WO2016155283A1 - 基于wifi热点实现电子设备私密保护的方法及*** - Google Patents

基于wifi热点实现电子设备私密保护的方法及*** Download PDF

Info

Publication number
WO2016155283A1
WO2016155283A1 PCT/CN2015/092018 CN2015092018W WO2016155283A1 WO 2016155283 A1 WO2016155283 A1 WO 2016155283A1 CN 2015092018 W CN2015092018 W CN 2015092018W WO 2016155283 A1 WO2016155283 A1 WO 2016155283A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
authentication
wifi
authentication information
authentication key
Prior art date
Application number
PCT/CN2015/092018
Other languages
English (en)
French (fr)
Inventor
黄严良
Original Assignee
惠州Tcl移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 惠州Tcl移动通信有限公司 filed Critical 惠州Tcl移动通信有限公司
Publication of WO2016155283A1 publication Critical patent/WO2016155283A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Definitions

  • the invention relates to a method and a system for implementing privacy protection of an electronic device based on a WIFI hotspot.
  • the traditional private content protection is to set a file or photo as a protected object in your own electronic device, and set a protected password for it. If you want to view the locked content, you need to enter the corresponding password. This will open the view. However, the protection of this method is not satisfactory.
  • the technical problem to be solved by the present invention is to solve the technical problem that the private content protection of the electronic device is not strong enough to lead to the leakage of the private content in the prior art, and provide a method and system for implementing the privacy protection of the electronic device based on the WIFI hotspot, which can be more effective. Ensuring the security of private content within the electronic device and giving the user a better personal experience.
  • a technical solution adopted by the present invention is to provide a method for implementing privacy protection of an electronic device based on a WIFI hotspot, the method comprising: initializing and pairing the first electronic device with the second electronic device, and tying each other An authentication key for accessing the private content; when the user needs to access the private content on the first electronic device, the first electronic device receives the first authentication information input by the user, and the first The authentication information is sent to the second electronic device; the second electronic device compares the first authentication information with the authentication key pre-stored by the second electronic device; and the second electronic device sends the The first electronic device feeds back the authentication result; the second electronic device receives the second authentication information input by the user, and sends the second authentication information to the first electronic device by using WIFI; The second authentication information is compared with the authentication key pre-stored in the first electronic device; the first authentication information and the second When the authentication information through the authentication, private content of the first opening of the electronic device.
  • the first electronic device and the second electronic device perform WIFI initialization pairing, and the authentication key for mutually accessing the private content includes: the first electronic device and the second electronic device turn on WIFI;
  • the first electronic device receives the first authentication key input by the user, and sends the first authentication key to the second electronic device by using a WIFI, where the first authentication key is used to perform the first electronic device.
  • Authenticating; the second electronic device receives and saves the first authentication key; the second electronic device receives a second authentication key input by the user, and sends the second authentication key to the first An electronic device, the second authentication key is used to authenticate the second electronic device; the first electronic device receives and saves the second authentication key, completes WIFI initialization pairing, and binds for access The authentication key of the private content.
  • the step of the second electronic device feeding back the authentication result to the first electronic device by using the WIFI includes: returning the authentication pass notification to the first electronic device by using the WIFI when the first authentication information passes the authentication; When the first authentication information fails to pass the authentication, the WIFI returns an authentication failure notification to the first electronic device, and prompts the user to re-enter the authentication information.
  • another technical solution adopted by the present invention is to provide a method for implementing privacy protection of an electronic device based on a WIFI hotspot, the method comprising: when a user needs to access private content on the first electronic device The first electronic device receives the first authentication information input by the user, and sends the first authentication information to the second electronic device by using WIFI; the second electronic device uses the first authentication information and the first The second electronic device receives the second authentication information input by the user, and sends the second authentication information to the first electronic device by using WIFI; An electronic device compares the second authentication information with an authentication key pre-stored in the first electronic device; and when the first authentication information and the second authentication information both pass authentication, The private content of the first electronic device.
  • the method further includes: the first electronic device and the second electronic device perform WIFI initialization pairing, and mutually bind an authentication key for accessing the private content.
  • the first electronic device and the second electronic device perform WIFI initialization pairing, and the authentication key for mutually accessing the private content includes: the first electronic device and the second electronic device are turned on.
  • the first electronic device receives the first authentication key input by the user, and sends the first authentication key to the second electronic device by using a WIFI, where the first authentication key is used for the An electronic device performs authentication;
  • the second electronic device receives and saves the first authentication key;
  • the second electronic device receives a second authentication key input by a user, and sends the second authentication key through WIFI
  • the second authentication key is used to authenticate the second electronic device;
  • the first electronic device receives and saves the second authentication key, completes WIFI initialization pairing, and binds An authentication key that is used to access the private content.
  • the method further includes: the second electronic device transmitting the first electronic device by using WIFI The device feedbacks the authentication result.
  • the step of the second electronic device feeding back the authentication result to the first electronic device by using the WIFI includes: returning the authentication pass notification to the first electronic device by using the WIFI when the first authentication information passes the authentication; When the first authentication information fails to pass the authentication, the WIFI returns an authentication failure notification to the first electronic device, and prompts the user to re-enter the authentication information.
  • the present invention also adopts a technical solution for providing a system for implementing privacy protection based on a WIFI hotspot, the system comprising a first electronic device and a second electronic device, wherein the first electronic device
  • the device includes a first receiving module, a first communication module, a first authentication module, and a first control module
  • the second electronic device includes a second receiving module, a second communication module, and a second authentication module, where: the user needs to access
  • the first receiving module receives the first authentication information input by the user, and the first communication module sends the first authentication information to the second electronic device by using WIFI;
  • the second authentication module compares the first authentication information with the authentication key pre-stored by the second electronic device; the second receiving module receives the second authentication information input by the user; the second communication module Transmitting the second authentication information to the first electronic device by using a WIFI; the first authentication module, the second authentication information, A pre-stored in the electronic device than the authentication keys for the authentication; the first speed control mode when the first
  • the first communication module and the second communication module are further configured to perform WIFI initialization pairing between the first electronic device and the second electronic device, and bind each other to access the authentication secret of the private content. key.
  • the first receiving module is configured to receive a first authentication key input by a user; the first communication module sends the first authentication key to the second electronic device by using a WIFI, the first authentication The secret key is configured to authenticate the first electronic device; the second receiving module is configured to receive and save the first authentication key, and receive a second authentication key input by a user; the second communication module Sending, by the WIFI, the second authentication key to the first electronic device, where the second authentication key is used to authenticate the second electronic device; the first receiving module receives and saves the first Two authentication keys, complete WIFI initialization pairing, and bind an authentication key for accessing the private content.
  • the second electronic device further includes a second control module: the second control module controls the second communication module to feed back an authentication result to the first electronic device by using WIFI.
