Screen lock based data protection method and device

A technology of data protection and screen lock, applied in the data protection device based on screen lock, in the field of data protection based on screen lock, to achieve the effect of protecting security and preventing being cracked

Active Publication Date: 2014-12-03
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
4 Cites 5 Cited by

AI-Extracted Technical Summary

Problems solved by technology

Therefore, at present, smart devices still have gre...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

If the current lock screen type of the smart device is consistent with the lock screen type preserved in the preset storage area, it means that the lock screen type does not change, and further obtains the file status of the current key file of the smart device, and judges Whether the file state of the current key file of the smart device is consistent with the file state of the key file stored in the preset storage area, if not, the unlocking operation is blocked. On the basis of monitoring the lock screen type, further monitoring the file status of the key file can further prevent the lock screen function of the smart device from being cracked or intruded, and ensure da...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a screen lock based data protection method. The method includes: acquiring a screen lock type which a user selects to screen-lock a smart device; storing the acquired screen lock type in a preset storage area of the smart device; in case of an unlocking operation, judging whether the current screen lock type of the smart device is consistent to the screen lock type stored in the preset storage area; if not, shielding the locking operation. In addition, the invention further discloses a screen lock based data protection device. The screen lock based data protection method and device has the advantages that after a file in which a screen lock password is stored is forcibly deleted or replaced with another file and the screen lock type of the smart device is altered or deleted, the corresponding unlocking operation is shielded, the smart device is effectively avoided being cracked, and data safety is protected.

Application Domain

Technology Topic

Image

  • Screen lock based data protection method and device
  • Screen lock based data protection method and device

Examples

  • Experimental program(1)

Example Embodiment

[0020] In order to further illustrate the technical means adopted and the effects achieved by the present invention, the technical solutions of the present invention will be described clearly and completely in conjunction with the accompanying drawings and preferred embodiments.
[0021] See figure 1 , Is a schematic flowchart of the data protection method based on the lock screen of the present invention.
[0022] The data protection method based on the lock screen of the present invention includes the following steps:
[0023] S101 obtains the lock screen type selected when the user sets the lock screen on the smart device;
[0024] S102 save the acquired lock screen type in a preset storage area in a smart device; wherein, the preset storage area has a higher access authority than a general storage area in the smart device;
[0025] S103, when an unlocking operation occurs, determine whether the current lock screen type of the smart device is consistent with the lock screen type stored in the preset storage area;
[0026] S104 If the current lock screen type of the smart device is inconsistent with the lock screen type stored in the preset storage area, shield the unlocking operation.
[0027] The lock screen setting refers to locking the screen of the smart device and setting a lock screen password; after the screen is locked, an unlocking operation is required to return to the system application interface of the smart device.
[0028] The general storage area refers to a conventional storage area in a smart device, such as a database corresponding to various applications, including databases corresponding to functions such as "settings", "calendar", "photos", and "social software". Take the Android system smart phone as an example, when it has the ROOT permission, it can access the general storage area and modify or delete the data in it. Among them, ROOT exists in UNIX systems (such as AIX, BSD, etc.) and UNIX-like systems (such as Debian, Redhat, Ubuntu and other versions of Linux systems and Android systems). The super user is generally named root, which is equivalent to the Administrator in the Windows system. . Root is the only super user in the system and has all the permissions in the system, such as starting or stopping a process, deleting or adding users, adding or disabling hardware, and so on.
[0029] In step S101, when the user sets the screen lock on the smart device, the smart device automatically saves the lock screen type in a general storage area, for example, in a database corresponding to the “settings” application in the smart device. Enter the corresponding database, you can get the lock screen type selected when the user sets the lock screen on the smart device.
[0030] As a preferred embodiment, in the step of acquiring the lock screen type selected when the user sets the lock screen on the smart device, the lock screen type includes pattern lock screen, password lock screen and hybrid lock screen; The lock screen password of the pattern lock screen is a pattern, the lock screen password of the password lock screen is a number, and the lock screen password of the hybrid lock screen is a combination of letters and numbers.
[0031] The above three lock screen types are the most commonly used lock screen types, so that the present invention has the largest scope of application, is convenient for popularization, and is easy to implement. Pattern lock screen refers to drawing a specific pattern through gestures, and the pattern is often composed of several points. In the password lock screen, the characters that make up the lock screen password are a series of numbers. In a hybrid lock screen, a lock screen password is formed by a combination of letters and numbers of a certain length. Since the three lock screen types are more commonly used, no more detailed description will be given.
[0032] As a preferred embodiment, after the step of obtaining the lock screen type selected when the user performs the lock screen setting on the smart device, the following steps are included:
[0033] Acquiring the file status of the key file generated when the user performs the lock screen setting of the smart device; wherein the key file is a file used to save the lock screen password;
[0034] Save the acquired file status of the key file in the preset storage area.
[0035] When the user sets the lock screen of the smart device, the smart device will automatically generate a key file to save the lock screen password set by the user. The data of the lock screen password is encrypted according to a certain encryption algorithm and then saved in the key file. The key file is automatically saved in the general storage area of ​​the smart device. Take the Android system smart phone as an example. When you have the ROOT permission, you can access the general storage area to modify or delete the data in the key file.
[0036] In addition to recording the lock screen type, the lock screen setting process also stores the file status of the key file separately. Normally, smart devices will routinely save the key file, and back up the file status of the key file in the preset storage area, because the preset storage area has higher access rights and security levels than the general storage area in the smart device , The file status of the key file stored in it cannot be deleted or modified.
[0037] As a preferred embodiment, in the step of obtaining the file status of the key file generated when the user sets the lock screen on the smart device, the file status of the key file includes: whether the key file exists, and the key The file length of the file and the timestamp of the key file.
[0038] According to the file status of the key file, the storage status of the key file can be grasped. If the above key file is deleted or modified without authorization, the storage status of the key file will change. For example, when the key file is deleted, it will be detected that it no longer exists in the general storage area; if it is replaced, the file length or timestamp will change, so that it can be known whether the key file has been maliciously tampered with.
[0039] In step S102, the acquired lock screen type is stored in a preset storage area. The preset storage area has a higher access authority than the general storage area in the smart device.
[0040] As a preferred embodiment, the preset storage area is a non-volatile random access memory in a smart device.
[0041] NVRAM (Non-Volatile Random Access Memory, non-volatile random access memory) is a kind of RAM that can retain data even after power is off. If the non-volatile memory is explained in a simple way, it refers to the random access memory in which the stored data is not lost after the power is off.
[0042] NVRAM is transparent to users. Users cannot see the data in this area, nor can they perform operations such as rewriting the data in this area. Generally speaking, only the manufacturer has access to NVRAM, so the security level is quite high. Save the lock screen type exclusively in the NVRAM of the smart device to ensure that it will not be modified.
