CN102393886A - Safety control method of mobile terminal, device and system - Google Patents

Safety control method of mobile terminal, device and system Download PDF

Info

Publication number
CN102393886A
CN102393886A CN2011101802468A CN201110180246A CN102393886A CN 102393886 A CN102393886 A CN 102393886A CN 2011101802468 A CN2011101802468 A CN 2011101802468A CN 201110180246 A CN201110180246 A CN 201110180246A CN 102393886 A CN102393886 A CN 102393886A
Authority
CN
China
Prior art keywords
secure hardware
keyboard
keyboard drive
application program
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101802468A
Other languages
Chinese (zh)
Other versions
CN102393886B (en
Inventor
王蜀洪
黄尹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sumavision Technologies Co Ltd
Original Assignee
Sumavision Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sumavision Technologies Co Ltd filed Critical Sumavision Technologies Co Ltd
Priority to CN201110180246.8A priority Critical patent/CN102393886B/en
Publication of CN102393886A publication Critical patent/CN102393886A/en
Application granted granted Critical
Publication of CN102393886B publication Critical patent/CN102393886B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a safety control method of a mobile terminal, a device and a system. The method comprises the following steps that: an application program detects safety hardware, under the condition meeting a detection condition, the application program calls a first keyboard drive, and the first keyboard drive shields a second keyboard drive; the first keyboard drive reads a key value received by a keyboard, and transfers the key value to the safety hardware; the safety hardware encrypts the key value, and returns the encrypted key value to the application program; and the application program decrypts the encrypted key value to obtain the key value. By the invention, the all-directional information safety protection can be realized, and the wide applicability can be realized.

Description

The method of controlling security of portable terminal, Apparatus and system
Technical field
The present invention relates to information security field, in particular to a kind of method of controlling security, Apparatus and system of portable terminal.
Background technology
Along with mobile intelligent, increasing application is transplanted on the mobile phone, has greatly made things convenient for people's life.Simultaneously, many assaults also turn to the mobile phone application platform gradually.These assaults are similar to the PC environment, and fundamental purpose is to steal the password of the various application of user, more particularly relates to the application of financial sector, like Mobile banking, mobile-phone payment etc.
In the mobile phone application scheme of existing correlation technique, the method for safety such as the protection password of employing input is similar to the safety method that PC adopts, and mainly comprises following dual mode:
Scheme one: dummy keyboard mode.When the focus of entering password when needs moves on to input frame, on screen, show the virtual soft dish, the digital random on it is arranged, and the user selects the corresponding characters on the virtual soft dish to enter password;
Scheme two: dynamic password mode.When the user enters password, need utilize an external dynamic token to generate an one-time password, be input in the system then.
Though above-mentioned first kind of scheme can avoid interface hook program to steal password; But because application circumstances, and be not suitable for mobile phone, though and second kind of scheme is not afraid of the hacker and stolen one-time password; The modification but other input information can be stolen is like payment account, amount etc.
To the problem that can't avoid all input informations to be stolen in the input message safety control method of correlation technique, effective solution is not proposed as yet at present at present.
Summary of the invention
The problem that can't avoid all input informations to be stolen in the input message safety control method to correlation technique; Do not propose effective problem as yet at present and propose the present invention; For this reason; Fundamental purpose of the present invention is to provide a kind of method of controlling security, Apparatus and system of portable terminal, to address the above problem.
To achieve these goals; According to an aspect of the present invention; A kind of method of controlling security of portable terminal is provided; The method of controlling security of this portable terminal comprises: application program detects secure hardware, is satisfying application call first keyboard drive under the situation of testing conditions, and first keyboard drive shields second keyboard drive; First keyboard drive reads the key assignments that keyboard receives, and key assignments is forwarded to secure hardware; Secure hardware is encrypted key assignments, and encryption key is back to application program; Application program is deciphered encryption key, to obtain key assignments.
Further; Application program detects secure hardware, is satisfying application call first keyboard drive under the situation of testing conditions, and first keyboard drive shields second keyboard drive and comprises: whether application program detects secure hardware and accesses terminal; Wherein, Detecting under the situation that secure hardware accesses terminal, application call first keyboard drive, first keyboard drive shields second keyboard drive; Do not detecting under the secure hardware situation, prompting user access security hardware, and withdraw from application program.
Further, detecting after secure hardware accesses terminal, method also comprises: detect whether Satisfying Matching Conditions of secure hardware and terminal; Wherein, Under the situation of Satisfying Matching Conditions, application call first keyboard drive, first keyboard drive shields second keyboard drive; Under the situation of Satisfying Matching Conditions not, withdraw from application program.
Further; Detecting secure hardware and terminal whether before the Satisfying Matching Conditions; Method also comprises: the matching condition between setting terminal and the secure hardware, matching condition comprise preset sequence number, wherein; When the sequence number of the secure hardware that accesses terminal is identical with preset sequence number, application call first keyboard drive.
Further, secure hardware is sent to application program through key assignments ciphertext interface with encryption key.
To achieve these goals; According to a further aspect in the invention; A kind of safety control of portable terminal is provided, and the safety control of this portable terminal comprises: detect processing module, be used for application program and detect secure hardware; Satisfying application call first keyboard drive under the situation of testing conditions, first keyboard drive shields second keyboard drive; Forwarding module is used to read the key assignments that keyboard receives, and key assignments is forwarded to secure hardware; Encrypting module is used for secure hardware key assignments is encrypted, and encryption key is back to application program; Acquisition module is used for application program encryption key is deciphered, to obtain key assignments.
Further, detect processing module and comprise: whether first judge module is used for application program detection secure hardware and accesses terminal; First calling module is used for detecting under the situation that secure hardware accesses terminal, application call first keyboard drive, and first keyboard drive shields second keyboard drive; First withdraws from module, be used for not detecting under the secure hardware situation, and prompting user access security hardware, and withdraw from application program.
Further, detect processing module and also comprise: second judge module is used to detect whether Satisfying Matching Conditions of secure hardware and terminal; Second calling module, under the situation of Satisfying Matching Conditions, application call first keyboard drive, first keyboard drive shields second keyboard drive; Second withdraws from module, is used under the situation of Satisfying Matching Conditions not, withdrawing from application program.
Further, device also comprises: presetting module, be used for the matching condition between preset terminal and the secure hardware, and matching condition comprises preset sequence number; Matching module is used for sequence number when the secure hardware that accesses terminal when identical with preset sequence number, application call first keyboard drive.
To achieve these goals, according to a further aspect in the invention, a kind of safety control system of portable terminal is provided, the safety control system of this portable terminal comprises: keyboard; Secure hardware is used for key assignments is carried out encryption, to obtain encryption key; Portable terminal; Be used for set up applications, application program detects secure hardware, is satisfying application call first keyboard drive under the situation of testing conditions; Shield second keyboard drive; First keyboard drive reads and transmits key assignments that keyboard receives to secure hardware, and application program is deciphered encryption key simultaneously, to obtain key assignments.
Through the present invention, adopt application program to detect secure hardware, satisfying application call first keyboard drive under the situation of testing conditions, first keyboard drive shields second keyboard drive; First keyboard drive reads the key assignments that keyboard receives, and key assignments is forwarded to secure hardware; Secure hardware is encrypted key assignments, and encryption key is back to application program; Application program is deciphered encryption key; To obtain key assignments; Solve the problem that to avoid all input informations to be stolen in the input message safety control method of correlation technique, and then realized omnibearing information safety protection, had the effect of wider applicability.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the structural representation according to the safety control system of the portable terminal of the embodiment of the invention;
Fig. 2 is the structural representation according to the safety control of the portable terminal of the embodiment of the invention; And
Fig. 3 is the process flow diagram according to the method for controlling security of the portable terminal of the embodiment of the invention.
Embodiment
Need to prove that under the situation of not conflicting, embodiment and the characteristic among the embodiment among the application can make up each other.Below with reference to accompanying drawing and combine embodiment to specify the present invention.
Fig. 1 is the structural representation according to the safety control system of the portable terminal of the embodiment of the invention.As shown in Figure 1, the safety control system of this portable terminal comprises: keyboard 1; Secure hardware 2 is used for key assignments is carried out encryption, to obtain encryption key; Portable terminal; Be used for set up applications, application program detects secure hardware 2, is satisfying application call first keyboard drive under the situation of testing conditions; First keyboard drive shields second keyboard drive; First keyboard drive reads and transmits key assignments to the secure hardware 2 that keyboard receives, and application program is deciphered encryption key simultaneously, to obtain key assignments.
First keyboard drive among all embodiment of the present invention can be a kind of special keyboard drive; Second keyboard drive can be that conventional common keyboard drives; This special keyboard drive is used to shield the interface that common keyboard drives; The special-purpose driving interface that is connected with secure hardware externally is provided, has avoided the hacker to steal the input of keyboard, and provide a private communication interface and passage to accomplish the security control of input information through common keyboard driving interface place.
The foregoing description is implemented in special keyboard drive is installed in the operating system of portable terminal; And through a special lane driving interface and passage being provided at mobile phone terminal 3 external secure hardwares 2 (like the SD card); When special keyboard drive is called by corresponding application, can shield common keyboard and be activated, and ensure that it can not be by other dangerous process transfer; The information of keyboard 1 input can only be transferred to the application program that is transmitted to mobile phone after secure hardware 2 is encrypted through special keyboard drive; Thereby avoid the hacker to steal any information of keyboard 1 input at the driving interface place, realized omnibearing information safety protection, have wider applicability.
Preferably, the output interface of special keyboard drive adopts special purpose interface, only can be read by external secure hardware 2.And the key assignments of 2 pairs of inputs of external secure hardware is encrypted, and to upper level applications key assignments ciphertext interface, the security that has further improved information is provided.In addition, when external secure hardware 2 was inserted into mobile phone, mobile phone need judge that whether this secure hardware 2 matees, and ensures the validity of external secure hardware 2.
Fig. 2 is the structural representation according to the safety control of the portable terminal of the embodiment of the invention.As shown in Figure 2, the safety control of this portable terminal comprises: detect processing module 10, be used for application program and detect secure hardware 2, satisfying application call first keyboard drive under the situation of testing conditions, first keyboard drive shields second keyboard drive; Forwarding module 30 is used for first keyboard drive and reads the key assignments that keyboard 1 receives, and key assignments is forwarded to said secure hardware 2; Encrypting module 50 is used for secure hardware 2 key assignments is encrypted, and encryption key is back to application program; Acquisition module 70 is used for application program encryption key is deciphered, to obtain key assignments.
The application's said apparatus embodiment realizes passing through special keyboard drive is installed in mobile phone operating system, and is mobile phone terminal 3 external secure hardwares 2 (like the SD card), because the output interface of special keyboard drive is a special purpose interface; And only can be read by external secure hardware 2, thereby special-purpose input information transmission interface and passage is provided, special keyboard drive can only be called by corresponding application simultaneously; When special keyboard drive is called; It can shield common keyboard and be activated, and ensures that it can not be by other dangerous process transfer, therefore; After the application program launching special key drives; Common keyboard drives conductively-closed, and the information of keyboard input can not drive through common keyboard and be transmitted to the application program of front end, but is forwarded to secure hardware 2 through special keyboard drive; Return to application program after encrypting by the key assignments of 2 pairs of inputs of external secure hardware again; Thereby avoid the hacker to steal any information of keyboard 1 input at the driving interface place, realized omnibearing information safety protection, have wider applicability.
The foregoing description prevents that not only the hacker from stealing user password, and prevents that effectively all are similar to the attack that is directed against user password on the PC, ensure the security that the user enters password.
Detection processing module 10 in the application's the foregoing description can comprise: whether first judge module 101 is used for application program detection secure hardware 2 and accesses terminal; First calling module 102 is used for detecting under the situation that secure hardware 2 accesses terminal, application call first keyboard drive, and first keyboard drive shields second keyboard drive; First withdraws from module 103, be used for not detecting under secure hardware 2 situation, and prompting user access security hardware 2, and withdraw from application program.This embodiment realizes detecting secure hardware 2 and whether successfully gets into portable terminal, has improved the performance of the application's security control.
Detection processing module 10 in the application's the foregoing description can also comprise: second judge module 104 is used to detect whether Satisfying Matching Conditions of secure hardware 2 and terminal; Second calling module 105, under the situation of Satisfying Matching Conditions, application call first keyboard drive, first keyboard drive shields second keyboard drive; Second withdraws from module 106, is used under the situation of Satisfying Matching Conditions not, withdrawing from application program.Whether this embodiment further detects extraneous secure hardware 2 and matees with mobile phone; Improved the security of authentication; This mode provides at needs and has inserted under the situation of secure hardware 2 (SD card) and while Satisfying Matching Conditions; Application program just can start calls first keyboard drive, and the method for this two-factor authentication can be through detecting than the higher realization of dummy keyboard method security matching way of the present invention.
Preferably, the device in the foregoing description can also comprise: presetting module, be used for the matching condition between preset terminal and the secure hardware 2, and matching condition comprises preset sequence number; Matching module is used for sequence number when the secure hardware that accesses terminal 2 when identical with preset sequence number, application call first keyboard drive.
Matching condition in the application's the foregoing description can be to enter password, and also can be whether the sequence number of authenticating security hardware 2 satisfies condition, because the mode of entering password is comparatively common; And because each secure hardware 2; For example to dispatch from the factory be that its fixing sequence number is all arranged for SD card, USB flash disk etc., perhaps can think preset its sequence number, therefore; The sequence number that adopts secure hardware 2 makes the security control of native system have higher security as the authentication information of further confirming.
Can know that to sum up the application has following characteristics: external secure hardware 2 (SD card) must insert mobile phone, and this scheme could be carried out; Special keyboard drive can shield common keyboard and drive, and it can not be launched; Special keyboard drive is a special purpose interface, and its output can only be read by external secure hardware 2; External secure hardware 2 matees with mobile phone; External secure hardware 2 can carry out the privacy protection to the input key assignments, to upper layer application key assignments ciphertext interface is provided; Have only the application of scheme binding therewith just can start the input of this programme protection password; Keyboard 1 input of the application of not binding is not protected.
Fig. 3 is the process flow diagram according to the method for controlling security of the portable terminal of the embodiment of the invention.This method as shown in Figure 3 comprises the steps:
Step S102 detects secure hardware 2 through detection processing module 10 executive utilities among Fig. 2, is satisfying application call first keyboard drive under the situation of testing conditions, and first keyboard drive shields second keyboard drive.
Step S104 carries out first keyboard drive through the forwarding module among Fig. 2 30 and reads the key assignments that keyboard 1 receives, and key assignments is forwarded to secure hardware 2.
Step S106 carries out secure hardware 2 through the encrypting module among Fig. 2 50 key assignments is encrypted, and encryption key is back to application program.
Step S108 realizes that through the acquisition module among Fig. 2 70 application program deciphers encryption key, to obtain key assignments.
The foregoing description is implemented in special keyboard drive is installed in the operating system of portable terminal; And through a special lane driving interface and passage being provided at mobile phone terminal 3 external secure hardwares 2 (like the SD card); When special keyboard 1 driving is called by corresponding application, can shield common keyboard and be activated, and ensure that it can not be by other dangerous process transfer; The information of keyboard 1 input can only be transferred to the application program that is transmitted to mobile phone after secure hardware 2 is encrypted through special keyboard drive; Thereby avoid the hacker to steal any information of keyboard 1 input at the driving interface place, realized omnibearing information safety protection, have wider applicability.
Drive through special-purpose special soft keyboard 1 among the step S102, shielded the interface that former common keyboard 1 drives on the one hand, special-purpose driving interface externally is provided on the other hand, can avoid the hacker to steal keyboard 1 input in driving interface.
Step S102 application program in the foregoing description detects secure hardware 2; Satisfying application call first keyboard drive under the situation of testing conditions, first keyboard drive shields second keyboard drive, can comprise: whether application program detects secure hardware 2 and accesses terminal; Wherein, Detecting under the situation that secure hardware 2 accesses terminal, application call first keyboard drive, first keyboard drive shields second keyboard drive; Do not detecting under secure hardware 2 situation, prompting user access security hardware 2, and withdraw from application program.
Concrete, the embodiment that is applied as this step of example description with " mobile-phone payment " comprises the steps: client judges at first whether the SD card inserts when the user starts " mobile-phone payment " client; If the SD card does not insert, then point out the user to insert the SD card, and withdraw from this application.
In the foregoing description, detecting after secure hardware 2 accesses terminal, method can also comprise: detect whether Satisfying Matching Conditions of secure hardware 2 and terminal; Wherein, under the situation of Satisfying Matching Conditions, application call first keyboard drive; First keyboard drive shields second keyboard drive; Otherwise, under the situation of Satisfying Matching Conditions not, withdraw from application program.This embodiment mobile phone and secure hardware 2 mate, and prevent that the assailant from stealing user data through forging smart card.
Preferably; Secure hardware 2 in the foregoing description is sent to application program through key assignments ciphertext interface with encryption key; The key assignments ciphertext interface that this external secure hardware 2 provides, it is safe making the communication interface between applications client and the secure hardware 2, has improved the security of security control.
Concrete, the foregoing description realizes that after secure hardware 2SD card inserted, promptly portable terminal detected after the secure hardware 2, can judge whether this secure hardware 2 matees; If the SD card does not match, then point out the user, and withdraw from application; If SD card coupling, the keyboard ciphertext interface that " mobile-phone payment " client terminal start-up SD card is corresponding.This keyboard ciphertext interface is that the key assignments after a special purpose interface will be encrypted is sent to application program and handles.
The concrete real-time mode of above-mentioned steps S104 to 108 can be; The special keyboard drive that the security terminal SD card that portable terminal inserts is corresponding is with replacing common keyboard drive, the external interface that first keyboard drive shielding common keyboard drives; After the SD card will be encrypted through the key assignments that special keyboard drive reads; Upload to application program through keyboard ciphertext interface, after the application program deciphering, obtain the key assignments of actual user's input.
Preferably; Detecting secure hardware 2 and terminal whether before the Satisfying Matching Conditions; Method can also comprise: the matching condition between preset terminal and the secure hardware 2, and matching condition comprises preset sequence number, wherein; When the sequence number of the secure hardware that accesses terminal 2 is identical with preset sequence number, application call first keyboard drive.
Because in the application's scheme, secure hardware 2 is bound with application program, application program only could be moved when secure hardware 2 is inserted on the mobile phone, so can be considered the dual factors safety approach, has further improved the security of security control.
Need to prove; Can in computer system, carry out in the step shown in the process flow diagram of accompanying drawing such as a set of computer-executable instructions; And; Though logical order has been shown in process flow diagram, in some cases, can have carried out step shown or that describe with the order that is different from here.
From above description, can find out that the present invention has realized following technique effect: the external secure hardware 2 of this scheme can carry out the privacy protection to the input key assignments; To upper layer application key assignments ciphertext interface is provided; And the necessary mobile phone that inserts of external secure hardware 2 (SD card), this scheme could be carried out, and need insert the SD card and the correctly ability authentication success of entering password simultaneously; Be two-factor authentication, more safer than dummy keyboard method; This scheme not only can ensure user password input safety, can also ensure the input safety of other important information, has more wider applicability than dynamic password mode.
Obviously, it is apparent to those skilled in the art that above-mentioned each module of the present invention or each step can realize with the general calculation device; They can concentrate on the single calculation element; Perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element; Thereby; Can they be stored in the memory storage and carry out, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize by calculation element.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (6)