  • the second control module when the first authentication information passes the authentication, controls the second communication module to return an authentication pass notification to the first electronic device by using the WIFI; when the first authentication information fails the authentication, And controlling the second communication module to return an authentication failure notification to the first electronic device by using the WIFI, prompting the user to re-enter the authentication information.
  • the invention has the beneficial effects that the method and the system for implementing the privacy protection of the electronic device based on the WIFI hotspot are different from the prior art.
  • the current electronic device and the other need to be An electronic device can cooperate with each other to pass the authentication.
  • the two different electronic devices can be combined with the double-layer protection mechanism of the authentication key. Even if the electronic device is lost, the private content will not be leaked, and the private content in the electronic device can be effectively protected. Safe, giving users a better personal experience.
  • FIG. 1 is a flowchart of a method for implementing privacy protection of an electronic device based on a WIFI hotspot according to an embodiment of the present invention
  • FIG. 2 is a flowchart of performing WIFI initialization pairing between a first electronic device and a second electronic device according to an embodiment of the present invention
  • FIG. 1 is a flowchart of a method for implementing privacy protection of an electronic device based on a WIFI hotspot according to an embodiment of the present invention.
  • the method for implementing privacy protection of an electronic device based on a WIFI hotspot provided in this embodiment includes:
  • the first electronic device When the user needs to access the private content on the first electronic device, the first electronic device receives the first authentication information input by the user, and sends the first authentication information to the second electronic device by using WIFI;
  • the private mode login interface is popped up by a specific button or a soft keyboard.
  • the private content mentioned in the embodiment of the present invention may be a picture, a recording, a video, a short message or an incoming call record in the electronic device.
  • the content included in the specific private content can be set according to the needs of the user.
  • WIFI hotspot means that the electronic device converts its receiving GPRS or 3G signal into a wifi signal and sends it out, so that the electronic device becomes a WIFI hotspot.
  • the first electronic device and the second electronic device perform WIFI initialization pairing in advance, and mutually bind the authentication key for accessing the private content.
  • the first electronic device and the second electronic device may be two different electronic devices belonging to one user, such as user A's mobile phone and tablet computer, or tablet computer and laptop computer, or may be electronic belonging to different users. device.
  • user A's tablet, user B's mobile phone The invention is not limited thereto.
  • the user inputs the first authentication information, and the first electronic device sends the first authentication information to the second electronic device through the WIFI for identity authentication.
  • FIG. 2 is a flowchart of performing WIFI initialization pairing between the first electronic device and the second electronic device according to an embodiment of the present invention. As shown in the figure, the first electronic device and the second electronic device perform WIFI. Initializing a pairing involves the following steps:
  • Both the first electronic device and the second electronic device turn on WIFI and are in a range capable of WIFI communication.
  • the first electronic device receives the first authentication key input by the user, and sends the first authentication key to the second electronic device by using the WIFI, where the first authentication key is used to authenticate the first electronic device.
  • the user finds the WIFI identifier of the second electronic device in the WIFI device of the first electronic device, and inputs a first authentication key for authenticating the first electronic device.
  • the first electronic device sends the first authentication key to the second electronic device through the WIFI, so that the second electronic device stores the first authentication key to facilitate subsequent authentication of the first electronic device.
  • S203 The second electronic device receives and saves the first authentication key.
  • the second electronic device receives the first authentication key through the WIFI, and saves the first authentication key.
  • the first authentication key can be saved in the processor or in the memory.
  • the second electronic device receives the second authentication key input by the user, and sends the second authentication key to the first electronic device by using the WIFI, where the second authentication key is used to authenticate the second electronic device.
  • the user finds the WIFI identifier of the first electronic device on the second electronic device interface, and inputs a second authentication key for authenticating the second electronic device.
  • the second electronic device receives the second authentication key input by the user, and sends the second authentication key to the first electronic device by using the WIFI, so that the first electronic device stores the second authentication key to facilitate subsequent access to the second electronic device. Certify.
  • S205 The first electronic device receives and saves the second authentication key.
  • the first electronic device receives the second authentication key through the WIFI, and saves the second authentication key.
  • the second authentication key can be saved in the processor or in the memory.
  • the WIFI initialization pairing of the first electronic device and the second electronic device is completed, and the first electronic device and the second electronic device are mutually bound with an authentication key for accessing the private content. That is to say, when the private content of any electronic device needs to be accessed, another electronic device that needs to be paired with the electronic device can be authenticated to view the private content.
  • steps S202-S203 and steps S204-S205 do not strictly distinguish the sequence. This embodiment only performs such numbering in order to distinguish two different steps.
  • the first electronic device sends the first authentication.
  • the sending of the second authentication key to the second electronic device may be performed simultaneously, or the second electronic device may first send the second authentication key, and the first electronic device sends the first authentication after receiving the second authentication key.
  • Secret key As long as the two electronic devices can be paired with each other and the authentication key is bound, the implementation sequence of the step of the present invention is not limited.
  • S102 The second electronic device compares the first authentication information with the authentication key pre-stored by the second electronic device.
  • the second electronic device receives the first authentication information through the WIFI, and compares the first authentication information with the authentication key pre-stored by the second electronic device. When the first authentication information is the same as the authentication key pre-stored by the second electronic device, the first authentication information passes the authentication; otherwise, the first authentication information does not pass the authentication.
  • the method further includes feeding back the authentication result to the first electronic device by using the WIFI.
  • the second electronic device when the first authentication information passes the authentication, the second electronic device returns an authentication pass notification to the first electronic device by using the WIFI, and when the first authentication information fails to pass the authentication, the second electronic device passes the WIFI to the first An electronic device returns an authentication failure notification, prompting the user to re-enter the authentication information.
  • the authentication result feedback can be implemented by setting in advance. For example, when the first authentication information is passed, the second authentication information is sent to the first electronic device, otherwise the second authentication information is not sent.
  • the second electronic device receives the second authentication information input by the user, and sends the second authentication information to the first electronic device by using WIFI;
  • the user inputs second authentication information for authenticating the second electronic device on the second electronic device interface, the second electronic device receives the second authentication information, and sends the second authentication information to the first electronic device by using the WIFI.
  • S104 The first electronic device compares the second authentication information with the authentication key pre-stored in the first electronic device.
  • the first electronic device receives the second authentication information through the WIFI, and compares the second authentication information with the authentication key pre-stored by the first electronic device. When the second authentication information is the same as the authentication key pre-stored by the first electronic device, the second authentication information passes the authentication; otherwise, the second authentication information does not pass the authentication.
  • the first electronic device when the second authentication information fails to pass the authentication, the first electronic device returns an authentication failure notification to the second electronic device by using the WIFI, and prompts the user to re-enter the authentication information.
  • the first electronic device interface pops up the private mode login failure prompt, or directly returns to the main interface.
  • the private content of the first electronic device is opened.
  • steps S101-S102 and steps S103-S104 of the embodiment of the present invention do not strictly distinguish the order, and may even be performed simultaneously.
  • the triggering instruction is sent to the first electronic device and the second electronic device, and the first electronic device and the second electronic device both receive the authentication information input by the user, and send the authentication information through the WIFI.
  • the comparison of the two electronic devices is performed simultaneously.
  • the second electronic device sends the second authentication information to the first electronic device after the first authentication information passes the authentication. If the first authentication information does not pass the authentication, the second electronic device returns an authentication failure notification to the first electronic device, and the second authentication information is not sent to the first electronic device until the first authentication information passes the authentication.
  • the above embodiment is only a detailed description of the private content that the user needs to access the first electronic device.
  • the implementation process is basically the same as the foregoing implementation process. I won't go into details here.
  • the method for privacy protection of the electronic device of the present invention is that the two electronic devices are paired, and the authentication information of the two electronic devices is required to be authenticated to view the private content. Therefore, even if the electronic device is lost, others cannot unlock and view the lost content. Private content in an electronic device, even if the owner of the electronic device wants to view the private content in the electronic device, another electronic device cooperates with the authentication, and the two electronic devices are authenticated to view the private content to ensure privacy. The security of the content.
  • the method for implementing privacy protection of an electronic device based on a WIFI hotspot requires a current electronic device and another electronic device when the user needs to view the private content in the electronic device.
  • Mutual cooperation can be viewed through authentication.
  • the double-layer protection mechanism of the authentication key Even if the electronic device is lost, the private content will not be leaked, and the security of the private content in the electronic device is effectively guaranteed. A better personal experience for the user.
  • FIG. 3 is a system 100 for implementing privacy protection based on a WIFI hotspot according to an embodiment of the present invention, where the system includes a first electronic device 200 and a second electronic device 300, wherein the first electronic device 200 includes A receiving module 20, a first communication module 21, a first authentication module 22, and a first control module 23, the second electronic device 300 includes a second receiving module 30, a second communication module 31, and a second authentication module 32, wherein:
  • the first receiving module 20 receives the first authentication information input by the user;
  • the private mode login interface is popped up by a specific button or a soft keyboard.
  • the private content mentioned in the embodiment of the present invention may be a picture, a recording, a video, a short message or an incoming call record in the electronic device.
  • the content included in the specific private content can be set according to the needs of the user.
  • the first communication module 21 and the second communication module 31 are configured to enable the first electronic device and the second electronic device to perform WIFI initialization pairing in advance, and mutually bind the authentication key for accessing the private content.
  • the first electronic device and the second electronic device may be two different electronic devices belonging to one user, such as user A's mobile phone and tablet computer, or tablet computer and laptop computer, or may be electronic belonging to different users. device.
  • the invention is not limited thereto.
  • the user inputs the first authentication information, and the first receiving module 20 receives the first authentication information.
  • the first receiving module 20 is configured to receive the first authentication key input by the user, and the first communication module 21 sends the first authentication key to the second electronic device by using the WIFI, where the first authentication key is used to perform the first electronic device. Certification.
  • the second receiving module 30 is configured to receive and save the first authentication key, and receive the second authentication key input by the user, and the second communication module 31 sends the second authentication key to the first electronic device by using the WIFI, and the second authentication
  • the secret key is used to authenticate the second electronic device, and the first receiving module 20 receives and saves the second authentication key, completes the WIFI initialization pairing, and binds the authentication key for accessing the private content.
  • the first electronic device and the second electronic device may respectively save the second authentication key and the first authentication key in a processor or a memory for subsequent identity authentication of the second electronic device and the first electronic device. .
  • the first communication module 21 sends the first authentication information to the second electronic device by using WIFI;
  • the first communication module 21 sends the first authentication information to the second electronic device through the WIFI for identity authentication.
  • the second authentication module 32 compares the first authentication information with the authentication key pre-stored by the second electronic device
  • the second authentication module 32 compares the first authentication information with the authentication key pre-stored by the second electronic device. When the first authentication information is the same as the authentication key pre-stored by the second electronic device, the first authentication information passes the authentication; otherwise, the first authentication information does not pass the authentication.
  • the second electronic device of the present invention further includes a second control module 33 that controls the second communication module 31 to feed back the authentication result to the first electronic device via the WIFI.
  • the second control module 33 controls the second communication module 31 to return an authentication pass notification to the first electronic device through the WIFI when the first authentication information passes the authentication; and controls the second communication module when the first authentication information fails the authentication. 31 returns an authentication failure notification to the first electronic device through the WIFI, prompting the user to re-enter the authentication information.
  • the second control module 33 can implement the authentication result feedback according to the preset. For example, when the first authentication information is passed, the second control module 33 controls to send the second authentication information to the first electronic device, otherwise the second authentication information is not sent.
  • the second receiving module 30 receives the second authentication information input by the user
  • the user inputs second authentication information for authenticating the second electronic device on the second electronic device interface, and the second receiving module 30 receives the second authentication information.
  • the second communication module 31 sends the second authentication information to the first electronic device by using WIFI;
  • the second communication module 31 sends the second authentication information to the first electronic device through the WIFI to enable the first electronic device to perform the comparison authentication.
  • the first authentication module 22 compares the second authentication information with the authentication key pre-stored in the first electronic device
  • the first electronic device receives the second authentication information through the WIFI, and compares the second authentication information with the authentication key pre-stored by the first electronic device. When the second authentication information is the same as the authentication key pre-stored by the first electronic device, the second authentication information passes the authentication; otherwise, the second authentication information does not pass the authentication.
  • the first communication module 21 when the second authentication information fails to pass the authentication, the first communication module 21 returns an authentication failure notification to the second electronic device through the WIFI, and prompts the user to re-enter the authentication information.
  • the first electronic device interface pops up the private mode login failure prompt, or directly returns to the main interface.
  • the first control mode fast 23 controls to open the private content when both the first authentication information and the second authentication information pass the authentication.
  • the first control module 23 controls to open the private content of the first electronic device.
  • the method and system for implementing the privacy protection of the electronic device based on the WIFI hotspot in the above embodiment of the present invention requires the current electronic device and another electronic device to interact with each other when the user needs to view the private content in the electronic device. It can be viewed through authentication, and through two different electronic devices combined with the double-layer protection mechanism of the authentication key, even if the electronic device is lost, the private content will not be leaked, and the security of the private content in the electronic device is effectively guaranteed. A better personal experience.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the modules or units is only a logical function division.
  • there may be another division manner for example, multiple units or components may be used. Combinations can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read only memory (ROM, Read-Only) Memory, random access memory (RAM), disk or optical disk, and other media that can store program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开一种基于WIFI热点实现电子设备私密保护的方法及***包括:在需要访问第一电子设备上的私密内容时,第一电子设备接收第一认证信息,通过WIFI发送给第二电子设备;第二电子设备将第一认证信息与预存的认证秘钥进行比对认证;第二电子设备接收第二认证信息,通过WIFI发送给第一电子设备;第一电子设备将第二认证信息与预存的认证秘钥进行比对认证;在第一认证信息与第二认证信息都通过认证时,打开私密内容。本发明能够保障私密内容的安全。

Description

基于WIFI热点实现电子设备私密保护的方法及***
【技术领域】
本发明涉及一种基于WIFI热点实现电子设备私密保护的方法及***。
【背景技术】
随着现在生活的发展,人们对电子设备应用越来越广,拍照,录像,录音等等。常规的电子设备如手机、平板电脑、笔记本电脑等也变成一个容易外泄私密内容的一个重要的载体。人们也越来越注重手机内容的保密,但是依旧经常有人丢失电子设备,经常有电子设备私密内容外泄,给用户带来极大的困扰。
传统的私密内容保护,就是在自己的电子设备里面,设置某一个文件或者照片等为保护的对象,为其设置一个保护的密码,如想查看上锁的内容,需要输入相应的密码。这方能打开查看。但是这种方式的保护力度也不尽如人意。
【发明内容】
本发明主要解决的技术问题是解决现有技术中电子设备私密内容保护力度不够强而导致私密内容外泄的技术问题,提供一种基于WIFI热点实现电子设备私密保护的方法及***,能够更有效的确保电子设备内的私密内容的安全,给用户更好的个人体验。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种基于WIFI热点实现电子设备私密保护的方法,所述方法包括:第一电子设备与第二电子设备进行WIFI初始化配对,相互绑定用于访问私密内容的认证秘钥;在用户需要访问所述第一电子设备上的私密内容时,所述第一电子设备接收用户输入的第一认证信息,并通过WIFI将所述第一认证信息发送给第二电子设备;所述第二电子设备将所述第一认证信息与所述第二电子设备预存的认证秘钥进行比对认证;所述第二电子设备通过WIFI向所述第一电子设备反馈认证结果;所述第二电子设备接收用户输入的第二认证信息,并通过WIFI将所述第二认证信息发送给所述第一电子设备;所述第一电子设备将所述第二认证信息与所述第一电子设备内预存的认证秘钥进行比对认证;在所述第一认证信息与所述第二认证信息都通过认证时,打开所述第一电子设备的私密内容。
其中,所述第一电子设备与第二电子设备进行WIFI初始化配对,相互绑定用于访问私密内容的认证秘钥包括:所述第一电子设备与所述第二电子设备开启WIFI;所述第一电子设备接收用户输入的第一认证秘钥,通过WIFI将所述第一认证秘钥发送给所述第二电子设备,所述第一认证秘钥用于对所述第一电子设备进行认证;所述第二电子设备接收并保存所述第一认证秘钥;所述第二电子设备接收用户输入的第二认证秘钥,通过WIFI将所述第二认证秘钥发送给所述第一电子设备,所述第二认证秘钥用于对所述第二电子设备进行认证;所述第一电子设备接收并保存所述第二认证秘钥,完成WIFI初始化配对,绑定用于访问所述私密内容的认证秘钥。
其中,所述第二电子设备通过WIFI向所述第一电子设备反馈认证结果包括:在所述第一认证信息通过认证时,通过WIFI向所述第一电子设备返回认证通过通知;在所述第一认证信息未通过认证时,通过WIFI向所述第一电子设备返回认证失败通知,提示用户重新输入认证信息。
为解决上述技术问题,本发明采用的另一个技术方案是:提供一种基于WIFI热点实现电子设备私密保护的方法,所述方法包括:在用户需要访问所述第一电子设备上的私密内容时,所述第一电子设备接收用户输入的第一认证信息,并通过WIFI将所述第一认证信息发送给第二电子设备;所述第二电子设备将所述第一认证信息与所述第二电子设备预存的认证秘钥进行比对认证;所述第二电子设备接收用户输入的第二认证信息,并通过WIFI将所述第二认证信息发送给所述第一电子设备;所述第一电子设备将所述第二认证信息与所述第一电子设备内预存的认证秘钥进行比对认证;在所述第一认证信息与所述第二认证信息都通过认证时,打开所述第一电子设备的私密内容。
其中,所述方法还包括:所述第一电子设备与所述第二电子设备进行WIFI初始化配对,相互绑定用于访问所述私密内容的认证秘钥。
其中,所述第一电子设备与所述第二电子设备进行WIFI初始化配对,相互绑定用于访问所述私密内容的认证秘钥包括:所述第一电子设备与所述第二电子设备开启WIFI;所述第一电子设备接收用户输入的第一认证秘钥,通过WIFI将所述第一认证秘钥发送给所述第二电子设备,所述第一认证秘钥用于对所述第一电子设备进行认证;所述第二电子设备接收并保存所述第一认证秘钥;所述第二电子设备接收用户输入的第二认证秘钥,通过WIFI将所述第二认证秘钥发送给所述第一电子设备,所述第二认证秘钥用于对所述第二电子设备进行认证;所述第一电子设备接收并保存所述第二认证秘钥,完成WIFI初始化配对,绑定用于访问所述私密内容的认证秘钥。
其中,所述第二电子设备将所述第一认证信息与所述第二电子设备预存的认证秘钥进行比对认证之后,还包括:所述第二电子设备通过WIFI向所述第一电子设备反馈认证结果。
其中,所述第二电子设备通过WIFI向所述第一电子设备反馈认证结果包括:在所述第一认证信息通过认证时,通过WIFI向所述第一电子设备返回认证通过通知;在所述第一认证信息未通过认证时,通过WIFI向所述第一电子设备返回认证失败通知,提示用户重新输入认证信息。
为解决上述技术问题,本发明采用的还有一个技术方案是:提供一种基于WIFI热点实现私密保护的***,所述***包括第一电子设备以及第二电子设备,其中,所述第一电子设备包括第一接收模块、第一通信模块、第一认证模块以及第一控制模块,所述第二电子设备包括第二接收模块、第二通信模块以及第二认证模块,其中:在用户需要访问所述第一电子设备上的私密内容时,所述第一接收模块接收用户输入的第一认证信息;所述第一通信模块通过WIFI将所述第一认证信息发送给第二电子设备;所述第二认证模块将所述第一认证信息与所述第二电子设备预存的认证秘钥进行比对认证;所述第二接收模块接收用户输入的第二认证信息;所述第二通信模块通过WIFI将所述第二认证信息发送给所述第一电子设备;所述第一认证模块将所述第二认证信息与所述第一电子设备内预存的认证秘钥进行比对认证;所述第一控制模快在所述第一认证信息与所述第二认证信息都通过认证时,控制打开所述私密内容。
其中,所述第一通信模块和所述第二通信模块还用于使所述第一电子设备与所述第二电子设备进行WIFI初始化配对,相互绑定用于访问所述私密内容的认证秘钥。
其中,所述第一接收模块用于接收用户输入的第一认证秘钥;所述第一通信模块通过WIFI将所述第一认证秘钥发送给所述第二电子设备,所述第一认证秘钥用于对所述第一电子设备进行认证;所述第二接收模块用于接收并保存所述第一认证秘钥,并接收用户输入的第二认证秘钥;所述第二通信模块通过WIFI将所述第二认证秘钥发送给所述第一电子设备,所述第二认证秘钥用于对所述第二电子设备进行认证;所述第一接收模块接收并保存所述第二认证秘钥,完成WIFI初始化配对,绑定用于访问所述私密内容的认证秘钥。
其中,所述第二电子设备还包括第二控制模块:所述第二控制模块控制所述第二通信模块通过WIFI向所述第一电子设备反馈认证结果。
其中,所述第二控制模块在所述第一认证信息通过认证时,控制第二通信模块通过WIFI向所述第一电子设备返回认证通过通知;在所述第一认证信息未通过认证时,控制所述第二通信模块通过WIFI向所述第一电子设备返回认证失败通知,提示用户重新输入认证信息。
本发明的有益效果是:区别于现有技术的情况,本发明提供的基于WIFI热点实现电子设备私密保护的方法及***,当用户需要查看电子设备内的私密内容时,需要当前电子设备与另一电子设备相互配合通过认证才能查看,通过两个不同的电子设备并配合认证秘钥双层保护机制,即使是电子设备丢失,也不会导致私密内容外泄,有效保障电子设备内私密内容的安全,给用户更好的个人体验。
【附图说明】
图1是本发明实施例提供的基于WIFI热点实现电子设备私密保护的方法的流程图;
图2是本发明实施例提供的第一电子设备与第二电子设备进行WIFI初始化配对的流程图;
本发明实施例提供的一种基于WIFI热点实现私密保护的***的结构示意图。
【具体实施方式】
参阅图1,图1是本发明实施例提供的基于WIFI热点实现电子设备私密保护的方法的流程图,如图所示,本实施例提供的基于WIFI热点实现电子设备私密保护的方法包括:
S101:在用户需要访问第一电子设备上的私密内容时,第一电子设备接收用户输入的第一认证信息,并通过WIFI将第一认证信息发送给第二电子设备;
当用户需要访问第一电子设备上的私密内容时,通过特定按键或软键盘触发,弹出私密模式登录界面。本发明实施例所提到的私密内容,可以是电子设备内的图片、录音、录像、短信或来电记录等等。具体私密内容所包括的内容可以根据用户需要自行设置。
其中,本发明的方案依赖于WIFI实现,因此,第一电子设备与第二电子设备都需要具有无线接入功能。WIFI热点是指电子设备将其接收GPRS或3G信号转化为wifi信号再发出去,这样,该电子设备即成了一个WIFI热点。
第一电子设备与第二电子设备预先进行WIFI初始化配对,相互绑定用于访问私密内容的认证秘钥。这里第一电子设备与第二电子设备可以是同属于一个用户的两个不同的电子设备,比如用户A的手机与平板电脑,或者平板电脑与笔记本电脑等,也可以是分别属于不同用户的电子设备。比如用户A的平板电脑,用户B的手机。本发明对此不做限定。
在私密模式界面,用户输入第一认证信息,第一电子设备将第一认证信息通过WIFI发送给第二电子设备以进行身份认证。
其中,请进一步参阅图2,图2是本发明实施例提供的第一电子设备与第二电子设备进行WIFI初始化配对的流程图,如图所示,第一电子设备与第二电子设备进行WIFI初始化配对包括以下步骤:
S201:第一电子设备与第二电子设备开启WIFI;
第一电子设备与第二电子设备都开启WIFI,并处于能够进行WIFI通信的范围内。
S202:第一电子设备接收用户输入的第一认证秘钥,通过WIFI将第一认证秘钥发送给第二电子设备,第一认证秘钥用于对第一电子设备进行认证;
用户在第一电子设备的WIFI设备中找到第二电子设备的WIFI标识,并输入用于对第一电子设备进行认证的第一认证秘钥。第一电子设备将第一认证秘钥通过WIFI发送给第二电子设备,以使第二电子设备存储第一认证秘钥便于后续对所述第一电子设备进行认证。
S203:第二电子设备接收并保存第一认证秘钥;
第二电子设备通过WIFI接收第一认证秘钥,并将第一认证秘钥进行保存。比如可以将第一认证秘钥保存在处理器中或者内存中。
S204:第二电子设备接收用户输入的第二认证秘钥,通过WIFI将第二认证秘钥发送给第一电子设备,第二认证秘钥用于对第二电子设备进行认证;
同理,用户在第二电子设备界面找到第一电子设备的WIFI标识,并输入用于对第二电子设备进行身份认证的第二认证秘钥。第二电子设备接收用户输入的第二认证秘钥,通过WIFI将第二认证秘钥发送给第一电子设备,以使第一电子设备存储第二认证秘钥便于后续对所述第二电子设备进行认证。
S205:第一电子设备接收并保存第二认证秘钥;
第一电子设备通过WIFI接收第二认证秘钥,并将第二认证秘钥进行保存。比如可以将第二认证秘钥保存在处理器中或者内存中。
S206:完成WIFI初始化配对,绑定用于访问私密内容的认证秘钥。
经过以上步骤,完成了第一电子设备与第二电子设备的WIFI初始化配对,并且第一电子设备与第二电子设备相互绑定了用于访问私密内容的认证秘钥。也就是说,在需要访问任何一个电子设备的私密内容时,都需要与之配对的另一个电子设备与该电子设备配合都通过身份认证才能查看私密内容。
需要注意的是,上述步骤S202-S203与步骤S204-S205并不严格区分先后顺序,本实施例只是为了区分两个不同的步骤而进行这样的编号,事实上,第一电子设备发送第一认证秘钥与第二电子设备发送第二认证秘钥可以是同时进行,也可以是第二电子设备先发送第二认证秘钥,第一电子设备接收到第二认证秘钥后再发送第一认证秘钥。只要两个电子设备能够相互配对并绑定认证秘钥,本发明该步骤的实现先后顺序不做限定。
S102:第二电子设备将第一认证信息与第二电子设备预存的认证秘钥进行比对认证;
第二电子设备通过WIFI接收第一认证信息,并将第一认证信息与第二电子设备预存的认证秘钥进行比对认证。当第一认证信息与第二电子设备预存的认证秘钥相同时,第一认证信息通过认证,否则,第一认证信息没有通过认证。
在一些优选的实施例中,第二电子设备进行第一认证信息认证后,还包括通过WIFI向第一电子设备反馈认证结果。
具体可以是以下实施方案:当第一认证信息通过认证时,第二电子设备通过WIFI向第一电子设备返回认证通过通知,当第一认证信息没有通过认证时,第二电子设备通过WIFI向第一电子设备返回认证失败通知,提示用户重新输入认证信息。
当然,这只是本发明实施例的一种实现方式举例,在实际应用过程中,可以通过预先设置来实现认证结果反馈。比如设置当第一认证信息通过时,再向第一电子设备发送第二认证信息,否则不发送第二认证信息。
S103:第二电子设备接收用户输入的第二认证信息,并通过WIFI将第二认证信息发送给第一电子设备;
用户在第二电子设备界面输入用于对第二电子设备进行身份认证的第二认证信息,第二电子设备接收第二认证信息,并通过WIFI将第二认证信息发送给第一电子设备。
S104:第一电子设备将第二认证信息与第一电子设备内预存的认证秘钥进行比对认证;
第一电子设备通过WIFI接收第二认证信息,并将第二认证信息与第一电子设备预存的认证秘钥进行比对认证。当第二认证信息与第一电子设备预存的认证秘钥相同时,第二认证信息通过认证,否则,第二认证信息没有通过认证。
作为一种优选的实现方案,在第二认证信息没有通过认证时,第一电子设备通过WIFI向第二电子设备返回认证失败通知,并提示用户重新输入认证信息。
在第一认证信息与第二认证信息的任何一个没有通过认证时,第一电子设备界面弹出私密模式登录失败提示,或者是直接返回主界面。
S105:打开第一电子设备的私密内容;
在第一认证信息与第二认证信息都通过认证时,打开第一电子设备的私密内容。