[0043] In step S103, when an unlocking operation is detected, the current lock screen type of the smart device is obtained, and it is determined whether the current lock screen type of the smart device is consistent with the lock screen type stored in the preset storage area.
[0044] Take a smartphone as an example. The lock screen type is stored in the database corresponding to the "Settings" application. When an unlocking operation occurs, the lock screen type, which is the current lock screen type of the smart device, is obtained in the database corresponding to the "Settings" application. .
[0045] As a preferred embodiment, after the step of determining whether the current lock screen type of the smart device is consistent with the lock screen type stored in the preset storage area, the following steps are included:
[0046] If the current lock screen type of the smart device is consistent with the lock screen type stored in the preset storage area, obtaining the file status of the current key file of the smart device;
[0047] Judging whether the file status of the current key file of the smart device is consistent with the file status of the key file stored in the preset storage area;
[0048] If they are inconsistent, shield the unlocking operation.
[0049] If the current lock screen type of the smart device is consistent with the lock screen type saved in the preset storage area, it means that the lock screen type has not changed, and the file status of the current key file of the smart device is further obtained, and the current smart device is judged Whether the file status of the key file is consistent with the file status of the key file stored in the preset storage area, if not, the unlocking operation is blocked. On the basis of monitoring the lock screen type, further monitoring the file status of the key file can further prevent the lock screen function of the smart device from being cracked or intruded, and ensure data security.
[0050] As a preferred embodiment, after the step of determining whether the file status of the current key file of the smart device is consistent with the file status of the key file stored in the preset storage area, the following steps are included:
[0051] If the file status of the current key file of the smart device is consistent with the file status of the key file stored in the preset storage area, obtaining the unlock password input for the unlock operation;
[0052] Determine whether the unlocking password is consistent with the lock screen password stored in the key file;
[0053] If they are inconsistent, the unlocking operation is blocked.
[0054] If there is no change in the current lock screen type and key file status of the smart device relative to the file status of the lock screen type and key file stored in the preset storage area, it means that the file that saves the lock screen password has not been changed. If it is deleted or replaced by other files, that is, the smart device has not been cracked or hacked, then the unlock password entered in the unlock operation is compared with the lock screen password. If it is inconsistent, it will still not be unlocked.
[0055] In step S104, if the current lock screen type of the smart device is inconsistent with the lock screen type stored in the preset storage area, it means that the lock screen function of the smart device may be cracked or hacked, and the unlocking is blocked at this time Operation to ensure the security of data in smart devices.
[0056] As a preferred embodiment, after the step of determining whether the unlocking password is consistent with the lock screen password stored in the key file, the following steps are included:
[0057] If the unlock password is consistent with the lock screen password stored in the key file, the smart device is unlocked.
[0058] If there is no change in the current lock screen type and key file status of the smart device relative to the file status of the lock screen type and key file stored in the preset storage area, it means that the file that saves the lock screen password has not been changed. If it is deleted or replaced by other files, that is, the smart device has not been cracked or hacked, then the unlock password entered in the unlock operation is compared with the lock screen password, and if they are the same, unlock it. In this way, the present invention can be applied to various smart devices, especially smart phones, and achieve wider applications.
[0059] As a preferred embodiment, after the step of shielding the unlocking operation, the following steps are included:
[0060] Receive SMS from preset non-local contacts;
[0061] If the content of the received short message is consistent with the content of the preset unlocking short message, the unlocking operation is unblocked and the smart device is unlocked.
[0062] When the unlocking operation is blocked, the screen remains locked and can be unlocked by means of a preset short message sent by a non-local contact. This not only greatly guarantees the security of the data, but also can still be unlocked even if the user forgets the password, which achieves both security and flexibility.
[0063] As a preferred embodiment, the smart device is a smart phone.
[0064] Smartphones are basically equipped with a lock screen function, and it is often cracked. The present invention will have broad application prospects in the field of smart phones.
[0065] The following describes in detail the lock screen-based data protection method of the present invention with reference to a specific embodiment:
[0066] In the process of setting the lock screen password and unlocking, add the function of obtaining and judging the lock screen type and key file status. The specific process is described as follows:
[0067] Set the lock screen password process:
[0068] Get the set password data and lock screen type;
[0069] Get the key file status corresponding to the lock screen type;
[0070] Encrypted storage of password data;
[0071] Store the lock screen type and key file state separately after encoding;
[0072] Unlocking process:
[0073] 1. Get the stored lock screen type and the current lock screen type of the system;
[0074] 2. If it is judged that the phone is not set to lock screen, go to 9; if the lock screen status changes, go to 10; otherwise, continue;
[0075] 3. Get the stored key file status and the current key file status of the system;
[0076] 4. If the key file status changes (no longer exists, the file length is abnormal, the timestamp changes), go to 10; otherwise, continue;
[0077] 5. Obtain the data of the user's unlock password;
[0078] 6. Encrypt the data;
[0079] 7. Compare the encryption result with the key file stored in the phone;
[0080] 8. Unlock if they are consistent, otherwise the unlock fails;
[0081] 9. Unlock to enter the phone desktop;
[0082] 10. Keep the screen locked and block the password input. It can only be unlocked through the preset text messages sent by non-local contacts.
[0083] When setting the lock screen password and encrypting storage, record the lock screen type, key file status (existence, file length, time stamp), when unlocking, judge whether the corresponding key file status is abnormal (file does not exist, The file length is abnormal, the file timestamp does not match), the lock screen is kept in the abnormal state, and the password input is blocked, so that it cannot be cracked by deleting or replacing the file.
[0084] The lock screen setting process records the lock screen type and key file status, and judges the lock screen type and key file status when unlocking. When the unlock status is abnormal, you need to accept the preset text messages sent by non-local contacts to unlock, which strengthens privacy and security.
[0085] See figure 2 , Is a schematic structural diagram of a data protection device based on a lock screen of the present invention.
[0086] The data protection device based on the lock screen of the present invention includes an acquisition module 201, a storage module 202, a judgment module 203 and a shielding module 204;
[0087] The acquiring module 201 is configured to acquire the lock screen type selected when the user performs the lock screen setting on the smart device;
[0088] The saving module 202 is configured to save the acquired lock screen type in a preset storage area in a smart device; wherein the preset storage area has a higher access authority than a general storage area in the smart device ;
[0089] The judgment module 203 is configured to judge whether the current lock screen type of the smart device is consistent with the lock screen type stored in the preset storage area when an unlock operation occurs;
[0090] If the determining module 203 determines that the current lock screen type of the smart device is inconsistent with the lock screen type stored in the preset storage area, the shielding module 204 is configured to shield the unlocking operation.
[0091] As a preferred embodiment, the lock screen types include pattern lock screen, password lock screen, and hybrid lock screen; wherein the lock screen password of the pattern lock screen is a pattern, and the lock screen password of the password lock screen is a number , The lock screen password of the hybrid lock screen is a combination of letters and numbers.
[0092] The above three lock screen types are the most commonly used lock screen types, which enable the present invention to have the largest scope of application, facilitate popularization, and is easy to implement. Pattern lock screen refers to drawing a specific pattern through gestures, and the pattern is often composed of several points. In the password lock screen, the characters that make up the lock screen password are a series of numbers. In a hybrid lock screen, a lock screen password is formed by a combination of letters and numbers of a certain length. Since the three lock screen types are more commonly used, no more detailed description will be given.
[0093] As a preferred embodiment, the obtaining module 201 is also used to obtain the file status of the key file generated when the user sets the screen lock on the smart device; wherein, the key file is a file used to save the screen lock password;
[0094] The file status of the key file includes: whether the key file exists, the file length of the key file, and the timestamp of the key file.
[0095] According to the file status of the key file, the storage status of the key file can be grasped. If the above key file is deleted or modified without authorization, the storage status of the key file will change. For example, when the key file is deleted, it will be detected that it no longer exists in the general storage area; if it is replaced, the file length or timestamp will change, so that it can be known whether the key file has been maliciously tampered with.
[0096] The saving module 202 is further configured to save the acquired file status of the key file in the preset storage area.
[0097] When the user sets the lock screen of the smart device, the smart device will automatically generate a key file to save the lock screen password set by the user. The data of the lock screen password is encrypted according to a certain encryption algorithm and then saved in the key file. The key file is automatically saved in the general storage area of ​​the smart device. Take the Android system smart phone as an example. When you have the ROOT permission, you can access the general storage area to modify or delete the data in the key file.
[0098] In addition to recording the lock screen type, the lock screen setting process also stores the file status of the key file separately. Normally, smart devices will routinely save the key file, and back up the file status of the key file in the preset storage area, because the preset storage area has higher access rights and security levels than the general storage area in the smart device , The file status of the key file stored in it cannot be deleted or modified.
[0099] As a preferred embodiment, the preset storage area is a non-volatile random access memory in a smart device.
[0100] NVRAM (Non-Volatile Random Access Memory, non-volatile random access memory) is a kind of RAM that can retain data even after power is off. If the non-volatile memory is explained in a simple way, it refers to the random access memory in which the stored data is not lost after the power is off.
[0101] NVRAM is transparent to users. Users cannot see the data in this area, nor can they perform operations such as rewriting the data in this area. Generally speaking, only the manufacturer has access to NVRAM, so the security level is quite high. Save the lock screen type exclusively in the NVRAM of the smart device to ensure that it will not be modified.
[0102] When an unlocking operation is detected, the current lock screen type of the smart device is acquired, and the judgment module 203 judges whether the current lock screen type of the smart device is consistent with the lock screen type stored in the preset storage area.
[0103] Take a smartphone as an example. The lock screen type is stored in the database corresponding to the "Settings" application. When an unlocking operation occurs, the lock screen type, which is the current lock screen type of the smart device, is obtained in the database corresponding to the "Settings" application. .
[0104] As a preferred embodiment, if the judgment module 203 judges that the current lock screen type of the smart device is consistent with the lock screen type stored in the preset storage area, the obtaining module 201 obtains the current key file of the smart device File status; the judging module 203 judges whether the file status of the current key file of the smart device is consistent with the file status of the key file stored in the preset storage area; if not, the shielding module 204 shields the unlocking operation .
[0105] On the basis of monitoring the lock screen type, further monitoring the file status of the key file can further prevent the lock screen function of the smart device from being cracked or invaded, and ensure the security of the data.
[0106] As a preferred embodiment, if the judgment module 203 judges that the file status of the current key file of the smart device is consistent with the file status of the key file stored in the preset storage area, then the acquisition module 201 acquires the unlock operation location. The input unlocking password; the judgment module 203 judges whether the unlocking password is consistent with the lock screen password saved in the key file; if not, the shielding module 204 shields the unlocking operation.
[0107] If there is no change in the current lock screen type and key file status of the smart device relative to the file status of the lock screen type and key file stored in the preset storage area, it means that the file that saves the lock screen password has not been changed. If it is deleted or replaced by other files, that is, the smart device has not been cracked or hacked, then the unlock password entered in the unlock operation is compared with the lock screen password. If it is inconsistent, it will still not be unlocked.
[0108] If the current lock screen type of the smart device is inconsistent with the lock screen type saved in the preset storage area, it means that the lock screen function of the smart device may be cracked or intruded. At this time, the unlocking operation is blocked to ensure that the smart device Data security in China.
[0109] As a preferred embodiment, the data protection device based on the lock screen of the present invention further includes an unlocking module. If the judging module 203 judges the current key file status of the smart device and the key file stored in the preset storage area The file status is consistent, and the judgment module 203 judges that the unlocking password is consistent with the lock screen password saved in the key file, then the unlocking module is used to unlock the smart device.
[0110] If there is no change in the current lock screen type and key file status of the smart device relative to the file status of the lock screen type and key file stored in the preset storage area, it means that the file that saves the lock screen password has not been changed. If it is deleted or replaced by other files, that is, the smart device has not been cracked or hacked, then the unlock password entered in the unlock operation is compared with the lock screen password, and if they are the same, unlock it. In this way, the present invention can be applied to various smart devices, especially smart phones, and achieve wider applications.
[0111] As a preferred embodiment, the data protection device based on the lock screen of the present invention further includes a receiving module configured to receive a preset short message sent by a non-local contact; if the content of the received short message is different from the preset content If the contents of the unlocking short messages are the same, the unlocking module is used to unblock the unlocking operation and unlock the smart device.
[0112] When the unlocking operation is blocked, the screen remains locked and can be unlocked by means of a preset short message sent by a non-local contact. This not only greatly guarantees the security of the data, but also can still be unlocked even if the user forgets the password, which achieves both security and flexibility.
[0113] As a preferred embodiment, the smart device is a smart phone.
[0114] Smartphones are basically equipped with a lock screen function, and it is often cracked. The present invention will have broad application prospects in the field of smart phones.
[0115] Generally speaking, when a user sets a lock screen on a smart device, the smart device automatically saves the lock screen type in a general storage area, for example, in a database corresponding to the "Settings" application in the smart device. As the system of the smart device will inevitably have some loopholes, the security of the general storage area does not guarantee that the data stored in it will not be modified or deleted. Compared with the general technology, the data protection method based on the lock screen and the data protection device based on the lock screen of the present invention, when the user sets the lock screen, in addition to saving the lock screen type in the general storage area of ​​the smart device, The lock screen type set by the user is stored separately in the preset storage area. The lock screen type saved in the general storage area is recognized as the current lock screen type of the smart device. When an unlocking operation occurs, it is compared with the lock screen type saved in the preset storage area. If the two are inconsistent, the unlocking is blocked operating.
[0116] Since the preset storage area has a higher access authority and security level than the general storage area in the smart device, the lock screen type stored therein cannot be deleted or modified. When the file storing the lock screen password is violently deleted or replaced by other files, and the lock screen type of the smart device is modified or deleted, the corresponding unlocking operation will be blocked, thus effectively preventing the smart device from being cracked and protecting the data Safety.
[0117] The above-mentioned embodiments only express several implementation modes of the present invention, and their description is more specific and detailed, but they should not be understood as a limitation to the patent scope of the present invention. It should be pointed out that for those of ordinary skill in the art, without departing from the concept of the present invention, several modifications and improvements can be made, and these all fall within the protection scope of the present invention. Therefore, the protection scope of the patent of the present invention should be subject to the appended claims.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Processing technology of fan

Owner:苏州市凌云工艺扇厂

Classification and recommendation of technical efficacy words

  • Protection security
  • Prevent cracking

Shell adding and removing method for Android platform application program protection

InactiveCN103530535AProtect confidentialityProtection securityProgram/content distribution protectionApplication softwareCommercial software
Owner:JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD

Environmental monitoring system based on wireless home-appliance network

InactiveCN104596580AProtection securityQuality living environmentMeasurement devicesOutdoor temperatureAir velocity
Owner:GUANGDONG REAL DESIGN INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products