CN102521539A - Reliable password protection method of mobile device - Google Patents
Reliable password protection method of mobile device Download PDFInfo
- Publication number
- CN102521539A CN102521539A CN2011104062516A CN201110406251A CN102521539A CN 102521539 A CN102521539 A CN 102521539A CN 2011104062516 A CN2011104062516 A CN 2011104062516A CN 201110406251 A CN201110406251 A CN 201110406251A CN 102521539 A CN102521539 A CN 102521539A
- Authority
- CN
- China
- Prior art keywords
- user
- mobile device
- password
- input
- answer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention provides a reliable password protection method of a mobile device, which achieves password protection by setting corresponding answer for a password protection problem, wherein the main method is as follows: setting the password protection problem and corresponding answer automatically on the mobile device. Correspondingly, a mobile device for achieving reliable password protection method falls into a protection range of the invention. The method in the invention can enable a user to actively participate in setting problem with certain objectivity, so that memory work of the user can be lightened and possibility that the user forgets the password is reduced to a great extent.
Description
Technical field
The present invention relates to a kind of reliable mobile device cipher code protection method.
Background technology
Be accompanied by the development of society, portable terminal particularly mobile phone has become the indispensable articles for use of people's daily life.Mobile phone writes down and has stored a large number of users privacy information and data (like note, photo, p.m.entry, log etc.) as personal effect, and the user has some data of mobile phone or uses the demand of protection.At present main implementation method is following:
1. most of mobile terminal devices all have cipher protection function.Modal is through 4-6 bit digital password being set, can protecting the address list in the mobile phone, the use access rights of file and even certain application in message registration, the information mobile phone.Shortcoming be initial numerical ciphers too simple (as 0000 or 1234), even the password after the user's modification also is several bit digital, bring bigger memory burden to the user, the consequence of bringing after forgeing is also bigger.
2. application number/patent No.: 200810303556, be through setting an image mode, need go subjective memory, having increased user's memory burden.
Though encrypting fingerprint, voice encryption etc. are relatively safe, also exist certain shortcoming, because physiological characteristic or physiological activity performance are changed by the influence of objective environment, there is the risk of being deeply aware of one's own helplessness when faced with a great task over a period to come.Scratched such as finger, having caught a cold has influence on the normal performance of fingerprint and voice.
Summary of the invention
The purpose of this invention is to provide a kind of reliable mobile device cipher code protection method, so that the data security of reliable protection user mobile device more.
A kind of reliable mobile device cipher code protection method provided by the invention protects the mode of the corresponding answer of problem to realize cryptoguard through setting password protection; Main means are on said mobile device, to have carried out independently setting the setting of said cryptoguard problem and corresponding answer.
Specifically; Said mobile device realizes that the flow process of password protection protection may further comprise the steps: selected to give tacit consent to or imported preset some password protection problems and import the corresponding answer of each problem by the user; When the user in cancellation cryptoguard or when reading the data of opening cryptoguard or function, need the corresponding answer of input problem, equipment obtains the content that the user imports in interface for password input; And with the preset answer contrast of itself and cryptoguard problem; If import the pairing of content and preset password content then permission execution user instruction, pairing gets nowhere and does not then allow to carry out user instruction, and preset password protection problem is set arbitrarily by the user.
Preferably, said mobile device comprise can explicit user preset problem, answer and information display module, can supply the user to import the storer of the load module of problem, the acquisition module that can obtain problem, answer and the instruction of user's input, the problem that can store user's input and answer, whether answer that can the judges input meets the processor of data of judge module and the instruction that can process user and the input of preset value.
This mobile device realizes that the flow process of password protection protection may further comprise the steps:
Step S200 gets into display module, and with preset form display password inputting interface, this interface comprises problem input field and password input field;
Step S202, acquisition module obtain problem and the answer of user in the display module input, and it is saved in the storer;
Step S204, display module produces interface for password input according to the content that acquisition module obtains in step S202, and this interface acquiescence has shown problem, the password input field of step S200 input, and the prompting user imports the answer of problem once more;
Step S206, acquisition module obtain the problem answers of in step S204 user input, then by judge module with its with step S202 in the answer that is saved in the storer whether consistently compare;
If judge module is judged consistent, then display module prompting user is provided with success; If it is inconsistent that judge module is judged, then feedback user input password mistake, and then entering step S206.
Correspondingly, the mobile device that can realize described reliable mobile device cipher code protection method is also within protection scope of the present invention.
Utilize the present invention, can use that the householder is moving to participate in that problem is set and problem has certain objectivity, alleviated user's memory burden, reduced the possibility that the user forgets password to a great extent.
Description of drawings
To be the present invention be provided with the functional block diagram of preferred embodiments of the method for cryptoguard through preset problem mode to Fig. 1.
Fig. 2 is the present invention is provided with the method for cryptoguard through preset problem mode a password setting process flow diagram.
Fig. 3 is the present invention is provided with the method for cryptoguard through preset problem mode a protection process flow diagram.
Fig. 4 is that the cryptoguard of the inventive method is provided with the interface.
Fig. 5 is the cryptoguard interface of the inventive method.
Embodiment
The mobile hand-held device that the present invention relates to is used for ensureing subscriber equipment safety through a kind of mode of setting problem; Said mobile device can comprise with lower module: display module, load module, acquisition module, storer, judge module, processor.
This display module is mainly used in explicit user preset problem, answer and some informations.Load module is mainly used in the user and imports problem, answer and instruction.Acquisition module is mainly used in problem, answer and the instruction of obtaining user's input.Storer is mainly used in the problem and the answer of storage user input.Whether the answer that judge module is mainly used in the judges input meets preset value.Processor is mainly used in the data of the instruction and the input of process user.
Said mobile device can be realized the password protection protection through following steps: the user is selected to give tacit consent to or is imported preset some password protection problems (this paper is example so that 2 password protection problems to be set) and import the corresponding answer of each problem by the user when cryptoguard is set.When the user in cancellation cryptoguard or when reading the data of opening cryptoguard or function, need the corresponding answer of input problem.Equipment obtains the content that the user imports in interface for password input, and with the preset answer contrast of itself and cryptoguard problem, if the input content with the pairing of preset password content then allow to carry out user instruction, pairing gets nowhere and does not then allow to carry out user instruction.Preset password protection problem is set arbitrarily by the user, can be user's private information, for example, " is whom senior middle school in unrequited love with liking? is favorite song? whom is the brother that university sleeps on the upper berth? " Deng.
The key problem in technology point is to be to be provided with problem, problem is saved in the storer, when the user need then import problem answers, the process of coupling.Desire protection knowledge point is at the equipment with man-machine interaction particularly in the mobile handsets, and the mode through setting problem is reliable protection user's secret more.
Below in conjunction with accompanying drawing the present invention is further specified.
As shown in Figure 1, the module map of a kind of mobile handsets 10 of having represented to the present invention relates to.In this embodiment, mobile handsets A comprises display module 100, load module 102, acquisition module 104, storer 106, judge module 108, processor 110.In this embodiment, said mobile handsets can or have the equipment that cryptoguard is provided with for mobile phone.
Fig. 2 is provided with the process flow diagram of cryptoguard for said mobile handsets 10:
At step S200, get into display module 100, with preset form display password inputting interface, this interface comprises problem input field and password input field.Wherein the problem input field allows user's input characters, also can be to have several preset problems available.
At step S202, acquisition module 104 obtains problem and the answer of user in display module 100 inputs, and it is saved in the storer 106.
At step S204, display module 100 produces interface for password input according to the content that acquisition module 104 obtains in step S202, and this interface acquiescence has shown problem, the password input field of step S200 input, and the prompting user imports the answer of problem once more.
At step S206, acquisition module 104 obtains the problem answers of user's input in step S204.Then by judge module 108 with its with step S202 in the answer that is saved in the storer 106 whether consistently compare.
If, then getting into step S208, display module 100 prompting users are provided with success
In this embodiment step S206, inconsistent if judge module 108 is judged, then get into step S210 feedback user input password mistake, and then get into step S206.
Fig. 3 is provided with the protection process flow diagram of the method for cryptoguard through preset problem mode for the present invention:
At step S300, processor 110 receives the instruction that triggers cryptoguard.
At step S302, display module 100 display password inputting interfaces, this interface acquiescence shows password protection problem and password input field, and the prompting user imports the answer of problem.Wherein the problem of acquiescence demonstration is the password protection problem of user preset among Fig. 2.
At step S304, acquisition module 104 obtains the problem answers of user's input in step S302.Then by judge module 108 with its with Fig. 2 step S202 in the answer that is saved in the storer 106 whether consistently compare.
If, then get into step S306, carry out the function that the user triggers.
In this embodiment step S300, triggering the cryptoguard condition can be that the user uses protected data, function, resets the password protection problem, cancellation cryptoguard etc.
In this embodiment step S304, if judge module 108 judgement input contents and preset problem answers are inconsistent, then get into step S308, feedback input password mistake, and then get into step S302.
Fig. 4 has represented that a kind of cryptoguard is provided with the interface, and this interface selects input frames and answer input frame to constitute by 2 problems, and the user can select the problem given tacit consent to, also can own manual input problem.
Fig. 5 has represented a kind of cryptoguard interface, the problem that this interface acquiescence explicit user when cryptoguard is set, and the user just can carry out user instruction after importing correct option.
Claims (5)
1. reliable mobile device cipher code protection method; Protect the mode of the corresponding answer of problem to realize cryptoguard through setting password protection; It is characterized in that, on said mobile device, carried out independently to set the setting of said cryptoguard problem and corresponding answer.
2. reliable mobile device cipher code protection method according to claim 1; It is characterized in that; Said mobile device realizes that the flow process of password protection protection may further comprise the steps: selected to give tacit consent to or imported preset some password protection problems and import the corresponding answer of each problem by the user; When the user in cancellation cryptoguard or when reading the data of opening cryptoguard or function, need the corresponding answer of input problem, equipment obtains the content that the user imports in interface for password input; And with the preset answer contrast of itself and cryptoguard problem; If import the pairing of content and preset password content then permission execution user instruction, pairing gets nowhere and does not then allow to carry out user instruction, and preset password protection problem is set arbitrarily by the user.
3. reliable mobile device cipher code protection method according to claim 1; It is characterized in that, said mobile device comprise can explicit user preset problem, answer and information display module (100), can supply the user to import the storer (106) of the load module (102) of problem, the acquisition module (104) that can obtain problem, answer and the instruction of user's input, the problem that can store user's input and answer, whether answer that can the judges input meets the processor (110) of data of judge module (108) and the instruction that can process user and the input of preset value.
4. reliable mobile device cipher code protection method according to claim 3 is characterized in that, said mobile device realizes that the flow process of password protection protection may further comprise the steps:
Step S200 gets into display module (100), and with preset form display password inputting interface, this interface comprises problem input field and password input field;
Step S202, acquisition module (104) obtain problem and the answer of user in display module (100) input, and it is saved in the storer (106);
Step S204, display module (100) produces interface for password input according to the content that acquisition module (104) obtains in step S202, and this interface acquiescence has shown problem, the password input field of step S200 input, and the prompting user imports the answer of problem once more;
Step S206, acquisition module (104) obtain the problem answers of in step S204 user input, then by judge module (108) with its with step S202 in the answer that is saved in the storer (106) whether consistently compare;
If judge module (108) is judged consistent, then display module (100) prompting user is provided with success; If it is inconsistent that judge module (108) is judged, then feedback user input password mistake, and then entering step S206.
5. a mobile device is characterized in that, this mobile device can be realized each described reliable mobile device cipher code protection method of claim 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104062516A CN102521539A (en) | 2011-12-08 | 2011-12-08 | Reliable password protection method of mobile device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104062516A CN102521539A (en) | 2011-12-08 | 2011-12-08 | Reliable password protection method of mobile device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102521539A true CN102521539A (en) | 2012-06-27 |
Family
ID=46292450
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011104062516A Pending CN102521539A (en) | 2011-12-08 | 2011-12-08 | Reliable password protection method of mobile device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102521539A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067612A (en) * | 2013-01-30 | 2013-04-24 | 广东欧珀移动通信有限公司 | Private information viewing method and system based on mobile terminal equipment |
CN103455740A (en) * | 2013-08-30 | 2013-12-18 | 深圳创维数字技术股份有限公司 | Cipher processing method, device and terminal |
CN104102864A (en) * | 2014-07-30 | 2014-10-15 | 宇龙计算机通信科技(深圳)有限公司 | Terminal screen locking password resetting method, resetting system and terminal |
CN104166814A (en) * | 2014-07-16 | 2014-11-26 | 小米科技有限责任公司 | Method and device for prompting WIFI network password and equipment |
CN104753942A (en) * | 2015-03-30 | 2015-07-01 | 无锡市崇安区科技创业服务中心 | Secret key generating and decrypting method used for communication network |
CN105825093A (en) * | 2015-07-30 | 2016-08-03 | 维沃移动通信有限公司 | Screen unlocking method and terminal |
CN107038370A (en) * | 2017-04-26 | 2017-08-11 | 深圳市微橙网络科技有限公司 | A kind of cipher memory points out application software |
CN109587276A (en) * | 2019-01-11 | 2019-04-05 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of data back up method, system and associated component |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050154897A1 (en) * | 2004-01-13 | 2005-07-14 | International Business Machines Corporation | Protected access to a secured entity through a randomly selected password requested through an interactive computer controlled display terminal |
CN101859504A (en) * | 2009-04-08 | 2010-10-13 | 深圳富泰宏精密工业有限公司 | Electronic device and password protection method thereof |
US20100263055A1 (en) * | 2009-04-08 | 2010-10-14 | David Vazquez Del Mercado Habif | Method and system for controlling the use of an electronic device |
CN101866409A (en) * | 2010-05-11 | 2010-10-20 | 中兴通讯股份有限公司 | Method and device for locking and unlocking handheld equipment |
-
2011
- 2011-12-08 CN CN2011104062516A patent/CN102521539A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050154897A1 (en) * | 2004-01-13 | 2005-07-14 | International Business Machines Corporation | Protected access to a secured entity through a randomly selected password requested through an interactive computer controlled display terminal |
CN101859504A (en) * | 2009-04-08 | 2010-10-13 | 深圳富泰宏精密工业有限公司 | Electronic device and password protection method thereof |
US20100263055A1 (en) * | 2009-04-08 | 2010-10-14 | David Vazquez Del Mercado Habif | Method and system for controlling the use of an electronic device |
CN101866409A (en) * | 2010-05-11 | 2010-10-20 | 中兴通讯股份有限公司 | Method and device for locking and unlocking handheld equipment |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067612A (en) * | 2013-01-30 | 2013-04-24 | 广东欧珀移动通信有限公司 | Private information viewing method and system based on mobile terminal equipment |
CN103455740A (en) * | 2013-08-30 | 2013-12-18 | 深圳创维数字技术股份有限公司 | Cipher processing method, device and terminal |
CN103455740B (en) * | 2013-08-30 | 2016-06-29 | 深圳创维数字技术有限公司 | A kind of cipher processing method, device and terminal |
CN104166814A (en) * | 2014-07-16 | 2014-11-26 | 小米科技有限责任公司 | Method and device for prompting WIFI network password and equipment |
CN104102864A (en) * | 2014-07-30 | 2014-10-15 | 宇龙计算机通信科技(深圳)有限公司 | Terminal screen locking password resetting method, resetting system and terminal |
CN104753942A (en) * | 2015-03-30 | 2015-07-01 | 无锡市崇安区科技创业服务中心 | Secret key generating and decrypting method used for communication network |
CN104753942B (en) * | 2015-03-30 | 2018-04-24 | 无锡市崇安区科技创业服务中心 | A kind of key generation and decryption method for communication network |
CN105825093A (en) * | 2015-07-30 | 2016-08-03 | 维沃移动通信有限公司 | Screen unlocking method and terminal |
CN107038370A (en) * | 2017-04-26 | 2017-08-11 | 深圳市微橙网络科技有限公司 | A kind of cipher memory points out application software |
CN109587276A (en) * | 2019-01-11 | 2019-04-05 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of data back up method, system and associated component |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102521539A (en) | Reliable password protection method of mobile device | |
CN104657674B (en) | The insulation blocking system and method for private data in a kind of mobile phone | |
CN102467462B (en) | Method for protecting data stored in device and corresponding device | |
CN101917513B (en) | Method and device for implementing graded display of privacy information | |
CN108521494B (en) | Terminal control method and device, readable storage medium and terminal | |
US20070280515A1 (en) | Portable electronic apparatus and recording medium | |
CN112799750A (en) | Terminal equipment information display method and terminal equipment | |
CN103002124A (en) | Method, device and equipment for processing communication data | |
CN103473514A (en) | Data storage access method and device | |
CN104008313A (en) | Protecting method and device of privacy information | |
CN1997188A (en) | A recognition method of the user identity and its handset | |
US8706158B2 (en) | Mobile phone for authenticating SIM card and method thereof | |
CN103513915A (en) | Digital device and method for controlling same | |
CN106295294A (en) | Method for controlling mobile terminal and device | |
CN103632105A (en) | Information displaying method and electronic device | |
CN109219003B (en) | Information encryption method and device, storage medium and electronic equipment | |
CN202453893U (en) | Mobile device with reliable password protection function | |
US20230006950A1 (en) | Information sharing method, device and non-transitory computer readable storage medium thereof | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN104854599A (en) | Mobile terminal, wearable device, and communication message processing method | |
JP2022002103A (en) | Privacy protecting method and protecting device for mobile terminal and mobile terminal | |
CN102542210A (en) | Electronic device and method for managing file permissions | |
CN106714147A (en) | Privacy short message protection method | |
TW201424332A (en) | User information protecting system and method | |
CN107153788A (en) | A kind of cipher-code input method and device, a kind of device for Password Input |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120627 |