1. the method for controlling security of a portable terminal is characterized in that, comprising:
Application program detects secure hardware, is satisfying said application call first keyboard drive under the situation of testing conditions, and said first keyboard drive shields second keyboard drive;
Said first keyboard drive reads the key assignments that keyboard receives, and said key assignments is forwarded to said secure hardware;
Said secure hardware is encrypted said key assignments, and encryption key is back to said application program;
Said application program is deciphered said encryption key, to obtain said key assignments.
2. method according to claim 1 is characterized in that, application program detects secure hardware, is satisfying said application call first keyboard drive under the situation of testing conditions, and said first keyboard drive shields second keyboard drive and comprises:
Whether said application program detects said secure hardware and accesses terminal, wherein,
Detecting under the situation that said secure hardware inserts said terminal, said first keyboard drive of said application call, said first keyboard drive shields said second keyboard drive;
Do not detecting under the said secure hardware situation, the prompting user inserts said secure hardware, and withdraws from said application program.
3. method according to claim 2 is characterized in that, is detecting after said secure hardware inserts said terminal, and said method also comprises:
Detect whether Satisfying Matching Conditions of said secure hardware and said terminal, wherein,
Satisfying under the situation of said matching condition, said first keyboard drive of said application call, said first keyboard drive shields said second keyboard drive;
Under the situation that does not satisfy said matching condition, withdraw from said application program.
4. method according to claim 3 is characterized in that, is detecting said secure hardware and said terminal whether before the Satisfying Matching Conditions, and said method also comprises:
Set the matching condition between said terminal and the said secure hardware, said matching condition comprises preset sequence number, wherein,
When the sequence number of the said secure hardware that inserts said terminal is identical with said preset sequence number, said first keyboard drive of said application call.
5. according to each described method among the claim 1-4, it is characterized in that said secure hardware is sent to said application program through key assignments ciphertext interface with said encryption key.
6. the safety control of a portable terminal is characterized in that, comprising:
Detect processing module, be used for application program and detect secure hardware, satisfying said application call first keyboard drive under the situation of testing conditions, said first keyboard drive shields second keyboard drive;
Forwarding module is used to read the key assignments that keyboard receives, and said key assignments is forwarded to said secure hardware;
Encrypting module is used for said secure hardware said key assignments is encrypted, and encryption key is back to said application program;
Acquisition module is used for said application program said encryption key is deciphered, to obtain said key assignments.
Device according to claim 6 is characterized in that, said detection processing module comprises:
Whether first judge module is used for said application program and detects said secure hardware and access terminal;
First calling module is used for detecting under the situation that said secure hardware inserts said terminal, said first keyboard drive of said application call, and said first keyboard drive shields said second keyboard drive;
First withdraws from module, is used for not detecting under the said secure hardware situation, and the prompting user inserts said secure hardware, and withdraws from said application program.
Device according to claim 7 is characterized in that, said detection processing module also comprises:
Second judge module is used to detect whether Satisfying Matching Conditions of said secure hardware and said terminal;
Second calling module is satisfying under the situation of said matching condition, said first keyboard drive of said application call, and said first keyboard drive shields said second keyboard drive;
Second withdraws from module, is used under the situation that does not satisfy said matching condition, withdrawing from said application program.
Device according to claim 8 is characterized in that, said device also comprises:
Presetting module is used for the matching condition between preset said terminal and the said secure hardware, and said matching condition comprises preset sequence number;
Matching module is used for sequence number when the said secure hardware that inserts said terminal when identical with said preset sequence number, said first keyboard drive of said application call.
A kind of safety control system of portable terminal is characterized in that, comprising:.
Keyboard;
Secure hardware is used for key assignments is carried out encryption, to obtain encryption key;
Portable terminal; Be used for set up applications, said application program detects said secure hardware, is satisfying said application call first keyboard drive under the situation of testing conditions; Said first keyboard drive shields second keyboard drive; Said first keyboard drive reads and transmits said key assignments to the said secure hardware that said keyboard receives, and said application program is deciphered said encryption key simultaneously, to obtain said key assignments.
CN201110180246.8A 2011-06-29 2011-06-29 Safety control method of mobile terminal, device and system Active CN102393886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110180246.8A CN102393886B (en) 2011-06-29 2011-06-29 Safety control method of mobile terminal, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110180246.8A CN102393886B (en) 2011-06-29 2011-06-29 Safety control method of mobile terminal, device and system

