WO2015158053A1 - 信息处理方法、电子设备和计算机存储介质 - Google Patents

信息处理方法、电子设备和计算机存储介质 Download PDF

Info

Publication number
WO2015158053A1
WO2015158053A1 PCT/CN2014/082537 CN2014082537W WO2015158053A1 WO 2015158053 A1 WO2015158053 A1 WO 2015158053A1 CN 2014082537 W CN2014082537 W CN 2014082537W WO 2015158053 A1 WO2015158053 A1 WO 2015158053A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
binding
connection
information
unit
Prior art date
Application number
PCT/CN2014/082537
Other languages
English (en)
French (fr)
Inventor
魏明业
刘专
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015158053A1 publication Critical patent/WO2015158053A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the present invention relates to information processing technologies in the field of communications, and in particular, to an information processing method, an electronic device, and a computer storage medium. Background technique
  • Mobile electronic devices are easy to carry and easy to carry, and at the same time, they also lead to an increase in theft.
  • Illegal users illegally hold mobile electronic devices. After the device, it may obtain the privacy information of the user stored in the electronic device; perform some illegal operations based on the authorization of the electronic device by using the installed program or application in the electronic device; such as mobile payment; in addition, the illegal user holds the mobile electronic device Afterwards, it may also maliciously use various payment services of mobile electronic devices, resulting in bad use records or property losses of legitimate users;
  • embodiments of the present invention are directed to providing an information processing method, an electronic device, and a computer storage medium to reduce the probability of illegal users using the electronic device illegally.
  • a first aspect of the embodiments of the present invention provides an information processing method, where the method includes: detecting whether a first electronic device is securely bound to a second electronic device;
  • the method further includes:
  • the first electronic device is controlled to operate in an unlocked state.
  • the method further includes:
  • connection If the connection is established, extracting the connection address of the second electronic device, and determining whether the connection address is consistent with the pre-stored binding address;
  • the process of controlling the first electronic device to operate in a locked state is entered.
  • the method further includes:
  • step of controlling the first electronic device to operate in an unlocked state is entered.
  • the method further includes:
  • connection is not established, establishing a connection with the second electronic device according to the binding address.
  • the connection is not established, establishing a connection with the second electronic device according to the binding address.
  • the security binding is established according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device.
  • the establishing, according to the pre-stored binding information and the information of the first electronic device and the second electronic device, establishing a security binding includes:
  • the binding security information is a basis for detecting that the first electronic device and the second electronic device are securely bound.
  • the method further includes the step of releasing the binding of the first electronic device and the second electronic device: the binding releasing step comprises:
  • the binding release step further includes:
  • the security binding is established according to the pre-stored binding information and the information of the first electronic device and the second electronic device.
  • the binding release step is re-executed.
  • the first electronic device is a second electronic device that is a mobile electronic device; the first electronic device and the second electronic device establish a connection by using a near field communication manner.
  • the first electronic device is a mobile communication device; and the second electronic device is a wearable electronic device.
  • a second aspect of the embodiments of the present invention provides an electronic device, where the electronic device is a first electronic device, including:
  • a detecting unit configured to detect whether the first electronic device is securely bound to the second electronic device, and the control unit is configured to control the first electronic device and the second electronic device when the second electronic device is not securely bound An electronic device operates in a locked state;
  • the control unit is further configured to control the first electronic device to operate in an unlocked state when the first electronic device and the second electronic device are securely bound.
  • the electronic device further includes a connection unit and a determination unit;
  • the connecting unit is configured to: after determining that the first electronic device and the second electronic device are securely bound, detecting whether the first electronic device has established a connection with the second electronic device; When the connection between the first electronic device and the second electronic device is established, the connection address of the second electronic device is extracted, and it is determined whether the connection address is consistent with the pre-stored binding address;
  • the control unit is configured to control the first electronic device to operate in a locked state when the connection address of the second electronic device is inconsistent with the pre-stored binding address.
  • the control unit is further configured to control the first electronic device to operate in an unlocked state when the connection address of the second electronic device is consistent with the pre-stored binding address.
  • the connecting unit is further configured to establish a connection between the first electronic device and the second electronic device when the first electronic device and the second electronic device are not connected.
  • the first electronic device further includes:
  • a binding unit configured to: when the first electronic device and the second electronic device are not securely bound, establish security according to pre-stored binding information and information of the first electronic device and the second electronic device Bind.
  • the first electronic device further includes a sending unit and a receiving unit;
  • the sending unit is configured to send a connection request to the second electronic device according to the binding information; and send a binding to the second electronic device after the first electronic device is connected to the second electronic device verify message;
  • the receiving unit is configured to receive the binding authentication information returned based on the binding verification information;
  • the binding unit is configured to generate and record binding security information according to the binding authentication information;
  • the binding security information is a basis for detecting that the first electronic device and the second electronic device are securely bound.
  • the first electronic device further includes an input unit
  • the input unit is further configured to receive a binding release indication
  • the detecting unit is further configured to: when detecting the binding release indication, detecting whether the first electronic device is securely bound to the second electronic device;
  • the binding unit is further configured to delete the binding information and the binding security information when the first electronic device and the second electronic device are securely bound.
  • the binding unit is further configured to receive a binding release indication at the input unit, where the detecting unit detects that the first electronic device and the second electronic device are not securely bound, according to the pre-stored
  • the binding information and the information of the first electronic device and the second electronic device interact to establish a security binding
  • the binding unit is further configured to release the binding between the first electronic device and the second electronic device after the first electronic device establishes a security binding with the second electronic device in the contact binding.
  • the first electronic device is a second electronic device that is a mobile electronic device
  • the first electronic device and the second electronic device establish a connection by using a near field communication manner; preferably,
  • the first electronic device is a mobile communication device; the second electronic device is a wearable electronic device.
  • An embodiment of the present invention further provides a computer storage medium, where the computer storage medium is stored Computer executable instructions are stored for performing at least one of the methods of the first aspect of the embodiments of the present invention.
  • the information processing method, the electronic device, and the computer storage medium according to the embodiment of the present invention determine whether the first electronic device is securely bound to the second electronic device; if not securely bound, the first electronic device is indicated at this time. It may be in an unsafe state, such as being held by an illegal user; controlling the first electronic device to operate in a locked state; at least part of the application of the first electronic device is unusable; thereby avoiding abuse of the electronic device by an illegal user , resulting in the loss of property and credit of legitimate users.
  • FIG. 1 is a schematic flowchart of an information processing method according to Embodiment 1 of the present invention
  • FIG. 2 is a second schematic flowchart of an information processing method according to Embodiment 1 of the present invention
  • FIG. 3 is a schematic diagram of Embodiment 1 of the present invention
  • FIG. 4 is a schematic diagram of binding a first electronic device to a second electronic device according to the first embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of a first electronic device according to Embodiment 2 of the present invention
  • FIG. 6 is a second schematic structural diagram of a first electronic device according to Embodiment 2 of the present invention
  • FIG. 8 is a schematic diagram of security binding according to an example of the present invention.
  • FIG. 9 is a schematic diagram of binding cancellation according to an example of the present invention.
  • FIG. 10 is a flowchart of an information processing method according to an example of the present invention. detailed description
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the embodiment provides an information processing method, where the method includes: Step S110: detecting whether the first electronic device is securely bound to the second electronic device; Step S120: If not securely bound, Controlling the first electronic device to operate in a locked state; when the electronic device is operating in a locked state, at least part of the application of the electronic device is prohibited from being used.
  • the security binding in the step S110 may be determined by whether the binding security information is formed in the first electronic device; the binding security information may be a security binding identifier bit, a security binding field, or a picture. Any information formed after security binding is implemented arbitrarily.
  • the first electronic device when it is detected that the first electronic device and the second electronic device are not securely bound, the first electronic device is controlled to operate in a locked state, so that at least part of the first electronic device The application or all applications are prohibited from use.
  • an application whose security level requirement is higher than the security level threshold is higher than the security level threshold as an application that is prohibited from being used; specifically, applications such as mobile payment, originating call as an active party, and reading and writing important files.
  • the security level of the application may be set by the user, or the first electronic device automatically assigns a security level according to the information involved in each application according to the specific application; and the application whose security level is higher than the security level threshold is set to be locked. Apps that are prohibited from use in the state.
  • the first electronic device establishes a security binding with the information exchange of the second electronic device; and may further set a valid time for the security binding; when the valid time expires, The security binding between the first electronic device and the second electronic device is invalid, and the security binding needs to be established through the information interaction between the first electronic device and the second electronic device, which is beneficial to improve the number again.
  • Application security of an electronic device is possible.
  • the first electronic device may be a mobile device such as a mobile phone, a tablet computer, or a personal digital assistant, and may specifically be a mobile terminal, and may perform information interaction by using a network element such as a wired or wireless network server.
  • the second electronic device can also be a mobile electronic device such as a mobile phone, a tablet computer, and a personal digital assistant; and the second electronic device can also be a wearable device, such as smart glasses, a smart bracelet, and a smart watch.
  • Mobile electronic devices may be a mobile device such as a mobile phone, a tablet computer, or a personal digital assistant, and may specifically be a mobile terminal, and may perform information interaction by using a network element such as a wired or wireless network server.
  • the second electronic device can also be a mobile electronic device such as a mobile phone, a tablet computer, and a personal digital assistant; and the second electronic device can also be a wearable device, such as smart glasses, a smart bracelet, and a smart watch.
  • the wearable device is a device worn by the user on the user, and has a closer physical distance with the user than the portable device such as a mobile phone, a tablet or a personal digital assistant, and is less likely to be stolen or lost;
  • the feature can be fully utilized, and the second electronic device is configured as a wearable device to further improve application security of the first electronic device.
  • the method further comprises the following steps:
  • the first electronic device is controlled to operate in an unlocked state.
  • the first electronic device and the second electronic device are securely bound, and the first electronic device is in a safe application state, so that the first electronic device is controlled to operate in an unlocked state to facilitate user's use.
  • each application of the first electronic device can be normally used.
  • the security binding is disabled differently from the above-mentioned periodicity; the improvement here is that after the first electronic device is securely bound to the second electronic device, it may not be invalid for a long time, but the first electronic device is determined to be invalid.
  • the device works in the unlocked state or locked state, and includes the following steps;
  • the method further includes: Step Sill: After determining that the first electronic device and the second electronic device are securely bound, detecting whether the first electronic device establishes a connection with the second electronic device;
  • Step S112 If the connection has been established, extract the connection address of the second electronic device, and determine whether the connection address is consistent with the pre-stored binding address;
  • step S120 the first electronic device is controlled to operate in a locked state; if it is consistent, the first electronic device is controlled to operate in an unlocked state.
  • whether the first electronic device is currently in a safe use environment by determining whether the first electronic device and the second electronic device are connected further; determining to control whether the first electronic device operates in a locked state or is unlocked status.
  • the first electronic device may determine whether a connection is established with the second electronic device by using connection information stored therein It is also possible to determine whether a connection is established by transmitting a connection test message with the second electronic device.
  • the first electronic device detects whether a connection has been established with the second electronic device, and may be a detection at the time of the cycle, or may be detected when the user inputs the operation input to the first electronic device.
  • the detection may be performed; the number of times the first electronic device detects the connection with the second electronic device may be reduced, thereby reducing the power consumption of the first electronic device due to the detection, Increasing the standby duration of the first electronic device; using periodic or periodic detection to establish a connection, the response delay can be reduced; and the specific method can be selected by the user.
  • the test There are many ways to perform the test, and it is not limited to the above two.
  • the user may carry some mobile terminals for office or communication at any time, and may carry some wearable devices at the same time; when these devices are owned by the same user, usually the distance can be established [in particular, various connections can be established, especially Suitable for fast and easy connection in near field communication.
  • the near field communication method may include short-distance communication technologies such as Bluetooth, WIFI direct connection, and infrared; this can ensure that the first electronic device and the second electronic device are in a physical space that is close enough. Defining the second electronic device as a wearable device, fully utilizing the tight connection between the wearable device and the user, and determining the first through the connection between the first electronic device and the near field communication technology of the second electronic device When the electronic device leaves the safe use environment, it will be in a locked state, thereby avoiding the abuse of the first electronic device by the illegal user.
  • short-distance communication technologies such as Bluetooth, WIFI direct connection, and infrared
  • the first electronic device after determining that the first electronic device and the second electronic device are securely bound, requests to establish a connection between the first electronic device and the second electronic device; a connection address of the second electronic device; the connection address is different according to the connection type; specifically, if the first electronic device and the second electronic device are Bluetooth connections; the connection address is a Bluetooth address; the first electronic device
  • the connection with the second electronic device can be established by using the WIFI, and the connection address is a WIFI address; if the first electronic device and the second device can establish a connection through the mobile network, the connection address is the second electronic IP address or MAC address of the device.
  • the first electronic device matches the connection address with the pre-stored binding address, and the matching succeeds to indicate that the application environment of the first electronic device is safe at this time; if not, the description is performed.
  • the application environment is not secure. Specifically, if the first electronic device is a mobile phone; the second electronic device is a device that is carried by the user, such as a smart wristband, a smart watch, a smart glasses, and the like; If the two electronic devices are together, the Bluetooth connection can be successfully established; if the mobile phone is lost at this time, the distance between the mobile phone and the smart bracelet will be far, and it is obvious that the probability of successful establishment of the Bluetooth connection is low, and the mobile phone can be identified at this time.
  • the application environment is not secure enough.
  • step S112 if the first electronic device establishes a connection with the second electronic device, but the connection address of the second electronic device for establishing the connection of the first electronic device is different from the binding address, indicating that the first electronic device may be In a dangerous application environment, if the first electronic device is in an unlocked state at this time, the first electronic device will be allowed to be taken by the illegal user, so the first electronic device needs to be set to the locked state; when the connection address is tied Control the number when the address is the same An electronic device is operating in an unlocked state.
  • the first electronic device and the second electronic device are unable to establish a connection at the same time, it is also indicated that the first electronic device may be in a dangerous application environment, and if the first electronic device is in the unlocked state, the security will also be used. Insufficient problem, the same step S120 can be performed to control the first electronic device to work in the locked state.
  • the locked state and the unlocked state of the first electronic device there are various methods for implementing the locked state and the unlocked state of the first electronic device, such as setting a macro control switch in the first electronic device; and a state between the opening and closing of the macro control switch. Switching to switch between the unlock state of the first electronic device and the locked state.
  • the macroswitch can be implemented by loading and executing executable instructions to the first electronic device.
  • the locked state and the unlocked state may be implemented by using a processor in the first electronic device by executing executable instructions such as software or a program to implement applications or items of the first electronic device.
  • executable instructions such as software or a program to implement applications or items of the first electronic device.
  • the user may also obtain a binding or binding of the first electronic device and the second electronic device in the future, but the binding status is a non-secure binding condition, if the step S110 is performed.
  • the security binding may be established according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device.
  • the information of the second electronic device is pre-stored in the binding information of the first electronic device; the binding information may include information such as a binding address or a connection manner of the second electronic device.
  • the method in this embodiment further includes: The security binding is established according to the pre-stored binding information and the information of the first electronic device and the second electronic device.
  • the information is exchanged between the first electronic device and the second electronic device to establish
  • the security binding ensures that the first electronic device and the second electronic device are both at the legitimate user.
  • the information interaction between the first electronic device and the second electronic device may be based on information exchanged by the user according to any one of the prior art, and therefore will not be further elaborated herein.
  • the interaction between the pre-stored binding information and the information of the first electronic device and the second electronic device to establish a security binding includes:
  • Step S210 Send a connection request to the second electronic device according to the binding information.
  • Step S220 After the first electronic device is connected to the second electronic device, send a binding verification to the second electronic device.
  • Step S230 Receive the binding authentication information returned based on the verification information.
  • Step S240 Form and record binding security information according to the authentication information.
  • the first electronic device may send a corresponding connection request according to the pre-stored binding information; for example, the corresponding connection may be sent according to the connection manner in the pre-stored binding information.
  • the connection mode stored in the binding information is a Bluetooth connection
  • the first electronic device may automatically search for the nearby Bluetooth device or automatically find the second electronic device stored in the binding information when performing step S210. The binding address of the device, sending a connection request.
  • the second electronic device may respond to the connection request automatically or based on the user's indication; after the first electronic device receives the response of the second electronic device; the first electronic device The active party and the second electronic device can establish a connection; or the second electronic device establishes a connection between the first electronic device and the second electronic device as an active party after receiving the connection request.
  • the binding verification information may be any one of the binding information, and may also be information such as a binding identification code, such as a Bluetooth connection authentication code.
  • the binding authentication information may also be any information generated based on the binding verification information, such as a Bluetooth connection success feedback message.
  • the first electronic device and the second electronic device may be bound and connected according to the predetermined binding information, indicating that the first electronic device and the second electronic device may be carried by the user.
  • the first electronic device is in a secure application environment. Therefore, in the step S240, the binding security information may be established according to the binding authentication information itself or whether the binding authentication information is returned.
  • the binding security information may be a modification of a value of a security environment check bit stored in the first electronic device; specifically, the value 1 of the security environment check bit may indicate a security binding, and a security environment check bit
  • the value is 0 for non-secure binding. In the specific implementation process, 0 can be used for security binding, and 1 is for non-secure binding.
  • the use of the security environment check digit in the form of one or more bits to indicate whether to establish a secure binding has the advantage of being simple to implement.
  • the user may also cancel the old binding relationship and add a new binding relationship according to the usage status of the first electronic device and the second electronic device. Therefore, for further convenience, as shown in FIG.
  • the embodiment further provides the step of releasing the binding of the first electronic device and the second electronic device:
  • the binding release step includes:
  • Step S310 Receive a binding release indication.
  • Step S320 Detect whether the first electronic device is securely bound to the second electronic device.
  • Step S330 If the security binding is performed, delete the binding information and the binding security information.
  • the binding release indication of the receiving user may be used.
  • the second electronic device receives the binding request as the binding active direction.
  • the second electronic device may also serve as the active party for binding cancellation.
  • the child device After receiving the unbinding message of the second electronic device, the child device determines to unbind and modify the binding information. However, when unbinding, it is necessary to verify whether the current first electronic device is securely bound to the second electronic device; if it is not securely bound, it indicates that the current application environment of the first electronic device is not secure, and the unsafe environment is used. The binding is also released, and the illegal user may be allowed to take advantage of it; therefore, in the embodiment, the information security is improved again by the setting of step S320.
  • the interaction between the first electronic device and the second electronic device may be based on the pre-stored binding information.
  • Establish a security binding After establishing a security binding, re-execute the binding cancellation step.
  • the first electronic device and the second electronic device may realize the security binding of the information by using at least one information interaction; after completing a security binding risk certificate, after a certain time interval, the security The binding is automatically disabled to improve security again.
  • the binding failure period can be implemented; the failure period can be 10 minutes, 20 minutes, or 30 minutes; after the security binding continues for one failure period, it automatically expires, and the security binding is updated to be non-secure. set.
  • the security binding may also be one-time; when the user completes one operation or multiple consecutive operations, the security binding automatically fails, and the specific implementation manners are various, and are not included here - enumerated .
  • the embodiment provides an information processing method.
  • the security of the first electronic device is verified by the association between the first electronic device and the second electronic device, thereby improving the probability of reducing the transmission of the information security incident.
  • the scene including mobile payment, secret information reading, etc.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • an embodiment of the present invention provides an electronic device, where the electronic device is a first electronic device, and includes:
  • the detecting unit 110 is configured to detect whether the first electronic device is securely bound to the second electronic device;
  • the control unit 120 is configured to control the first electronic device to operate in a locked state when the first electronic device and the second electronic device are not securely bound; when the electronic device operates in a locked state At least part of the application of the electronic device is prohibited from being used.
  • the specific physical structure of the detecting unit 110 and the control unit 120 may include a processor; the processor may have processing capabilities such as a central processing unit, a microprocessor, a single chip microcomputer, a digital signal processor, and a programmable logic array. The structure can be performed by the execution of executable instructions.
  • the detecting unit 110 and the control unit 120 may be integrated to correspond to one processor, or may respectively correspond to different processors, and the specific implementation manners are various, and are not expanded here.
  • control unit 120 is further configured to control the first electronic device to operate in an unlocked state when the first electronic device and the second electronic device are securely bound.
  • the locking function is that the at least part of the function of the first electronic device cannot be applied, and the part of the function may be a core function of the first electronic device, such as a communication, an inquiry of the encrypted information, etc., and may be set by the user.
  • the unlocking state is a normal use state of the first electronic device, and when the first electronic device operates in an unlocked state, the user completes each achievable by the first electronic device by interacting with the first electronic device.
  • Kind of function is a normal use state of the first electronic device, and when the first electronic device operates in an unlocked state, the user completes each achievable by the first electronic device by interacting with the first electronic device.
  • the electronic device in this embodiment is further improved.
  • the electronic device further includes a connecting unit 111, and a determining unit. 112;
  • the connecting unit 111 is configured to detect whether the first electronic device establishes a connection with the second electronic device when the first electronic device and the second electronic device are securely bound; the determining unit 112, Arranged when the first electronic device and the second electronic device have been When the connection is established, extracting a connection address of the second electronic device, and determining whether the connection address is consistent with a pre-stored binding address;
  • the control unit 120 is further configured to: when the connection address of the second electronic device is consistent with the pre-stored binding address, control the first electronic device to operate in an unlocked state; when the second electronic device is connected When the address is inconsistent with the pre-stored binding address, the first electronic device is controlled to operate in a locked state.
  • the connecting unit 111 is further configured to establish a connection between the first electronic device and the second electronic device when the first electronic device is not connected to the second electronic device.
  • connection unit 111 may include a connection interface; the connection interface may be a wired connection interface or a wireless connection interface; specifically, a connection interface such as a Bluetooth connection interface or a WIFI connection interface; and the WIFI connection interface is preferably WIFI straight
  • the connection port is configured to establish a WIFI direct connection between the first electrical device and the second electronic device.
  • the first electronic device and the second electronic device may establish a connection in various manners.
  • the first electronic device and the second electronic device preferably establish a connection by using a near field communication manner; specifically, such as Bluetooth or infrared. , WIFI and other technologies.
  • the specific structure of the determining unit 112 may be a processor; the processor may be a processing unit having a processing capability such as a central processing unit, a microprocessor, a single chip microcomputer, a digital signal processor, and a programmable logic array.
  • the operation of the executable instruction performs the above operations; the detection unit 110 and the control unit 120 may be integrated to correspond to one processor, or may respectively correspond to different processors, and the specific implementation manners are various, and are not performed here. Expanded.
  • the first electronic device in this embodiment may be a mobile terminal such as a mobile phone, a tablet computer, or a personal digital processing; the second electronic device may also be the same mobile terminal as the first electronic device, and the second electronic device may also be It can be a wearable device such as smart glasses, smart bracelets and smart watches.
  • the first electronic device described in this embodiment provides the information processing method according to the first embodiment.
  • the hardware support can be used to implement any one of the technical solutions described in the embodiment, and the security of the information in the application process of the first electronic device is also improved.
  • the first electronic device further includes:
  • a binding unit configured to: when the first electronic device and the second electronic device are not securely bound, establish security according to pre-stored binding information and information of the first electronic device and the second electronic device Bind.
  • the specific structure of the binding unit may also include a processor and a storage medium; the storage medium stores information such as binding information and binding security information; and the binding unit may establish a mapping relationship or a relationship table, etc.
  • binding of the first electronic device to the second electronic device is implemented. Specifically, a binding table is established; the device located in the binding table establishes a binding second electronic device for the electronic device.
  • the binding of the second electronic device can be deleted from the binding table by deleting the binding; the binding mode and the binding release mode are simple and fast.
  • the storage medium can be
  • Various storage media such as ROM, RAM or Flash are preferably non-transitory storage media in this embodiment.
  • the first electronic device is a second electronic device that is a mobile electronic device
  • the first electronic device and the second electronic device establish a connection by using a near field communication manner.
  • a near field communication mode refer to the first embodiment and the corresponding parts of the embodiment, which are not described in detail herein.
  • the first electronic device further includes a sending unit and a receiving unit;
  • the sending unit is configured to send a connection request to the second electronic device according to the binding information; and send a binding to the second electronic device after the first electronic device is connected to the second electronic device verify message;
  • the receiving unit is configured to receive the binding authentication information returned based on the binding verification information
  • the binding unit is configured to form and record a binding security message according to the binding authentication information. Interest.
  • the specific physical structure of the sending unit may be a sending interface; specifically, a transmitting antenna or a transmitting antenna array.
  • the first electronic device sends information to the second electronic device through the sending unit, by using the sending unit, for binding information and binding security information.
  • the specific structure of the sending unit may be a sending interface, such as various types of transmitting antennas, such as a Bluetooth transmitting antenna, a WIFI antenna, etc.; the receiving interface may be a receiving interface, such as various types of receiving antennas, such as Bluetooth receiving. Antenna, WIFI antenna and other structures; there are more than 4 specific structures, so I won't go into details here.
  • the first electronic device is further used for binding release, and specifically the first electronic device further includes an input unit;
  • the input unit is configured to receive a binding release indication
  • the detecting unit is configured to: when detecting the binding release indication, detecting whether the first electronic device is securely bound to the second electronic device;
  • the binding unit is configured to delete the binding information and the binding security information when the first electronic device and the second electronic device are securely bound.
  • the specific physical structure of the input unit may be a physical or virtual keyboard, a touch or non-touch interactive screen or a voice input device on the first electronic device, and the user receives a binding release indication for the user.
  • the binding of the first electronic device and the second electronic device can be cancelled based on the user indication, so that the user can release and add the binding at any time, thereby improving the user's feeling of use.
  • the first electronic device described in this embodiment has the advantage of high intelligence.
  • the binding unit is configured to receive a binding release indication at the input unit, and the detecting unit detects that a security binding is not established between the first electronic device and the second electronic device, Pre-stored binding information and information of the first electronic device and the second electronic device Mutual, interactive establishment of security bindings;
  • the binding unit is configured to release the binding between the first electronic device and the second electronic device after the first electronic device establishes a security binding with the second electronic device.
  • the first electronic device may be a mobile device such as a mobile phone, a tablet computer, or a personal digital assistant, and may specifically be a mobile terminal, and may perform information interaction by using a network element such as a wired or wireless network server.
  • the second electronic device can also be a mobile electronic device such as a mobile phone, a tablet computer, and a personal digital processing; and the second electronic device can also be a wearable device, such as smart glasses, a smart bracelet, a smart watch, and the like.
  • Mobile electronic devices when establishing a connection between the first electronic device and the second electronic device, it is preferably a near field communication connection, such as a Bluetooth, WIFI, and infrared connection manner.
  • the wearable device is a device worn by the user on the hand, and has a closer physical distance with the user than the portable device such as a mobile phone, a tablet or a personal digital assistant, and is less likely to be stolen or lost;
  • the feature can be fully utilized, and the second electronic device is configured as a wearable device to further improve application security of the first electronic device.
  • FIG. 7 is a system diagram of a first electronic device and a second electronic device; the first electronic device is a mobile terminal 220; and the second electronic device is a wearable device 210.
  • the first electronic device and the second electronic device interact in near field communication through respective wireless communication units.
  • the mobile terminal 220 includes a detecting unit and a control unit.
  • the mobile terminal may further include a binding unit and a connection unit to implement a process of binding, secure binding, and establishing a connection.
  • the first electronic device in the embodiment has the advantages of simple structure, high compatibility with the prior art, and greatly improved information security, and provides specific hardware support for the information processing method described in the first embodiment, which can be used for The technical solution described in any one of the first embodiments is implemented.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute any one of the first embodiment. At least one of the methods described in the technical solution; specifically, the method illustrated in FIG. 1 may be performed by executing the computer executable instructions.
  • the storage medium may be a storage medium such as a USB flash drive, a removable hard disk, an optical disk, a DVD, or a VCD; preferably, the storage medium is a non-transitory storage medium.
  • the first electronic device is a mobile phone; the second electronic device is a wearable device; the connection established between the first electronic device and the second electronic device is a Bluetooth connection; and the application is performed by the first electronic device.
  • the mobile payment scenario Under the mobile payment scenario. The following are specific implementations:
  • Figure 8 is the security environment binding process of this example.
  • Step S100 detecting a security environment check bit to check whether a secure binding is implemented between the mobile phone and the wearable device;
  • the security environment insurance risk bit may be 1 or more bits; when the security environment check bit is When it is 1 bit, it usually means that the mobile phone and the wearable device are securely bound, otherwise it is not securely bound;
  • step S200 If the security environment check digit is 1, go to step S200.
  • step S300 If the security environment check bit is 0, then proceed to step S300;
  • Step S200 Start a security environment verification process.
  • the security environment verification process may be determined by determining whether a connection is established between the first electronic device and the second electronic device.
  • the mobile phone may be verified.
  • the connection may preferably be a Bluetooth connection;
  • Step S300 The mobile phone requests to perform a Bluetooth connection. If the security environment check is 0, it indicates that no connection is established between the mobile phone and the wearable device, and the first electronic device may send a connection establishment request to the second electronic device, such as establishing a Bluetooth connection. ;
  • Step S400 determining whether the Bluetooth connection is successful
  • step S500 If yes, proceed to step S500; If no, return to step S300;
  • Step S500 The mobile phone sends a Bluetooth authentication code to the wearable device, and proceeds to step S600.
  • Step S600 The wearable device confirms the Bluetooth authentication code and returns the authentication information, and the control unit of the mobile phone generates and stores the binding release code according to the mobile phone information.
  • Step S700 The mobile phone records the Bluetooth address of the wearable device according to the authentication information returned by the wearable device.
  • Step S800 The mobile phone sets the security environment binding flag to 1;
  • Step S900 The binding is completed.
  • Figure 9 is the binding release process for this example.
  • Step S101 The mobile phone receives an unbinding indication.
  • Step S102 The mobile phone sends a Bluetooth authentication code to the wearable device;
  • the authentication code includes information such as a Bluetooth address of the mobile phone;
  • Step S103 Receive and verify the mobile phone information by using the Bluetooth authentication code, and determine whether the mobile phone and the wearable device are securely bound according to the verification result.
  • step S104 If no, go to step S104;
  • Step S104 The session end unbinding fails.
  • Step S105 The mobile phone receives and sends a Bluetooth verification code to the user; the user inputs the Bluetooth verification code in the unbinding control interface;
  • Step S106 Calculate the binding release code according to the Bluetooth verification code, and compare it with the binding release code formed when binding.
  • Step S107 Returning verification code back verification information; wherein, the verification information may further include unbinding flag information and Bluetooth address information; the verification code may be obtained by using a Bluetooth address calculation; Step S108: After the mobile phone receives the verification information, the verification code is displayed; the user manually inputs the verification code on the mobile phone, and the mobile phone determines whether the verification code is correct;
  • step S 109 If it is correct, proceed to step S 109
  • Step S109 The binding is successfully terminated, and the location of the security environment binding flag is 0.
  • FIG. 10 is a schematic diagram of controlling the first electronic device to operate in an unlocked state or a locked state according to the present example.
  • Step S001 View the mobile phone control function flag bit; when the mobile phone control function flag is fasle, the process proceeds to step S002; when the mobile phone control function flag is true, the process proceeds to step S003; step S002: the process ends; If the module function information flag is fasle, it indicates whether the mobile phone establishes a security binding with the wearable device and/or establishes a connection, and whether the function of the mobile phone is in a locked state and/or an unlocked state has no effect;
  • Step S003 detecting the security environment binding flag bit; if the security environment binding flag bit is 0, proceeding to step S004; if the security environment binding flag bit is 1, proceeding to step S005;
  • Step S004 Binding the mobile phone to the wearable device, and recording the Bluetooth address of the wearable device;
  • Step S005 determining whether the mobile phone and the wearable device have established a Bluetooth connection
  • step S006 If no, go to step S006;
  • Step S006 The mobile phone works in a locked state
  • Step S007 determining whether the Bluetooth address is consistent with the binding address.
  • step S006 If no, go to step S006;
  • Step S008 The mobile phone works in an unlocked state.
  • the main application is on a mobile phone and a wearable device; the first electronic device can be a hand
  • the second electronic device is a wearable device; the mobile phone and the wearable device are connected and communicated by near field communication.
  • Wearable smart device module Connects with the mobile terminal in wireless communication, and can obtain data from the mobile terminal.
  • Mobile terminal encryption and decryption module (binding control module): The mobile terminal works in a locked state or an unlocked state, and is controlled by a macro control switch. When the mobile phone and the wearable device are securely bound and connected, the mobile terminal The macro control switch is placed in the open state. At this time, the encryption program such as the screen lock of the mobile terminal, the privacy space lock, and the APP lock are all unlocked, and the authority is in an open state, and the user can apply various functions of the first electronic device mobile phone. When the mobile terminal is not securely bound and/or disconnected from the wearable device, the mobile terminal macro switch is placed in close, and the encryption program such as the mobile terminal screen lock, privacy space lock, and APP lock is locked. , application permissions are turned off.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

本发明公开了一种信息处理方法及电子设备,为提高电子设备的使用安全而设计。所述信息处理方法包括:检测第一电子设备是否与第二电子设备已安全绑定;若未安全绑定,则控制所述第一电子设备工作在加锁状态;当所述电子设备工作在加锁状态时,所述电子设备的至少部分应用被禁止使用。本发明还同时公开了一种计算机存储介质。

Description

信息处理方法、 电子设备和计算机存储介质 技术领域
本发明涉及通信领域的信息处理技术, 尤其涉及一种信息处理方法、 电子设备和计算机存储介质。 背景技术
随着通信技术及电子信息技术的发展, 移动电子设备应用越来越广泛, 移动电子设备因其便于携带的特性, 便于用户携带的同时, 也导致偷窃现 象的增多; 非法用户非法持有移动电子设备后, 可能获得存储在电子设备 内的用户的隐私信息; 利用电子设备内已安装的程序或应用进行一些基于 电子设备授权的非法操作; 如移动支付等; 此外, 非法用户持有移动电子 设备后, 还可能恶意使用移动电子设备的各种付费服务, 导致合法用户的 不良使用记录或财产损失;
故避免非法用户对移动电子设备的非法使用是现有技术亟待解决的一 个问题。
发明内容
有鉴于此, 本发明实施例期望提供一种信息处理方法、 电子设备和计 算机存储介质, 以降低非法用户对电子设备的非法使用的概率。
为达到上述目的, 本发明实施例的技术方案是这样实现的:
本发明实施例第一方面提供一种信息处理方法, 所述方法包括: 检测第一电子设备是否与第二电子设备已安全绑定;
若未安全绑定, 则控制所述第一电子设备工作在加锁状态; 当所述电 子设备工作在加锁状态时, 所述电子设备的至少部分应用被禁止使用。 优选地, 所述方法还包括:
若已安全绑定, 则控制所述第一电子设备工作在解锁状态。
优选地, 所述方法还包括:
在确定所述第一电子设备与所述第二电子设备已安全绑定之后, 检测 所述第一电子设备是否与所述第二电子设备已建立连接;
若已建立连接, 提取所述第二电子设备的连接地址, 并判断所述连接 地址与预先存储的绑定地址是否一致;
若不一致, 则进入控制所述第一电子设备工作在加锁状态的步骤。 优选地, 所述方法还包括:
若一致, 则进入控制所述第一电子设备工作在解锁状态的步骤。
优选地, 所述方法还包括:
若未建立连接, 则依据所述绑定地址建立与所述第二电子设备的连接。 优选地,
若未安全绑定, 则依据预先存储的绑定信息及基于第一电子设备与第 二电子设备的信息交互, 建立安全绑定。
优选地, 所述依据预先存储的绑定信息及第一电子设备与第二电子设 备的信息交互, 建立安全绑定包括:
依据所述绑定信息向第二电子设备发送连接请求;
当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息;
接收所述基于所述绑定验证信息返回的绑定认证信息;
依据所述绑定认证信息生成并记录绑定安全信息;
其中, 所述绑定安全信息为检测所述第一电子设备与所述第二电子设 备已安全绑定的依据。 优选地, 所述方法还包括第一电子设备与第二电子设备绑定解除步骤: 所述绑定解除步骤包括:
接收绑定解除指示;
检测所述第一电子设备是否与所述第二电子设备已安全绑定; 若已安全绑定, 则删除所述绑定信息及所述绑定安全信息。
优选地, 所述绑定解除步骤还包括:
若非安全绑定, 则依据预先存储的绑定信息及第一电子设备与第二电 子设备的信息交互, 建立安全绑定;
建立安全绑定后, 重新执行所述绑定解除步骤。
优选地, 所述第一电子设备为第二电子设备均为移动电子设备; 所述第一电子设备与所述第二电子设备通过近场通信方式建立连接。 优选地, 所述第一电子设备为移动通信设备; 所述第二电子设备为可 穿戴电子设备。
本发明实施例第二方面提供一种电子设备, 所述电子设备为第一电子 设备, 包括:
检测单元, 配置为检测第一电子设备是否与第二电子设备已安全绑定; 控制单元, 配置为当所述第一电子设备与所述第二电子设备未安全绑 定时, 控制所述第一电子设备工作在加锁状态;
其中, 当所述电子设备工作在加锁状态时, 所述电子设备的至少部分 应用被禁止使用。
优选地,
所述控制单元, 还配置为当所述第一电子设备与所述第二电子设备已 安全绑定时, 控制所述第一电子设备工作在解锁状态。
优选地,
所述电子设备还包括连接单元、 及判断单元; 所述连接单元, 配置为在确定所述第一电子设备与第二电子设备已安 全绑定之后, 检测所述第一电子设备是否与所述第二电子设备已建立连接; 所述判断单元, 配置为当所述第一电子设备与所述第二电子设备已建 立连接时, 提取所述第二电子设备的连接地址, 并判断所述连接地址与预 先存储的绑定地址是否一致;
所述控制单元, 配置为当所述第二电子设备的连接地址与预先存储的 绑定地址不一致时, 控制所述第一电子设备工作在加锁状态。
优选地,
所述控制单元, 还配置为当所述第二电子设备的连接地址与预先存储 的绑定地址一致时, 控制所述第一电子设备工作在解锁状态。
优选地,
所述连接单元, 还配置为当所述第一电子设备与所述第二电子设备未 建立连接时, 建立所述第一电子设备与所述第二电子设备的连接。
优选地,
所述第一电子设备还包括:
绑定单元, 配置为当所述第一电子设备与所述第二电子设备为未安全 绑定时, 依据预先存储的绑定信息及第一电子设备与第二电子设备的信息 交互, 建立安全绑定。
优选地,
所述第一电子设备还包括发送单元和接收单元;
所述发送单元, 配置为依据所述绑定信息向第二电子设备发送连接请 求; 当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息;
所述接收单元, 配置为接收所述基于所述绑定验证信息返回的绑定认 证信息; 所述绑定单元, 配置为依据所述绑定认证信息生成并记录绑定安全信 息;
其中, 所述绑定安全信息为检测所述第一电子设备与所述第二电子设 备已安全绑定的依据。
优选地,
所述第一电子设备还包括输入单元;
所述输入单元, 还配置为接收绑定解除指示;
所述检测单元, 还配置为在接收到所述绑定解除指示时, 检测所述第 一电子设备是否与所述第二电子设备已安全绑定;
所述绑定单元, 还配置为在所述第一电子设备与所述第二电子设备已 安全绑定时, 删除所述绑定信息及所述绑定安全信息。
优选地,
所述绑定单元, 还配置为在所述输入单元接收到绑定解除指示, 所述 检测单元检测到第一电子设备与所述第二电子设备之间未安全绑定时, 依 据预先存储的绑定信息及第一电子设备与第二电子设备的信息交互, 交互 建立安全绑定;
所述绑定单元, 还配置为在接触绑定中第一电子设备与第二电子设备 建立安全绑定后, 解除所述第一电子设备与第二电子设备之间的绑定。
优选地,
所述第一电子设备为第二电子设备均为移动电子设备;
所述第一电子设备与所述第二电子设备通过近场通信方式建立连接; 优选地,
所述第一电子设备为移动通信设备; 所述第二电子设备为可穿戴电子 设备。
本发明实施例还提供一种计算机存储介质, 所述计算机存储介质中存 储有计算机可执行指令, 所述计算机可执行指令用于执行本发明实施例第 一方面所述方法的至少其中之一。
本发明实施例所述的信息处理方法、 电子设备和计算机存储介质, 确 定第一电子设备是否与所述第二电子设备已安全绑定; 若未安全绑定时, 说明此时第一电子设备可能处于不安全状态如被非法用户所持有; 控制所 述第一电子设备工作在加锁状态; 则至少所述第一电子设备的部分应用无 法使用; 从而避免了非法用户对电子设备的滥用, 导致合法用户的财产及 信用的损失。 附图说明
图 1为本发明实施例一所述的信息处理方法的流程示意图之一; 图 2为本发明实施例一所述的信息处理方法的流程示意图之二; 图 3 为本发明实施例一所述第一电子设备与第二电子设备安全绑定示 意图;
图 4为本发明实施例一所述第一电子设备与第二电子设备绑定解除示 意图;
图 5为本发明实施例二所述第一电子设备的结构示意图之一; 图 6为本发明实施例二所述第一电子设备的结构示意图之二; 图 7 为本发明实施例所述的第一电子设备与第二电子设备之间的连接 示意图;
图 8为本发明示例所述的安全绑定示意图;
图 9为本发明示例所述的绑定解除示意图;
图 10为本发明示例所述的信息处理方法流程图。 具体实施方式
以下结合附图对本发明的优选实施例进行详细说明, 应当理解, 以下 所说明的优选实施例仅用于说明和解释本发明, 并不用于限定本发明。 以下结合说明书附图及具体实施例对本发明的技术方案做进一步详细 的阐述。
实施例一:
如图 1所示、 本实施例提供一种信息处理方法, 所述方法包括: 步骤 S110: 检测第一电子设备是否与第二电子设备已安全绑定; 步骤 S120: 若未安全绑定, 则控制所述第一电子设备工作在加锁状态; 当所述电子设备工作在加锁状态时, 所述电子设备的至少部分应用被禁止 使用。
在步骤 S110中所述安全绑定, 可以通过所述第一电子设备中是否形成 了绑定安全信息来确定; 所述绑定安全信息可以是安全绑定标识位、 安全 绑定字段或图片等任意实现了安全绑定后形成的信息。
在所述步骤 S120中, 在检测到第一电子设备与所述第二电子设备未安 全绑定时, 控制所述第一电子设备工作在加锁状态, 从而至少所述第一电 子设备的部分应用或全部应用被禁止使用。
当采用部分禁止使用时, 优选选择安全等级要求高于安全等级阈值的 应用设置为禁止使用的应用; 具体的如移动支付、 作为主动方发起呼叫及 重要文件读写等应用。 所述应用的安全等级可以由用户进行设置, 也可是 第一电子设备根据各应用在具体使用时, 所涉及的信息自动赋予安全等级; 并将安全等级高于安全等级阈值的应用设置为加锁状态下禁止使用的应 用。
当为全部禁止应用时, 则在加锁状态下用户根本无法操作所述第一电 子设备, 如在加锁状态下, 屏幕不正常显示, 实体控件或虚拟控件不响应 操作等; 这样即便是非法用户持有了第一电子设备也无法使用, 从而将从 根本上降低盗窃现象的发生。 在具体的实现过程中, 所述第一电子设备与所述第二电子设备的通过 信息交互建立安全绑定; 此外还可以给所述安全绑定设置有效时间; 当所 述有效时间失效时, 则所述第一电子设备与所述第二电子设备之间的安全 绑定失效, 需要重新通过第一电子设备与第二电子设备之间的信息交互建 立安全绑定, 这样有利于再次提高第一电子设备的应用安全性。
在本实施例中所述第一电子设备可为手机、 平板电脑及个人数字助理 等移动设备, 具体可为移动终端, 可通过有线或无线与网络的服务器等网 元进行信息交互。 所述第二电子设备同样的可为手机、 平板电脑及个人数 字助理等移动电子设备; 此外所述第二电子设备还可为可穿戴设备, 具体 的如智能眼镜、 智能手环及智能手表等移动电子设备。 所述可穿戴设备顾 名思义为用户穿戴在用户身上的设备, 相对于手机、 平板或个人数字助理 等这些可携带设备, 与用户保持了更加紧密的物理距离, 被盗窃或遗失的 可能性更小; 本实施例中可充分利用该特点, 将所述第二电子设备设置为 可穿戴设备, 以进一步提高第一电子设备的应用安全性。
优选地, 所述方法还包括以下步骤:
若第一电子设备与第二电子设备已安全绑定, 则控制所述第一电子设 备工作在解锁状态。 第一电子设备与第二电子设备已安全绑定, 则说明此 时第一电子设备处于安全应用状态, 故控制所述第一电子设备工作在解锁 状态, 以方便用户的使用。 通常当第一电子设备工作在解锁状态下时, 所 述第一电子设备的各应用都可正常使用。
作为本实施例的进一步改进, 不同于上述周期性的使安全绑定失效; 此处改进为第一电子设备与第二电子设备安全绑定之后可以长时间不失 效, 但是在确定使第一电子设备工作在解锁状态或加锁状态还包括以下步 骤; 具体如下
如图 2所示, 所述方法还包括: 步骤 Sill : 在确定所述第一电子设备与所述第二电子设备已安全绑定 之后, 检测所述第一电子设备是否与所述第二电子设备建立连接;
步骤 S112: 若已建立连接, 提取所述第二电子设备的连接地址, 并判 断所述连接地址与预先存储的绑定地址是否一致;
若不一致,则所述步骤 S120中控制所述第一电子设备工作在加锁状态; 若一致时, 则控制所述第一电子设备工作在解锁状态。
作为本实施例的进一步改进, 通过第一电子设备与第二电子设备是否 连接进一步的确定, 当前第一电子设备是否处于安全使用环境中; 进而确 定控制第一电子设备工作在加锁状态还是解锁状态。
在具体的实现过程中, 所述第一电子设备与所述第二电子设备是否已 建立连接; 所述第一电子设备可以通过存储在其内部的连接信息确定是否 与第二电子设备建立了连接, 也可以通过与第二电子设备的连接测试消息 的发送来来确定是否建立了连接。 所述第一电子设备检测是否与第二电子 设备已建立连接, 可以是周期时的检测, 还可以是接收到用户对第一电子 设备的操作输入时进行检测。 在接收到用户对第一电子设备的操作输入时 进行检测; 可以减少第一电子设备检测是否与第二电子设备已建立连接的 次数, 进而可减少第一电子设备因检测形成的功耗, 可增长第一电子设备 的待机时长; 采用周期性或定期的检测是否建立连接, 可以减少响应时延; 具体的采用哪种方式, 可以由用户进行需要选择设定。 进行检测的方式还 有艮多种, 不局限于上述两种。
在本实施例中, 利用用户可能随时携带一些办公或通讯用的移动终端, 同时可能会携带一些可穿戴设备; 而这些设备被同一用户拥有时, 通常距 离 [艮近可以建立各种连接, 尤其适用于近场通信方式这种方便快捷的连接。
所述近场通信方式可包括蓝牙、 WIFI直连以及红外等近距离通信技术; 这样能保证第一电子设备与第二电子设备在足够近的物理空间内。 将所述第二电子设备限定为可穿戴设备, 充分的利用了可穿戴设备与 用户的紧密连接性, 并通过第一电子设备与第二电子设备的近场通信技术 的连接, 确定了第一电子设备离开安全使用环境时, 将处于加锁状态, 从 而避免了非法用户对第一电子设备的滥用。
所述步骤 S111至 112中, 当确定第一电子设备和第二电子设备安全绑 定后, 第一电子设备作为发起方, 请求建立第一电子设备与第二电子设备 的连接; 并获取所述第二电子设备的连接地址; 所述连接地址根据连接类 型不同而不同; 具体的若第一电子设备与第二电子设备是蓝牙连接; 则所 述连接地址为蓝牙地址; 所述第一电子设备与第二电子设备的连接可通过 WIFI建立, 则所述连接地址是 WIFI地址; 若所述第一电子设备与所述第 二设备可通过移动网络建立连接, 则所述连接地址为第二电子设备的 IP地 址或 MAC地址等。
在获取了所述连接地址以后, 所述第一电子设备将所述连接地址与预 先存储的绑定地址进行匹配, 匹配成功说明此时第一电子设备的应用环境 安全; 若不成功则说明此时应用环境不安全。 具体的若所述第一电子设备 为手机; 所述第二电子设备为用户随身携带的意见可穿戴设备, 如智能手 环、 智能手表及智能眼镜等设备; 若此时第一电子设备与第二电子设备在 一起, 则能成功建立蓝牙连接; 若此时手机丟失, 则手机与所述智能手环 的距离将很远, 显然蓝牙连接建立成功的几率很低, 则可识别出手机此时 的应用环境不够安全。
在步骤 S112中, 通常若第一电子设备与第二电子设备建立了连接, 但 是第二电子设备用于第一电子设备建立连接的连接地址与绑定地址不同, 表示此时第一电子设备可能出于危险应用环境中, 若此时第一电子设备依 据处于解锁状态, 将导致第一电子设备被非法用户有机可乘, 故需将第一 电子设备设置为加锁状态; 当连接地址与绑定地址相同时, 才控制所述第 一电子设备工作在解锁状态。
此外, 若第一电子设备与第二电子设备压根就无法建立连接, 此时同 样表明第一电子设备可能出于危险应用环境中, 若第一电子设备工作在解 锁状态, 同样也将使用安全性不够的问题, 故同样可执行步骤 S120控制第 一电子设备工作在加锁状态。
具体的实现所述第一电子设备的加锁状态和解锁状态的方法有多种, 具体的如在所述第一电子设备中设置宏控开关; 通过宏控开关的开和关之 间的状态切换, 来实现第一电子设备解锁状态和加锁状态之间的切换。 所 述宏控开关可以通过向第一电子设备加载并执行可执行指令来实现。 在具 体的实现过程中, 所述加锁状态和解锁状态, 可以通过第一电子设备内的 处理器通过对软件或程序等可执行指令的执行, 来实现对第一电子设备各 个应用或各项功能的加锁状态和解锁状态的控制, 具体的实现过程在此就 不再进一步赘述了。
在具体的实现过程中, 可能出现用户还未来得及进行第一电子设备与 第二电子设备的绑定或已经绑定但是绑定状况为非安全绑定状况的情况, 若在所述步骤 S110 中检测出第一电子设备与第二电子设备为非安全绑定 时, 可依据预先存储的绑定信息及基于第一电子设备与第二电子设备的信 息交互, 建立安全绑定。
通常所述第二电子设备的信息预先存储在所述第一电子设备中绑定信 息; 所述绑定信息可包括第二电子设备的绑定地址或连接方式等信息。
优选地, 在步骤 S110中, 检测出所述第一电子设备与所述第二电子设 备未安全绑定时, 此时为了方便用户进行操作, 本实施例所述方法还包括: 若未安全绑定, 则依据预先存储的绑定信息及第一电子设备与第二电 子设备的信息交互, 建立安全绑定。
在本实施例中通过第一电子设备与第二电子设备的信息交互, 来建立 安全绑定, 确保了此时第一电子设备与第二电子设备都在合法用户身边。 所述第一电子设备与第二电子设备的信息交互可以是比照现有技术中任意 一种基于用户指示的信息交互, 故在此不再进行进一步的详细阐述。 在本 实施例中强调基于用户指示, 能进一步确保第一电子设备与第二电子设备 同时在合法用户的控制下, 从而再次增强了安全性。
如图 3 所示, 所述依据预先存储的绑定信息及第一电子设备与第二电 子设备的信息交互, 交互建立安全绑定包括:
步骤 S210: 依据所述绑定信息向第二电子设备发送连接请求; 步骤 S220: 当所述第一电子设备与所述第二电子设备连接建立后, 向 所述第二电子设备发送绑定验证信息;
步骤 S230: 接收所述基于所述验证信息返回的绑定认证信息; 步骤 S240: 依据所述认证信息形成并记录绑定安全信息。
在执行具体的操作之前, 所述步骤 S210所述第一电子设备可以根据预 先存储好的绑定信息, 发送相应的连接请求; 如可以根据预先存储的绑定 信息中的连接方式发送相应的连接请求; 如绑定信息中存储的连接方式为 蓝牙连接, 则第一电子设备在执行步骤 S210时, 就可自动或基于用户指示 的自动搜索附近蓝牙设备, 找到绑定信息中存储的第二电子设备的绑定地 址, 发送连接请求。
第二电子设备接收到第一电子设备的请求后, 可能会自动的或基于用 户指示的响应所述连接请求; 当所述第一电子设备接收到第二电子设备的 响应之后; 第一电子设备作为主动方与第二电子设备即可建立连接; 或者 第二电子设备接收到连接请求后作为主动方建立第一电子设备与第二电子 设备的连接。
当第一电子设备与第二电子设备建立连接后, 第一电子设备向第二电 子设备发送绑定验证信息; 第二电子设备将依据绑定验证信息验证, 形成 绑定认证信息;故步骤 S230中,第一电子设备还将接收所述绑定认证信息。 所述绑定验证信息具体的可是所述绑定信息中的任意一种, 还可是绑 定识别码等信息, 具体如蓝牙连接认证码等。 所述绑定认证信息, 也可是 基于所述绑定验证信息生成的任意信息, 如蓝牙连接成功反馈消息等。
连接建立成功后, 说明此时第一电子设备与第二电子设备之间可以按 照预定绑定信息, 建立绑定及连接, 说明此时第一电子设备与第二电子设 备可能都被用户携带, 第一电子设备处于安全的应用环境当中, 故在所述 步骤 S240中, 可依据绑定认证信息本身或是否有返回绑定认证信息, 建立 绑定安全信息。 所述绑定安全信息可为存储在第一电子设备中的安全环境 校验位的值的修改; 具体如所述安全环境校验位的值 1 可表示安全绑定, 安全环境校验位的值为 0为非安全绑定; 在具体的实现过程中, 也可以是 0 表示安全绑定, 1为非安全绑定; 具体的方式有多种, 就不在此进行详细阐 述。 采用安全环境校验位这种 1 个或多个比特位的形式来指示是否建立安 全绑定, 具有实现简便的优点。
在具体的使用时, 用户根据第一电子设备与第二电子设备的使用状况, 还可能解除旧的绑定关系, 增加新的绑定关系; 故为了进一步方便使用, 如图 4所示, 本实施例还进一步提供了第一电子设备与第二电子设备绑定 解除的步骤:
所述绑定解除步骤包括:
步骤 S310: 接收绑定解除指示;
步骤 S320:检测所述第一电子设备是否与所述第二电子设备安全绑定; 步骤 S330: 若已安全绑定, 则删除所述绑定信息及所述绑定安全信息。 所述步骤 S310中可为接收用户的绑定解除指示。
所述步骤 S320作为绑定主动方向第二电子设备接收绑定请求; 在具体 的实现过程中, 所述第二电子设备也可以作为绑定解除的主动方, 第一电 子设备在接收到第二电子设备的解除绑定消息后, 确定解除绑定并修改绑 定信息。 但是在解除绑定时, 必须验证当前第一电子设备是否与第二电子 设备已安全绑定; 若未安全绑定, 表明第一电子设备当前的应用环境并不 安全, 在不安全的使用环境下还解除绑定, 有可能让非法用户有机可乘; 故本实施例中通过步骤 S320的设置, 再次提高了信息安全。
作为绑定解除的进一步补充, 在所述第一电子设备与第二电子设备未 安全绑定时, 可通依据预先存储的绑定信息及基于第一电子设备与第二电 子设备的信息交互, 建立安全绑定; 建立安全绑定后, 重新执行所述绑定 解除步骤。
这样方便用户的绑定操作。
在具体的实现过程中, 第一电子设备与第二电子设备可以通过至少一 次信息交互实现信息实现安全绑定的险证; 当完成一次安全绑定险证后, 间隔一定时间后, 所述安全绑定自动失效, 以再次提高安全性能。 具体的 实现过程中, 可以采用绑定失效周期来实现; 失效周期可为 10分钟、 20分 钟或 30分钟; 安全绑定持续了一个失效周期后, 自动失效, 由安全绑定更 新为非安全绑定。 此外, 所述安全绑定还可以是一次性; 当用户完成一次 操作或连续的多个操作后, 所述安全绑定即自动失效, 具体的实现方式有 多种, 就不在此——列举了。
综合上述, 本实施例提供一种信息处理方法, 首先通过第一电子设备 与第二电子设备之间关联性来验证第一电子设备的使用安全性, 从而提高 降低信息安全事故发送的几率, 适用于包括移动支付、 秘密信息读取等场 景中。
实施例二:
如图 5 所示, 本发明实施例提供一种电子设备, 所述电子设备为第一 电子设备, 包括: 检测单元 110,配置为检测第一电子设备是否与第二电子设备已安全绑 定;
控制单元 120,配置为当所述第一电子设备与所述第二电子设备未安全 绑定时, 控制所述第一电子设备工作在加锁状态; 当所述电子设备工作在 加锁状态时, 所述电子设备的至少部分应用被禁止使用。
所述检测单元 110和所述控制单元 120的具体物理结构均可包括处理 器; 所述处理器可为中央处理器、 微处理器, 单片机、 数字信号处理器及 可编程逻辑阵列等具有处理能力的结构, 可通过可执行指令的运行执行上 述操作。 所述检测单元 110和所述控制单元 120可集成对应于一个处理器, 也可分别对应不同的处理器, 具体的实现方式有多种, 就不在此进行展开 了。
优选地, 所述控制单元 120还用于当所述第一电子设备与所述第二电 子设备已安全绑定时, 控制所述第一电子设备工作在解锁状态。
所述加锁状为所述第一电子设备的至少部分功能无法应用, 所述部分 功能可以为所述第一电子设备的核心功能, 如通信、 加密信息的查询等, 具体可由用户自行设置。
所述解锁状态为所述第一电子设备的正常使用状态, 当所述第一电子 设备工作在解锁状态时, 用户通过与所述第一电子设备的交互, 完成第一 电子设备可实现的各种功能。
如图 6所示, 在上述两技术方案的至少其中之一的基础上, 本实施例 所述的电子设备进行了进一步的改进, 具体地, 所述电子设备还包括连接 单元 111、 及判断单元 112;
所述连接单元 111,配置为当所述第一电子设备与第二电子设备已经安 全绑定时, 检测所述第一电子设备是否与所述第二电子设备建立连接; 所述判断单元 112,配置为当所述第一电子设备与所述第二电子设备已 建立连接时, 提取所述第二电子设备的连接地址,并判断所述连接地址与预 先存储的绑定地址是否一致;
所述控制单元 120,还配置为当所述第二电子设备的连接地址与预先存 储的绑定地址一致时, 控制所述第一电子设备工作在解锁状态; 当所述第 二电子设备的连接地址与预先存储的绑定地址不一致时, 控制所述第一电 子设备工作在加锁状态。
所述连接单元 111,还配置为所述第一电子设备与第二电子设备未建立 连接时, 建立所述第一电子设备与所述第二电子设备的连接。
所述连接单元 111 的具体物理结构可包括连接接口; 所述连接接口可 是有线连接接口或无线连接接口; 具体的如蓝牙连接接口、 WIFI连接接口 等连接接口; 所述 WIFI连接接口优选为 WIFI直连接口, 用于建立第一电 设备与第二电子设备之间的 WIFI直连等。通常所述第一电子设备与第二电 子设备可以通过各种方式建立连接, 在本实施例中所述第一电子设备与第 二电子优选采用近场通信方式建立连接; 具体的如蓝牙、 红外、 WIFI等技 术。
所述判断单元 112, 具体的结构同样的可为处理器; 所述处理器可为中 央处理器、 微处理器, 单片机、 数字信号处理器及可编程逻辑阵列等具有 处理能力的结构, 可通过可执行指令的运行执行上述操作; 与所述检测单 元 110和所述控制单元 120可集成对应于一个处理器, 也可分别对应不同 的处理器, 具体的实现方式有多种, 就不在此进行展开了。
本实施例所述的第一电子设备可为手机、 平板电脑、 个人数字处理等 移动终端; 所述第二电子设备也可为与第一电子设备相同的移动终端, 所 述第二电子设备还可为可穿戴设备, 如智能眼镜、 智能手环及智能手表等 设备。
本实施例所述的第一电子设备为实施例一所述的信息处理方法提供了 硬件支持, 可用于实现实施例一种任一所述的技术方案, 同样的提升了第 一电子设备应用过程中信息的安全性。
所述第一电子设备还包括:
绑定单元, 配置为当所述第一电子设备与所述第二电子设备为未安全 绑定时, 依据预先存储的绑定信息及第一电子设备与第二电子设备的信息 交互, 建立安全绑定。
所述绑定单元的具体结构, 同样可包括处理器及存储介质; 所述存储 介质上存储有绑定信息及绑定安全信息等信息; 所述绑定单元可以通过建 立映射关系或关系表等方式, 实现第一电子设备与第二电子设备的绑定。 具体的如建立一个绑定表; 位于所述绑定表的设备为电子设备建立了绑定 的第二电子设备。 删除绑定即可将所述第二电子设备从所述绑定表中删除 即可; 这种绑定方式及绑定解除方式, 实现简便快捷。 所述存储介质可为
ROM, RAM或 Flash等各种存储介质, 在本实施例中优选为非瞬间存储介 质。
所述第一电子设备为第二电子设备均为移动电子设备;
所述第一电子设备与所述第二电子设备通过近场通信方式建立连接。 所述近场通信方式可参见实施例一和本实施例上述相应部分, 在此不再进 行详细阐述。
所述第一电子设备还包括发送单元及接收单元;
所述发送单元, 配置为依据所述绑定信息向第二电子设备发送连接请 求; 当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息;
所述接收单元, 配置为接收所述基于所述绑定验证信息返回的绑定认 证信息;
所述绑定单元, 配置为依据所述绑定认证信息形成并记录绑定安全信 息。
所述发送单元的具体物理结构, 可为发送接口; 具体的如发送天线或 发送天线阵列等。
通过发送单元的建立, 所述第一电子设备通过所述发送单元向第二电 子设备发送信息, 用于绑定信息及绑定安全信息的形成。
所述发送单元的具体结构可为发送接口, 具体的如各种类型发送天线, 如蓝牙发送天线, WIFI天线等; 所述接收接口可为接收接口, 具体如各种 类型接收天线, 如蓝牙接收天线, WIFI天线等结构; 具体的结构还有 4艮多, 在此就不再细说了。
优选地, 所述第一电子设备还可用于绑定解除, 具体地所述第一电子 设备还包括输入单元;
所述输入单元, 配置为接收绑定解除指示;
所述检测单元, 配置为在接收到所述绑定解除指示时, 检测所述第一 电子设备是否与所述第二电子设备已安全绑定;
所述绑定单元, 配置为当所述第一电子设备与所述第二电子设备已安 全绑定时, 删除所述绑定信息及所述绑定安全信息。
所述输入单元的具体物理结构, 可为所述第一电子设备上的实体或虚 拟键盘、 触摸或非触摸交互屏或语音输入装置等结构, 用户接收用于的绑 定解除指示。
本实施例通过所述输入单元的增设, 可基于用户指示, 解除第一电子 设备与第二电子设备的绑定, 以方便用户随时解除和新增绑定, 提高用户 使用感受良好度。 本实施例所述第一电子设备具有智能性高的优点。
优选地, 所述绑定单元, 配置为在所述输入单元接收到绑定解除指示, 所述检测单元检测到第一电子设备与所述第二电子设备之间未建立安全绑 定时, 依据预先存储的绑定信息及第一电子设备与第二电子设备的信息交 互, 交互建立安全绑定;
所述绑定单元, 配置为在解除绑定时第一电子设备与第二电子设备建 立安全绑定后, 解除所述第一电子设备与第二电子设备之间的绑定。
在本实施例中所述第一电子设备可为手机、 平板电脑及个人数字助理 等移动设备, 具体可为移动终端, 可通过有线或无线与网络的服务器等网 元进行信息交互。 所述第二电子设备同样的可为手机、 平板电脑及个人数 字处理等移动电子设备; 此外所述第二电子设备还可为可穿戴设备, 具体 的如智能眼镜、 智能手环及智能手表等移动电子设备。 在具体的实现过程 中, 所述第一电子设备与所述第二电子设备之间建立连接时, 优选为近场 通信连接, 具体的如蓝牙、 WIFI以及红外等连接方式。 所述可穿戴设备顾 名思义为用户穿戴在手上的设备, 相对于手机、 平板或个人数字助理等这 些可携带设备, 与用户保持了更加紧密的物理距离, 被盗窃或遗失的可能 性更小; 本实施例中可充分利用该特点, 将所述第二电子设备设置为可穿 戴设备, 以进一步提高第一电子设备的应用安全性。
图 7 所示提供了一种第一电子设备与第二电子设备构成的***图; 所 述第一电子设备为移动终端 220; 所述第二电子设备为可穿戴设备 210。 所 述第一电子设备与所述第二电子设备之间通过各自的无线通信单元以近场 通信进行交互。 所述移动终端 220 包括检测单元和控制单元, 在具体的实 现过程中, 所述移动终端还可包括绑定单元及连接单元等结构, 以实现绑 定、 安全绑定以及建立连接等过程。
本实施例所述第一电子设备具有结构简单, 与现有技术兼容性高, 大 大的提高了信息的安全性, 为实施例一所述的信息处理方法提供了具体的 硬件支撑, 能用以实现实施例一中任一所述的技术方案。
本发明实施例还提供一种计算机存储介质, 所述计算机存储介质中存 储有计算机可执行指令, 所述计算机可执行指令用于执行实施例一中任一 技术方案所述方法的至少其中之一; 具体如, 执行所述计算机可执行指令, 可以执行图 1所示的方法。
所述存储介质可为 U盘、 移动硬盘、 光盘、 DVD或 VCD等存储介质; 优选为所述存储介质为非瞬间存储介质。
以下结合实施例一及实施例二任一所述的技术方案, 提供具体示例。 在具体示例中, 所述第一电子设备为手机; 所述第二电子设备为可穿戴设 备; 第一电子设备与第二电子设备之间建立的连接为蓝牙连接; 应用在第 一电子设备进行移动支付的场景下。 以下是具体的实现方式:
下面对本发明技术方案的具体实施进一步的详细描述:
图 8为本示例的安全环境绑定流程
步骤 S100: 检测安全环境校验位, 以查看手机与可穿戴设备之间是否 实现了安全绑定; 通常所述安全环境校险位可为 1 位或多位; 当所述安全 环境校验位为 1 位时, 通常表示手机与可穿戴设备之间实现了安全绑定, 否则就未安全绑定;
若安全环境校验位为 1, 进入步骤 S200,
若安全环境校验位为 0, 则进入步骤 S300;
步骤 S200: 启动安全环境校验流程; 安全环境校验流程主要可通过, 第一电子设备与第二电子设备之间是否建立了连接来进行确定, 在本示例 中可为校验所述手机与所述可穿戴设备是否已建立连接; 所述连接可优选 为蓝牙连接;
步骤 S300: 手机请求进行蓝牙连接; 若安全环境校验为 0, 则表示手 机和可穿戴设备之间未建立连接, 则可由第一电子设备向第二电子设备发 送连接建立请求, 如建立蓝牙连接;
步骤 S400: 判断蓝牙是否连接成功;
若是, 则进入步骤 S500; 若否, 则返回步骤 S300;
步骤 S500: 手机向可穿戴设备发送蓝牙认证码, 并进入步骤 S600; 步骤 S600: 可穿戴设备确认蓝牙认证码并返回认证信息, 同时手机的 控制单元根据手机信息生成并存储绑定解除码;
步骤 S700: 手机根据可穿戴设备返回的认证信息, 记录可穿戴设备蓝 牙地址;
步骤 S800: 手机将安全环境绑定标志位设为 1 ;
步骤 S900: 完成绑定。
图 9为本示例的绑定解除流程。
步骤 S101 : 手机接收解除绑定指示;
步骤 S102: 手机向可穿戴设备发送蓝牙认证码; 所述认证码中包含手 机蓝牙地址等信息;
步骤 S103 : 接收并蓝牙认证码验证手机信息, 依据验证结果判断手机 和可穿戴设备是否安全绑定,
若否, 则进入步骤 S104;
若是, 则进入步骤 S105;
步骤 S104: 会话结束解除绑定失败。
步骤 S105: 手机接收并向用户蓝牙验证码; 用户在解除绑定控制界面 输入所述蓝牙验证码;
步骤 S106: 依据所述蓝牙验证码计算得到绑定解除码, 并与绑定时形 成的绑定解除码进行对比,
若不一致, 则进入步骤 S104;
若一致, 则进入步骤 S107;
步骤 S107: 返包括验证码回验证信息; 其中, 验证信息还可包含解除 绑定标志位信息及蓝牙地址信息; 所述验证码可通过蓝牙地址计算获取; 步骤 S108: 手机接收到验证信息后显示所述验证码; 用户在手机上手 动输入验证码, 手机判断校验码是否正确;
若不正确, 则进入步骤 S104;
若正确, 则进入步骤 S 109
步骤 S109: 解除绑定成功, 安全环境绑定标志位置为 0。
图 10为本示例的控制第一电子设备工作在解锁状态或加锁状态的方案
1 :
步骤 S001 : 查看手机控制功能标志位; 当所述手机控制功能标志位为 fasle时进入步骤 S002; 当所述手机控制功能标志位为 true时进入步骤 S003; 步骤 S002: 流程结束; 所述功能控制模块功能信息标志位为 fasle, 则 表示手机是否与可穿戴设备建立安全绑定和 /或建立连接对手机的该功能是 否处于加锁状态和 /或解锁状态无影响;
步骤 S003: 检测安全环境绑定标志位; 若安全环境绑定标志位为 0则 进入步骤 S004; 若安全环境绑定标志位为 1则进入步骤 S005;
步骤 S004: 进行手机与可穿戴设备绑定, 并记录可穿戴设备的蓝牙地 址;
步骤 S005: 判断手机与可穿戴设备是否已建立蓝牙连接;
若否, 则进入步骤 S006;
若是, 进入步骤 S007;
步骤 S006: 手机工作在加锁状态;
步骤 S007: 判断所述蓝牙地址与绑定地址是否一致,
若否, 则进入步骤 S006;
若是, 则进入步骤 S008;
步骤 S008: 手机工作在解锁状态。
本示例中主要应用在手机和可穿戴设备上; 所述第一电子设备可为手 机; 所述第二电子设备为可穿戴设备; 手机和可穿戴设备之间通过近场通 信方式连接及通信。
可穿戴智能设备模块: 与移动终端以无线通信方式进行连接, 可以从 移动终端获取数据。
移动终端加密与解密模块(绑定控制模块): 移动终端工作在加锁状态 或解锁状态由一个宏控开关来进行控制, 在手机与可穿戴设备处于安全绑 定且处于连接状态时, 移动终端宏控开关置于 open, 此时移动终端屏幕锁、 隐私空间锁、 APP锁等加密程序都处于解锁状态, 权限处于开放状态, 用 户可以应用所述第一电子设备手机的各项功能。 移动终端在与可穿戴设备 未安全绑定和 /或处于断开状态时, 移动终端宏控开关置于 close, 此时移动 终端屏幕锁、 隐私空间锁、 APP锁等加密程序都处于加锁状态, 应用程序 权限置于关闭状态。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。 凡按照本发明原理所作的修改, 都应当理解为落入本发明的保护 范围。

Claims

权利要求书
1、 一种信息处理方法, 所述方法包括:
检测第一电子设备是否与第二电子设备已安全绑定;
若未安全绑定, 则控制所述第一电子设备工作在加锁状态; 当所述电 子设备工作在加锁状态时, 所述电子设备的至少部分应用被禁止使用。
2、 根据权利要求 1所述的方法, 其中, 所述方法还包括:
若已安全绑定, 则控制所述第一电子设备工作在解锁状态。
3、 根据权利要求 2所述的方法, 其中, 所述方法还包括:
在确定所述第一电子设备与所述第二电子设备已安全绑定之后, 检测 所述第一电子设备是否与所述第二电子设备已建立连接;
若已建立连接, 提取所述第二电子设备的连接地址, 并判断所述连接 地址与预先存储的绑定地址是否一致;
若不一致, 则进入控制所述第一电子设备工作在加锁状态的步骤。
4、 根据权利要求 3所述的方法, 其中, 所述方法还包括:
若一致, 则进入控制所述第一电子设备工作在解锁状态的步骤。
5、 根据权利要求 3所述的方法, 其中, 所述方法还包括:
若未建立连接, 则依据所述绑定地址建立与所述第二电子设备的连接。
6、 才艮据权利要求 1至 5任一项所述的方法, 其中,
若未安全绑定, 则依据预先存储的绑定信息及基于第一电子设备与第 二电子设备的信息交互, 建立安全绑定。
7、 根据权利要求 6所述的方法, 其中, 所述依据预先存储的绑定信息 及第一电子设备与第二电子设备的信息交互, 建立安全绑定包括:
依据所述绑定信息向第二电子设备发送连接请求;
当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息;
接收所述基于所述绑定验证信息返回的绑定认证信息;
依据所述绑定认证信息生成并记录绑定安全信息;
其中, 所述绑定安全信息为检测所述第一电子设备与所述第二电子设 备已安全绑定的依据。
8、 根据权利要求 7所述的方法, 其中, 所述方法还包括第一电子设备 与第二电子设备绑定解除步骤:
所述绑定解除步骤包括:
接收绑定解除指示;
检测所述第一电子设备是否与所述第二电子设备已安全绑定; 若已安全绑定, 则删除所述绑定信息及所述绑定安全信息。
9、 根据权利要求 8所述的方法, 其中, 所述绑定解除步骤还包括: 若非安全绑定, 则依据预先存储的绑定信息及第一电子设备与第二电 子设备的信息交互, 建立安全绑定;
建立安全绑定后, 重新执行所述绑定解除步骤。
10、 根据权利要求 1至 5任一项所述的方法, 其中, 所述第一电子设 备为第二电子设备均为移动电子设备;
所述第一电子设备与所述第二电子设备通过近场通信方式建立连接。
11、 根据要求 10所述的方法, 其中, 所述第一电子设备为移动通信设 备; 所述第二电子设备为可穿戴电子设备。
12、 一种电子设备, 所述电子设备为第一电子设备, 包括:
检测单元, 配置为检测第一电子设备是否与第二电子设备已安全绑定; 控制单元, 配置为当所述第一电子设备与所述第二电子设备未安全绑 定时, 控制所述第一电子设备工作在加锁状态;
其中, 当所述电子设备工作在加锁状态时, 所述电子设备的至少部分 应用被禁止使用。
13、 根据权利要求 12所述的电子设备, 其中,
所述控制单元, 还配置为当所述第一电子设备与所述第二电子设备已 安全绑定时, 控制所述第一电子设备工作在解锁状态。
14、 根据权利要求 13所述的电子设备, 其中, 所述电子设备还包括连 接单元、 及判断单元;
所述连接单元, 配置为在确定所述第一电子设备与第二电子设备已安 全绑定之后, 检测所述第一电子设备是否与所述第二电子设备已建立连接; 所述判断单元, 配置为当所述第一电子设备与所述第二电子设备已建 立连接时, 提取所述第二电子设备的连接地址, 并判断所述连接地址与预 先存储的绑定地址是否一致;
所述控制单元, 配置为当所述第二电子设备的连接地址与预先存储的 绑定地址不一致时, 控制所述第一电子设备工作在加锁状态。
15、 根据权利要求 14所述的电子设备, 其中,
所述控制单元, 还配置为当所述第二电子设备的连接地址与预先存储 的绑定地址一致时, 控制所述第一电子设备工作在解锁状态。
16、 根据权利要求 14所述的电子设备, 其中,
所述连接单元, 还配置为当所述第一电子设备与所述第二电子设备未 建立连接时, 建立所述第一电子设备与所述第二电子设备的连接。
17、 根据权利要求 12至 16任一项所述的电子设备, 其中, 所述第一 电子设备还包括:
绑定单元, 配置为当所述第一电子设备与所述第二电子设备为未安全 绑定时, 依据预先存储的绑定信息及第一电子设备与第二电子设备的信息 交互, 建立安全绑定。
18、 根据权利要求 17所述的电子设备, 其中, 所述第一电子设备还包 括发送单元和接收单元;
所述发送单元, 配置为依据所述绑定信息向第二电子设备发送连接请 求; 当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息;
所述接收单元, 配置为接收所述基于所述绑定验证信息返回的绑定认 证信息;
所述绑定单元, 配置为依据所述绑定认证信息生成并记录绑定安全信 息;
其中, 所述绑定安全信息为检测所述第一电子设备与所述第二电子设 备已安全绑定的依据。
19、 根据权利要求 18所述的电子设备, 其中, 所述第一电子设备还包 括输入单元;
所述输入单元, 还配置为接收绑定解除指示;
所述检测单元, 还配置为在接收到所述绑定解除指示时, 检测所述第 一电子设备是否与所述第二电子设备已安全绑定;
所述绑定单元, 还配置为在所述第一电子设备与所述第二电子设备已 安全绑定时, 删除所述绑定信息及所述绑定安全信息。
20、 根据权利要求 19所述的电子设备, 其中,
所述绑定单元, 还配置为在所述输入单元接收到绑定解除指示, 所述 检测单元检测到第一电子设备与所述第二电子设备之间未安全绑定时, 依 据预先存储的绑定信息及第一电子设备与第二电子设备的信息交互, 交互 建立安全绑定;
所述绑定单元, 还配置为在接触绑定中第一电子设备与第二电子设备 建立安全绑定后, 解除所述第一电子设备与第二电子设备之间的绑定。
21、 根据权利要 12至 16任一项所述的电子设备, 其中, 所述第一电 子设备为第二电子设备均为移动电子设备;
所述第一电子设备与所述第二电子设备通过近场通信方式建立连接。
22、 根据要求 21所述的电子设备, 其中, 所述第一电子设备为移动通 信设备; 所述第二电子设备为可穿戴电子设备。
23、 一种计算机存储介质, 所述计算机存储介质中存储有计算机可执 行指令, 所述计算机可执行指令用于执行权利要求 1至 11所述方法的至少 其中之一。
PCT/CN2014/082537 2014-04-17 2014-07-18 信息处理方法、电子设备和计算机存储介质 WO2015158053A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410155208.0 2014-04-17
CN201410155208.0A CN105022950A (zh) 2014-04-17 2014-04-17 信息处理方法及电子设备

Publications (1)

Publication Number Publication Date
WO2015158053A1 true WO2015158053A1 (zh) 2015-10-22

Family

ID=54323436

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/082537 WO2015158053A1 (zh) 2014-04-17 2014-07-18 信息处理方法、电子设备和计算机存储介质

Country Status (2)

Country Link
CN (1) CN105022950A (zh)
WO (1) WO2015158053A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105306477A (zh) * 2015-11-09 2016-02-03 罗朝劲 电子设备强绑定配对方案
CN105677354B (zh) * 2016-01-08 2020-02-21 上海斐讯数据通信技术有限公司 一种移动终端配套装置、移动终端及移动终端控制方法
CN105722018A (zh) * 2016-02-23 2016-06-29 康志强 智能手表的配对方法及***
CN106650353A (zh) * 2016-11-28 2017-05-10 捷开通讯(深圳)有限公司 终端及其基于按键事件的解锁方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8321922B1 (en) * 2011-09-16 2012-11-27 Google Inc. Authenticating a user of a system using near field communication
CN103023539A (zh) * 2012-12-04 2013-04-03 中兴通讯股份有限公司 一种实现电子设备功能开启的方法及***
CN103473514A (zh) * 2013-09-06 2013-12-25 宇龙计算机通信科技(深圳)有限公司 数据存储访问方法及装置
CN103514392A (zh) * 2013-09-24 2014-01-15 亚太宝龙科技(湖南)有限公司 一种计算机操作***登录认证装置和方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101572660B (zh) * 2008-04-30 2013-06-05 北京明朝万达科技有限公司 一种防止数据泄密的综合控制方法
CN102073597B (zh) * 2009-11-19 2016-04-13 北京明朝万达科技股份有限公司 一种基于用户身份认证的操作***盘全盘加密方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8321922B1 (en) * 2011-09-16 2012-11-27 Google Inc. Authenticating a user of a system using near field communication
CN103023539A (zh) * 2012-12-04 2013-04-03 中兴通讯股份有限公司 一种实现电子设备功能开启的方法及***
CN103473514A (zh) * 2013-09-06 2013-12-25 宇龙计算机通信科技(深圳)有限公司 数据存储访问方法及装置
CN103514392A (zh) * 2013-09-24 2014-01-15 亚太宝龙科技(湖南)有限公司 一种计算机操作***登录认证装置和方法

Also Published As

Publication number Publication date
CN105022950A (zh) 2015-11-04

Similar Documents

Publication Publication Date Title
AU2019201720B2 (en) Method of using one device to unlock another device
EP3657370B1 (en) Methods and devices for authenticating smart card
JP7194847B2 (ja) デジタルキー、端末デバイス、及び媒体の同一性を認証する方法
WO2017197974A1 (zh) 一种基于生物特征的安全认证方法、装置及电子设备
JP6633228B2 (ja) 暗号を伴うデータセキュリティシステム
US11044604B2 (en) Method and system for protecting and utilizing internet identity, using smartphone
KR20190104401A (ko) 모바일 디바이스를 사용한 시스템 액세스
JP6768665B2 (ja) 自動車両の少なくとも1つの機能へのアクセスを制御する方法
EP3213459A1 (en) A multi-user strong authentication token
JP2013537758A (ja) オペレーティングシステムのロックを解除する方法及び装置
WO2015014128A1 (zh) 穿戴式设备的认证方法及穿戴式设备
CN103477666A (zh) 连接移动设备,连接至互联网的车辆以及云服务
JP2008541290A (ja) 個人の存在を条件とする、トークンによるトランザクション認証
JP2009528582A (ja) 無線認証
CN109067881B (zh) 远程授权方法及其装置、设备和存储介质
CN109902477A (zh) 保障音频通信安全
WO2015158053A1 (zh) 信息处理方法、电子设备和计算机存储介质
CN110071813B (zh) 一种账户权限更改方法***、账户平台和用户终端
CN104700270A (zh) 支付请求处理方法、支付请求处理装置和终端
US12019717B2 (en) Method for the secure interaction of a user with a mobile terminal and a further entity
CN106156549B (zh) 应用程序授权处理方法及装置
WO2015158046A1 (zh) 信息处理方法、电子设备和计算机存储介质
KR101294805B1 (ko) 2-채널 앱인증 방법 및 시스템
TWI816017B (zh) 驗證資訊處理方法和裝置
CN105072084B (zh) 移动终端与外接设备数据连接的建立方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14889578

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14889578

Country of ref document: EP

Kind code of ref document: A1