需要注意的是,本发明实施例的上述步骤S101-S102与步骤S103-S104并不严格区分先后顺序,甚至有可能是同时进行的。比如可以是当用户触发访问私密内容后,同时向第一电子设备与第二电子设备发送触发指令,第一电子设备与第二电子设备都接收用户输入的认证信息,并将认证信息通过WIFI发送给另一电子设备,两个电子设备的比对认证同时进行。
在另一种实现方式中,可以是当第一认证信息通过认证后,第二电子设备才向第一电子设备发送第二认证信息。如果第一认证信息没有通过认证,第二电子设备向第一电子设备返回认证失败通知,直到第一认证信息通过认证后才向第一电子设备发送第二认证信息。
以上实施例只是以用户需要访问第一电子设备的私密内容为例进行详细说明,当用户需要访问第二电子设备的私密内容时,其实现过程跟上述实现过程基本一致,在此本发明实施例对此不再赘述。
本发明电子设备私密保护的方法,由于是两个电子设备配对,并且需要两个电子设备特定的认证信息都通过认证才能查看私密内容,因此,就算丢失电子设备,别人也不能解锁查看该丢失的电子设备内的私密内容,即使是电子设备的主人想要查看该电子设备内的私密内容,也要另一个电子设备配合进行认证,在两个电子设备认证都通过方能查看私密内容,确保私密内容的安全。
通过上述本发明实施例的阐述,可以理解,本发明实施例提供的基于WIFI热点实现电子设备私密保护的方法,当用户需要查看电子设备内的私密内容时,需要当前电子设备与另一电子设备相互配合通过认证才能查看,通过两个不同的电子设备并配合认证秘钥双层保护机制,即使是电子设备丢失,也不会导致私密内容外泄,有效保障电子设备内私密内容的安全,给用户更好的个人体验。
请参阅图3,图3是本发明实施例提供的一种基于WIFI热点实现私密保护的***100,该***包括第一电子设备200以及第二电子设备300,其中,第一电子设备200包括第一接收模块20、第一通信模块21、第一认证模块22以及第一控制模块23,第二电子设备300包括第二接收模块30、第二通信模块31以及第二认证模块32,其中:
在用户需要访问第一电子设备上的私密内容时,第一接收模块20接收用户输入的第一认证信息;
当用户需要访问第一电子设备上的私密内容时,通过特定按键或软键盘触发,弹出私密模式登录界面。本发明实施例所提到的私密内容,可以是电子设备内的图片、录音、录像、短信或来电记录等等。具体私密内容所包括的内容可以根据用户需要自行设置。
其中,第一通信模块21与第二通信模块31用于使第一电子设备与第二电子设备预先进行WIFI初始化配对,相互绑定用于访问私密内容的认证秘钥。这里第一电子设备与第二电子设备可以是同属于一个用户的两个不同的电子设备,比如用户A的手机与平板电脑,或者平板电脑与笔记本电脑等,也可以是分别属于不同用户的电子设备。比如用户A的平板电脑,用户B的手机。本发明对此不做限定。
在私密模式界面,用户输入第一认证信息,第一接收模块20接收第一认证信息。
其中,第一电子设备与第二电子设备进行WIFI初始化配对时:
第一接收模块20用于接收用户输入的第一认证秘钥,第一通信模块21通过WIFI将第一认证秘钥发送给第二电子设备,第一认证秘钥用于对第一电子设备进行认证。第二接收模块30用于接收并保存第一认证秘钥,并接收用户输入的第二认证秘钥,第二通信模块31通过WIFI将第二认证秘钥发送给第一电子设备,第二认证秘钥用于对第二电子设备进行认证,第一接收模块20接收并保存第二认证秘钥,完成WIFI初始化配对,绑定用于访问私密内容的认证秘钥。
其中,第一电子设备和第二电子设备可以分别将第二认证秘钥与第一认证秘钥保存在处理器或内存中,以用于后续对第二电子设备与第一电子设备进行身份认证。
第一通信模块21通过WIFI将第一认证信息发送给第二电子设备;
第一通信模块21将第一认证信息通过WIFI发送给第二电子设备以进行身份认证。
第二认证模块32将第一认证信息与第二电子设备预存的认证秘钥进行比对认证;
第二认证模块32将第一认证信息与第二电子设备预存的认证秘钥进行比对认证。当第一认证信息与第二电子设备预存的认证秘钥相同时,第一认证信息通过认证,否则,第一认证信息没有通过认证。
在一些优选的实施例中,本发明的第二电子设备还进一步包括第二控制模块33,第二控制模块33控制第二通信模块31通过WIFI向第一电子设备反馈认证结果。
具体地,第二控制模块33在第一认证信息通过认证时,控制第二通信模块31通过WIFI向第一电子设备返回认证通过通知;在第一认证信息未通过认证时,控制第二通信模块31通过WIFI向第一电子设备返回认证失败通知,提示用户重新输入认证信息。
当然,这只是本发明实施例的一种实现方式举例,在实际应用过程中,第二控制模块33可以根据预先设置来实现认证结果反馈。比如预先设置当第一认证信息通过时,第二控制模块33控制再向第一电子设备发送第二认证信息,否则不发送第二认证信息。
第二接收模块30接收用户输入的第二认证信息;
用户在第二电子设备界面输入用于对第二电子设备进行身份认证的第二认证信息,第二接收模块30接收第二认证信息。
第二通信模块31通过WIFI将第二认证信息发送给第一电子设备;
第二通信模块31通过WIFI将第二认证信息发送给第一电子设备以使第一电子设备进行比对认证。
第一认证模块22将第二认证信息与第一电子设备内预存的认证秘钥进行比对认证;
第一电子设备通过WIFI接收第二认证信息,并将第二认证信息与第一电子设备预存的认证秘钥进行比对认证。当第二认证信息与第一电子设备预存的认证秘钥相同时,第二认证信息通过认证,否则,第二认证信息没有通过认证。
作为一种优选的实现方案,在第二认证信息没有通过认证时,第一通信模块21通过WIFI向第二电子设备返回认证失败通知,并提示用户重新输入认证信息。
在第一认证信息与第二认证信息的任何一个没有通过认证时,第一电子设备界面弹出私密模式登录失败提示,或者是直接返回主界面。
第一控制模快23在第一认证信息与第二认证信息都通过认证时,控制打开私密内容。
在第一认证信息与第二认证信息都通过认证时,第一控制模块23控制打开第一电子设备的私密内容。
以上***的实施例只是以用户需要访问第一电子设备的私密内容为例进行详细说明,当用户需要访问第二电子设备的私密内容时,其实现过程跟上述实现过程基本一致,在此本发明实施例对此不再赘述。
通过上述本发明实施例基于WIFI热点实现电子设备私密保护的方法及***,可以理解,本发明的私密保护方法当用户需要查看电子设备内的私密内容时,需要当前电子设备与另一电子设备相互配合通过认证才能查看,通过两个不同的电子设备并配合认证秘钥双层保护机制,即使是电子设备丢失,也不会导致私密内容外泄,有效保障电子设备内私密内容的安全,给用户更好的个人体验。
在本发明所提供的几个实施例中,应该理解到,所揭露的***,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (13)

  1. 一种基于WIFI热点实现电子设备私密保护的方法,其中,所述方法包括:
    第一电子设备与第二电子设备进行WIFI初始化配对,相互绑定用于访问私密内容的认证秘钥;
    在用户需要访问所述第一电子设备上的私密内容时,所述第一电子设备接收用户输入的第一认证信息,并通过WIFI将所述第一认证信息发送给第二电子设备;
    所述第二电子设备将所述第一认证信息与所述第二电子设备预存的认证秘钥进行比对认证;
    所述第二电子设备通过WIFI向所述第一电子设备反馈认证结果;
    所述第二电子设备接收用户输入的第二认证信息,并通过WIFI将所述第二认证信息发送给所述第一电子设备;
    所述第一电子设备将所述第二认证信息与所述第一电子设备内预存的认证秘钥进行比对认证;
    在所述第一认证信息与所述第二认证信息都通过认证时,打开所述第一电子设备的私密内容。
  2. 根据权利要求1所述的方法,其中,所述第一电子设备与第二电子设备进行WIFI初始化配对,相互绑定用于访问私密内容的认证秘钥包括:
    所述第一电子设备与所述第二电子设备开启WIFI;
    所述第一电子设备接收用户输入的第一认证秘钥,通过WIFI将所述第一认证秘钥发送给所述第二电子设备,所述第一认证秘钥用于对所述第一电子设备进行认证;
    所述第二电子设备接收并保存所述第一认证秘钥;
    所述第二电子设备接收用户输入的第二认证秘钥,通过WIFI将所述第二认证秘钥发送给所述第一电子设备,所述第二认证秘钥用于对所述第二电子设备进行认证;
    所述第一电子设备接收并保存所述第二认证秘钥,完成WIFI初始化配对,绑定用于访问所述私密内容的认证秘钥。
  3. 根据权利要求1所述的方法,其中,所述第二电子设备通过WIFI向所述第一电子设备反馈认证结果包括:
    在所述第一认证信息通过认证时,通过WIFI向所述第一电子设备返回认证通过通知;
    在所述第一认证信息未通过认证时,通过WIFI向所述第一电子设备返回认证失败通知,提示用户重新输入认证信息。
  4. 一种基于WIFI热点实现电子设备私密保护的方法,其中,所述方法包括:
    在用户需要访问第一电子设备上的私密内容时,所述第一电子设备接收用户输入的第一认证信息,并通过WIFI将所述第一认证信息发送给第二电子设备;
    所述第二电子设备将所述第一认证信息与所述第二电子设备预存的认证秘钥进行比对认证;
    所述第二电子设备接收用户输入的第二认证信息,并通过WIFI将所述第二认证信息发送给所述第一电子设备;
    所述第一电子设备将所述第二认证信息与所述第一电子设备内预存的认证秘钥进行比对认证;
    在所述第一认证信息与所述第二认证信息都通过认证时,打开所述第一电子设备的私密内容。
  5. 根据权利要求4所述的方法,其中,所述方法还包括:
    所述第一电子设备与所述第二电子设备进行WIFI初始化配对,相互绑定用于访问所述私密内容的认证秘钥。
  6. 根据权利要求5所述的方法,其中, 所述第一电子设备与所述第二电子设备进行WIFI初始化配对,相互绑定用于访问所述私密内容的认证秘钥包括:
    所述第一电子设备与所述第二电子设备开启WIFI;
    所述第一电子设备接收用户输入的第一认证秘钥,通过WIFI将所述第一认证秘钥发送给所述第二电子设备,所述第一认证秘钥用于对所述第一电子设备进行认证;
    所述第二电子设备接收并保存所述第一认证秘钥;
    所述第二电子设备接收用户输入的第二认证秘钥,通过WIFI将所述第二认证秘钥发送给所述第一电子设备,所述第二认证秘钥用于对所述第二电子设备进行认证;
    所述第一电子设备接收并保存所述第二认证秘钥,完成WIFI初始化配对,绑定用于访问所述私密内容的认证秘钥。
  7. 根据权利要求4所述的方法,其中,所述第二电子设备将所述第一认证信息与所述第二电子设备预存的认证秘钥进行比对认证之后,还包括:
    所述第二电子设备通过WIFI向所述第一电子设备反馈认证结果。
  8. 根据权利要求7所述的方法,其中,所述第二电子设备通过WIFI向所述第一电子设备反馈认证结果包括:
    在所述第一认证信息通过认证时,通过WIFI向所述第一电子设备返回认证通过通知;
    在所述第一认证信息未通过认证时,通过WIFI向所述第一电子设备返回认证失败通知,提示用户重新输入认证信息。
  9. 一种基于WIFI热点实现私密保护的***,其中,所述***包括第一电子设备以及第二电子设备,其中,所述第一电子设备包括第一接收模块、第一通信模块、第一认证模块以及第一控制模块,所述第二电子设备包括第二接收模块、第二通信模块以及第二认证模块,其中:
    在用户需要访问所述第一电子设备上的私密内容时,所述第一接收模块接收用户输入的第一认证信息;
    所述第一通信模块通过WIFI将所述第一认证信息发送给第二电子设备;
    所述第二认证模块将所述第一认证信息与所述第二电子设备预存的认证秘钥进行比对认证;
    所述第二接收模块接收用户输入的第二认证信息;
    所述第二通信模块通过WIFI将所述第二认证信息发送给所述第一电子设备;
    所述第一认证模块将所述第二认证信息与所述第一电子设备内预存的认证秘钥进行比对认证;
    所述第一控制模快在所述第一认证信息与所述第二认证信息都通过认证时,控制打开所述私密内容。
  10. 根据权利要求9所述的***,其中,所述第一通信模块和所述第二通信模块还用于使所述第一电子设备与所述第二电子设备进行WIFI初始化配对,相互绑定用于访问所述私密内容的认证秘钥。
  11. 根据权利要求10所述的***,其中,
    所述第一接收模块用于接收用户输入的第一认证秘钥;
    所述第一通信模块通过WIFI将所述第一认证秘钥发送给所述第二电子设备,所述第一认证秘钥用于对所述第一电子设备进行认证;
    所述第二接收模块用于接收并保存所述第一认证秘钥,并接收用户输入的第二认证秘钥;
    所述第二通信模块通过WIFI将所述第二认证秘钥发送给所述第一电子设备,所述第二认证秘钥用于对所述第二电子设备进行认证;
    所述第一接收模块接收并保存所述第二认证秘钥,完成WIFI初始化配对,绑定用于访问所述私密内容的认证秘钥。
  12. 根据权利要求9所述的***,其中,所述第二电子设备还包括第二控制模块:
    所述第二控制模块控制所述第二通信模块通过WIFI向所述第一电子设备反馈认证结果。
  13. 根据权利要求12所述的***,其中,所述第二控制模块在所述第一认证信息通过认证时,控制第二通信模块通过WIFI向所述第一电子设备返回认证通过通知;在所述第一认证信息未通过认证时,控制所述第二通信模块通过WIFI向所述第一电子设备返回认证失败通知,提示用户重新输入认证信息。
PCT/CN2015/092018 2015-04-01 2015-10-15 基于wifi热点实现电子设备私密保护的方法及*** WO2016155283A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510153178.4A CN104836794B (zh) 2015-04-01 2015-04-01 基于wifi热点实现电子设备私密保护的方法及***
CN201510153178.4 2015-04-01

Publications (1)

Publication Number Publication Date
WO2016155283A1 true WO2016155283A1 (zh) 2016-10-06

Family

ID=53814430

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/092018 WO2016155283A1 (zh) 2015-04-01 2015-10-15 基于wifi热点实现电子设备私密保护的方法及***

Country Status (2)

Country Link
CN (1) CN104836794B (zh)
WO (1) WO2016155283A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910843A (zh) * 2021-01-15 2021-06-04 深圳市欢太科技有限公司 数据传输方法、电子设备、服务器、移动终端及存储介质

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104836794B (zh) * 2015-04-01 2019-01-04 Tcl通讯科技(成都)有限公司 基于wifi热点实现电子设备私密保护的方法及***
CN107451484A (zh) * 2016-05-30 2017-12-08 宇龙计算机通信科技(深圳)有限公司 私密信息的访问方法、访问装置和终端
CN107818263B (zh) * 2016-09-13 2021-02-19 腾讯科技(深圳)有限公司 电子文档处理方法和装置、电子文档加密方法和装置
CN109067766A (zh) * 2018-08-30 2018-12-21 郑州云海信息技术有限公司 一种身份认证方法、服务器端和客户端

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070079955A (ko) * 2007-06-29 2007-08-08 정윤석 핸드폰과 연동한 컴퓨터보안 및 사용통제 시스템
CN103888265A (zh) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 一种基于移动终端的登录***和方法
CN104836794A (zh) * 2015-04-01 2015-08-12 惠州Tcl移动通信有限公司 基于wifi热点实现电子设备私密保护的方法及***

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103517240A (zh) * 2012-06-20 2014-01-15 国民技术股份有限公司 一种转接装置、射频通信方法及***

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070079955A (ko) * 2007-06-29 2007-08-08 정윤석 핸드폰과 연동한 컴퓨터보안 및 사용통제 시스템
CN103888265A (zh) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 一种基于移动终端的登录***和方法
CN104836794A (zh) * 2015-04-01 2015-08-12 惠州Tcl移动通信有限公司 基于wifi热点实现电子设备私密保护的方法及***

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910843A (zh) * 2021-01-15 2021-06-04 深圳市欢太科技有限公司 数据传输方法、电子设备、服务器、移动终端及存储介质

Also Published As

Publication number Publication date
CN104836794B (zh) 2019-01-04
CN104836794A (zh) 2015-08-12

Similar Documents

Publication Publication Date Title
WO2016155283A1 (zh) 基于wifi热点实现电子设备私密保护的方法及***
WO2012016473A1 (zh) 无线保真接入方法、接入点及无线保真接入***
WO2019035700A1 (en) METHOD AND APPARATUS FOR BOARDING IN AN IOT NETWORK
WO2014026442A1 (zh) 身份认证装置及其方法
WO2017071329A1 (zh) 密码管理方法、密码管理***及终端设备
WO2014094300A1 (zh) 远程控制通讯终端工作的服务器和方法及通讯终端
WO2014040439A1 (zh) 一种无线网络***及便携式电子设备
WO2019056831A1 (zh) 车辆控制方法、客户端及***
EP3036650A1 (en) System, apparatus, and method for sharing electronic device
WO2016033929A1 (zh) 一种云数据备份及恢复方法
WO2018094809A1 (zh) 一种资源共享方法及装置
WO2015176386A1 (zh) 基于人脸识别的使用权限和用户模式控制方法及***
EP3123660A1 (en) Method and apparatus for supporting login through user terminal
WO2017173838A1 (zh) 基于验证的消息显示方法及通信终端
WO2012006827A1 (zh) 一种移动终端及其解锁方法
WO2020154922A1 (zh) 智能锁控制方法及装置
WO2017206506A1 (zh) 一种nfc移动支付终端的安全模块管理方法及终端
WO2010016724A2 (en) Method and apparatus for notifying remote user interface client about event of remote user interface server in home network
WO2018000978A1 (zh) 一种数据备份方法及终端
WO2015105289A1 (ko) 인터넷 환경에서의 사용자 보안 인증 시스템 및 그 방법
CN109994115A (zh) 通讯方法及装置、数据处理方法及设备
WO2016095375A1 (zh) 移动终端及其基于dtmf的会话认证方法
WO2018068740A1 (zh) 终端及其应用程序的启动管理方法
WO2017206453A1 (zh) 应用图标显示方法及***
WO2017088529A1 (zh) 一种基于移动终端的蓝牙手表加密方法及蓝牙手表

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15887237

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15887237

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 15887237

Country of ref document: EP

Kind code of ref document: A1