Publications (2)

Publication Number Publication Date
CN102393886A true CN102393886A (en) 2012-03-28
CN102393886B CN102393886B (en) 2014-11-26

Family

ID=45861209

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110180246.8A Active CN102393886B (en) 2011-06-29 2011-06-29 Safety control method of mobile terminal, device and system

Country Status (1)

Country Link
CN (1) CN102393886B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103076988A (en) * 2012-12-28 2013-05-01 银联商务有限公司 Password input method and device
CN105430022A (en) * 2015-12-31 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Data input control method and terminal equipment
CN110765470A (en) * 2019-09-19 2020-02-07 平安科技(深圳)有限公司 Method and device for realizing safety keyboard, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050177649A1 (en) * 2004-02-05 2005-08-11 Kings Information & Network Computer security apparatus and method using security input device driver
US20060195907A1 (en) * 2004-12-23 2006-08-31 Infineon Technologies Ag Data processing device
CN101136045A (en) * 2006-08-29 2008-03-05 联想(北京)有限公司 Virtual machine system and safety input method thereof
CN101593254A (en) * 2008-05-26 2009-12-02 联想(北京)有限公司 A kind of notebook computer secured inputting method and system
US20100138918A1 (en) * 2008-11-28 2010-06-03 Kings Information & Network Keyboard Security Status Check Module and Method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050177649A1 (en) * 2004-02-05 2005-08-11 Kings Information & Network Computer security apparatus and method using security input device driver
US20060195907A1 (en) * 2004-12-23 2006-08-31 Infineon Technologies Ag Data processing device
CN101136045A (en) * 2006-08-29 2008-03-05 联想(北京)有限公司 Virtual machine system and safety input method thereof
CN101593254A (en) * 2008-05-26 2009-12-02 联想(北京)有限公司 A kind of notebook computer secured inputting method and system
US20100138918A1 (en) * 2008-11-28 2010-06-03 Kings Information & Network Keyboard Security Status Check Module and Method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103076988A (en) * 2012-12-28 2013-05-01 银联商务有限公司 Password input method and device
CN105430022A (en) * 2015-12-31 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Data input control method and terminal equipment
CN110765470A (en) * 2019-09-19 2020-02-07 平安科技(深圳)有限公司 Method and device for realizing safety keyboard, computer equipment and storage medium

Also Published As

Publication number Publication date
CN102393886B (en) 2014-11-26

Similar Documents

Publication Publication Date Title
KR102307665B1 (en) identity authentication
CN104065653B (en) A kind of interactive auth method, device, system and relevant device
EP2905715B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
US10445487B2 (en) Methods and apparatus for authentication of joint account login
KR101028882B1 (en) System and method for providing user authentication one time password using a wireless mobile terminal
CN110232568B (en) Mobile payment method, mobile payment device, computer equipment and readable storage medium
WO2013176491A1 (en) Method for authenticating web service user
CN101340281A (en) Method and system for safe login input on network
CN103118032A (en) Method, terminals and server for synchronization of terminal login accounts
CN105512576A (en) Method for secure storage of data and electronic equipment
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN107615294A (en) A kind of identifying code short message display method and mobile terminal
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN106254323A (en) The exchange method of a kind of TA and SE, TA, SE and TSM platform
Aravindhan et al. One time password: A survey
CN105933886A (en) ESIM number writing method, security system, ESIM number server and terminal
CN102393886B (en) Safety control method of mobile terminal, device and system
EP2993856B1 (en) Establishment of communication connection between mobile device and secure element
EP2985712B1 (en) Application encryption processing method, apparatus, and terminal
WO2016026333A1 (en) Data protection method, device and storage medium in connection between terminal and pc
CN105610770A (en) Access method, access device, terminal, encryption method, encryption device and terminal
KR20140123353A (en) Secure message transmission system, apparatus therefor and secure message processing method thereof
CN108769989B (en) Wireless network connection method, wireless access device and equipment
CN105636046A (en) Credible access control method and system for WiFi device
CN106534047A (en) Information transmitting method and apparatus based on Trust application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant