: second terminal Coordinate.
4. device according to claim 3, which is characterized in that the biological characteristic password specifically includes:
One of finger-print cipher, vein password, facial password, pupil password or palmmprint password are a variety of.
5. a kind of terminal, which is characterized in that the terminal includes raising mobile phone removal of home password school as described in claim 3 or 4 Test the device of safety.
CN201610824830.5A 2016-09-14 2016-09-14 A kind of method and device improving mobile phone removal of home cryptographic check safety Active CN106503511B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610824830.5A CN106503511B (en) 2016-09-14 2016-09-14 A kind of method and device improving mobile phone removal of home cryptographic check safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610824830.5A CN106503511B (en) 2016-09-14 2016-09-14 A kind of method and device improving mobile phone removal of home cryptographic check safety

Publications (2)

Publication Number Publication Date
CN106503511A CN106503511A (en) 2017-03-15
CN106503511B true CN106503511B (en) 2019-06-14

Family

ID=58290449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610824830.5A Active CN106503511B (en) 2016-09-14 2016-09-14 A kind of method and device improving mobile phone removal of home cryptographic check safety

Country Status (1)

Country Link
CN (1) CN106503511B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446110B (en) * 2016-09-14 2020-07-28 Oppo广东移动通信有限公司 Method and device for realizing connection security of terminal moving
CN107135498B (en) * 2017-04-27 2020-01-17 宁波甬宸影视文化股份有限公司 File sharing method and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984679A (en) * 2012-11-06 2013-03-20 周万荣 Method and terminal of call forwarding and data manipulation
CN104657643A (en) * 2015-03-13 2015-05-27 广东欧珀移动通信有限公司 Privacy protection method, wearable device and mobile terminal
CN105138878A (en) * 2015-07-14 2015-12-09 广东欧珀移动通信有限公司 Remote terminal control method and mobile terminal
CN105429949A (en) * 2015-10-28 2016-03-23 广东欧珀移动通信有限公司 Cipher pushing method and pushing system
CN105590211A (en) * 2014-10-21 2016-05-18 腾讯科技(深圳)有限公司 Data transfer method, data transfer device and data transfer system
CN105701397A (en) * 2014-11-24 2016-06-22 ***通信集团公司 Method and device for controlling application program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984679A (en) * 2012-11-06 2013-03-20 周万荣 Method and terminal of call forwarding and data manipulation
CN105590211A (en) * 2014-10-21 2016-05-18 腾讯科技(深圳)有限公司 Data transfer method, data transfer device and data transfer system
CN105701397A (en) * 2014-11-24 2016-06-22 ***通信集团公司 Method and device for controlling application program
CN104657643A (en) * 2015-03-13 2015-05-27 广东欧珀移动通信有限公司 Privacy protection method, wearable device and mobile terminal
CN105138878A (en) * 2015-07-14 2015-12-09 广东欧珀移动通信有限公司 Remote terminal control method and mobile terminal
CN105429949A (en) * 2015-10-28 2016-03-23 广东欧珀移动通信有限公司 Cipher pushing method and pushing system

Also Published As

Publication number Publication date
CN106503511A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN107071865B (en) A kind of method and device that Wireless Fidelity quickly connects
US8996729B2 (en) Method and apparatus for synchronizing tasks performed by multiple devices
US20160210632A1 (en) Secured payment method and relevant device and system
US9078083B2 (en) Application server awareness of device capabilities in a wireless network
US10491548B2 (en) Techniques to configure bot flow
WO2015095851A1 (en) Management of storage in a storage network
US20140297893A1 (en) Emulating multiple universal serial bus (usb) keys so as to efficiently configure different types of hardware
EP3186943B1 (en) Device verification prior to registration
CN107729452B (en) Webpage loading method and device, electronic equipment and computer readable storage medium
CN106686545B (en) A kind of application method and device of Wireless Fidelity national code
US9720852B2 (en) Universal serial bus (USB) key functioning as multiple USB keys so as to efficiently configure different types of hardware
CN106503511B (en) A kind of method and device improving mobile phone removal of home cryptographic check safety
US11121942B2 (en) Orchestration engine facilitating management of dynamic connection components
CN109857571A (en) Clipbook control method and device
CN110929173A (en) Method, device, equipment and medium for identifying same person
CA2967270A1 (en) Techniques to transform network resource requests to zero rated network requests
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN105227441A (en) Cloud server, contact identity defining method and system
US11410034B2 (en) Cognitive device management using artificial intelligence
CN106507268A (en) The method and device of dynamic authentication in a kind of mobile phone removal of home
JP2018508081A (en) Input serial processing method, apparatus, device, and non-executable computer storage medium
CN106446110B (en) Method and device for realizing connection security of terminal moving
CN108763976B (en) Information display method based on double screens, mobile terminal and storage medium
US10572320B2 (en) Detecting co-resident services in a container cloud
US10097588B2 (en) Method and system for configuring simple kernel access control policy for android-based mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant