METHOD AND SYSTEM FOR NFC-BASED MOBILE TERMINAL PASSWORD STORAGE AND RECOVERY
20180234245 ยท 2018-08-16
Inventors
- ZHANGFENG ZOU (Huizhou City, Guangdong Province, CN)
- BINJIAN TU (Huizhou City, Guangdong Province, CN)
- LINZHEN YANG (Huizhou City, Guangdong Province, CN)
- YONGJUN ZOU (Huizhou City, Guangdong Province, CN)
Cpc classification
H04L2209/805
ELECTRICITY
H04W4/80
ELECTRICITY
H04L9/3234
ELECTRICITY
H04B5/20
ELECTRICITY
H04L9/0894
ELECTRICITY
H04W12/068
ELECTRICITY
H04L63/0492
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
H04B5/00
ELECTRICITY
Abstract
A method and system for NFC-based mobile terminal password storage and recovery is provided. The method includes: binding a mobile terminal and an NFC tag; encrypting password information of the mobile terminal utilizing an identifier of the bound NFC tag; contacting and reading the NFC tag through the mobile terminal if a password input interface is opened and a password is inputted; and decrypting encrypted password information through the identifier of the bound NFC tag and inputting the password obtained after the decrypting into the password input interface if the current NFC tag is a bound NFC tag.
Claims
1. An NFC-based (Near-Field-Communication-based) mobile terminal password storage and recovery method, comprising: step A, adding an NFC tag with a unique identifier as a password verification device, storing the identifier of the NFC tag as a password verification device identifier, and binding a mobile terminal and the NFC tag through the mobile terminal; step B, obtaining password information of the mobile terminal, encrypting the password information utilizing the identifier of the bound NFC tag, and storing the encrypted password information in the mobile terminal; step C, contacting and reading the NFC tag through the mobile terminal if the mobile terminal opens a password input interface to input a password; and step D, determining whether the current NFC tag is a bound NFC tag, and decrypting the encrypted password information through the identifier of the bound NFC tag and inputting the password obtained after the decrypting into the password input interface if the current NFC tag is a bound NFC tag.
2. The method of claim 1, wherein the step A comprises: step A1, contacting and reading the NFC tag, and setting the NFC tag as the password verification device through the mobile terminal; and step A2, storing the identifier of the NFC tag as the password verification device identifier, and binding the mobile terminal and the NFC tag; and wherein the identifier of the NFC is ID identifier.
3. The method claim 1, wherein the step B comprises: step B1, receiving an operation instruction of a user, and entering the password input interface; and step B2, contacting and reading the NFC tag through the mobile terminal after receiving the operation instruction of the user and inputting the password, and entering a password storing process if the current NFC tag is determined to be a bound NFC tag.
4. The method claim 3, wherein the password storing process of the step B2 comprises: step B21, obtaining a password string from a password input box of the password input interface through the mobile terminal; step B22, encrypting the password string utilizing the identifier of the bound NFC tag to obtain a password field, and obtaining an identifier of the current password input interface; and step B23, making the identifier of the password input interface and the password field as a record to be added to a database so as to store in the mobile terminal.
5. The method claim 1, wherein the step C comprises: step C1, opening the password input interface through the mobile terminal; and step C2, contacting and reading the NFC tag through the mobile terminal if the password is not inputted.
6. The method claim 5, wherein the step D comprises: step D1, determining whether the current NFC tag is the bound NFC tag, entering the step D2 if the current NFC tag is the bound NFC tag; and step D2, determining whether the current interface has stored the password, decrypting the password and inputting to the password input interface if the current interface has stored the password.
7. The method claim 6, wherein the decrypting the password and inputting to the password input interface in the step D2 comprises: step D21, obtaining a corresponding password field based on the identifier of the current interface through the mobile terminal; step D22, decrypting the password field based on the identifier of the bound NFC tag to obtain the password string; and step D23, setting the password string obtained by the decrypting to the password input box on the password input interface so as to complete inputting the password.
8. An NFC-based (Near-Field-Communication-based) mobile terminal password storage and recovery method, comprising: step A, adding an NFC tag with a unique identifier as a password verification device, storing the identifier of the NFC tag as a password verification device identifier, and binding a mobile terminal and the NFC tag through the mobile terminal; step B, storing password information of the mobile terminal after encrypting the password information utilizing the identifier of the bound NFC tag; and step C, contacting and reading the NFC tag through the mobile terminal if the mobile terminal opens a password input interface to input a password, determining whether the current NFC tag is a bound NFC tag, and decrypting the encrypted password information through the identifier of the bound NFC tag and inputting the password obtained after the decrypting into the password input interface if the current NFC tag is a bound NFC tag.
9. The method of claim 8, wherein the step A comprises: step A1, contacting and reading the NFC tag, and setting the NFC tag as the password verification device through the mobile terminal; and step A2, storing the identifier of the NFC tag as the password verification device identifier, and binding the mobile terminal and the NFC tag; and wherein the identifier of the NFC is ID identifier.
10. The method claim 8, wherein the step B comprises: step B10, receiving an operation instruction of a user, and entering the password input interface; and step B11, contacting and reading the NFC tag through the mobile terminal after receiving the operation instruction of the user and inputting the password, and entering a password storing process if the current NFC tag is determined to be a bound NFC tag.
11. The method claim 10, wherein the password storing process of the step B11 comprises: step B111, obtaining a password string from a password input box of the password input interface through the mobile terminal; step B112, encrypting the password string utilizing the identifier of the bound NFC tag to obtain a password field, and obtaining an identifier of the current password input interface; and step B113, making the identifier of the password input interface and the password field as a record to be added to a database so as to store in the mobile terminal.
12. The method claim 8, wherein the step C comprises: step C11, opening the password input interface through the mobile terminal; step C12, contacting and reading the NFC tag through the mobile terminal if the password is not inputted, entering the step C13 if the current NFC tag is determined to be a bound NFC tag; and step C13, determining whether the current interface has stored the password, decrypting the password and inputting to the password input interface if the current interface has stored the password.
13. The method claim 12, wherein the decrypting the password and inputting to the password input interface in the step C13 comprises: step C131, obtaining a corresponding password field based on the identifier of the current interface through the mobile terminal; step C132, decrypting the password field based on the identifier of the bound NFC tag to obtain the password string; and step C133, setting the password string obtained by the decrypting to the password input box on the password input interface so as to complete inputting the password.
14. An NFC-based (Near-Field-Communication-based) mobile terminal password storage and recovery system, comprising a processor and a memory, wherein, the processor is configured to: control a mobile terminal to add an NFC tag with a unique identifier as a password verification device, store the identifier of the NFC tag as a password verification device identifier, and bind the mobile terminal and the NFC tag; store password information of the mobile terminal after encrypting the password information utilizing the identifier of the bound NFC tag; control the mobile terminal to contact and read the NFC tag if the mobile terminal opens a password input interface to input a password; and determine whether the current NFC tag is a bound NFC tag, and decrypt the encrypted password information the encrypted password information through the identifier of the bound NFC tag and input the password obtained after the decrypting into the password input interface if the current NFC tag is a bound NFC tag.
15. The system of claim 14, wherein the processor is further configured to: control the mobile terminal to contact and read the NFC tag, and set the NFC tag as the password verification device; and store the identifier of the NFC tag as the password verification device identifier; and wherein the identifier of the NFC is ID identifier.
16. The system of claim 14, wherein the processor is further configured to: control the mobile terminal to receive an operation instruction of a user, and enter the password input interface; and control the mobile terminal to contact and read the NFC tag after receiving the operation instruction of the user and inputting the password, and enter a password storing process if the current NFC tag is determined to be a bound NFC tag.
17. The system of claim 14, wherein the processor is further configured to: control the mobile terminal to obtain a password string from a password input box of the password input interface; encrypt the password string utilizing the identifier of the bound NFC tag to obtain a password field, and obtain an identifier of the current password input interface; and make the identifier of the password input interface and the password field as a record to be added to a database so as to store in the mobile terminal.
18. The system of claim 14, wherein the processor is further configured to: open the password input interface; and control the mobile terminal to contact and read the NFC tag if the password is not inputted.
19. The system of claim 14, wherein the processor is further configured to: determine whether the current NFC tag is a bound NFC tag; determine whether the current interface has stored the password, decrypt the password and input to the password input interface if the current interface has stored the password; control the mobile terminal to obtain a corresponding password field basing on the identifier of the current interface; decrypt the password field based on the identifier of the bound NFC tag to obtain the password string; and set the password string obtained by the decrypting to the password input box on the password input interface so as to complete inputting the password.
20. The system of claim 14, wherein the system is a mobile phone, the mobile phone comprises: a display screen configured to display the password input interface; and an NFC module configured to read the NFC tag and obtain the identifier of the NFC tag.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0081]
[0082]
DETAILED DESCRIPTION
[0083] In order to make the objects, technical solutions, and technical effects of the present disclosure more clear, the present disclosure will now be described in more detail with reference to the accompanying embodiments and drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the present disclosure, and are not intended to limit the present disclosure.
[0084] Referring to
[0085] At block S100: adding an NFC tag as a password verification device by the mobile terminal, and storing an ID of the NFC tag as a password verification device identifier, and binding the mobile terminal and the NFC tag. The NFC tag has one unique ID identifier.
[0086] In this embodiment, it is necessary to bind the NFC tag to the mobile terminal (e.g., a mobile phone) of a user in advance, and then input the password through the NFC tag by, for example, using the mobile device to touch and read the NFC tag, set the NFC tag as the password verification device, store the ID of the NFC tag as the password verification device identifier, and then bind the mobile terminal and the NFC tag.
[0087] At block S200: storing password information of the mobile terminal in the mobile terminal after encrypting the password information utilizing the identifier of the bound NFC tag.
[0088] In this block, it needs to control the mobile terminal to receive the operation instruction of the user to enter a password input interface. After the mobile terminal receives the operation instruction of the user and inputs a password (e.g., 123456), the mobile device contacts and reads the NFC tag, the current NFC tag is determined that whether the current NFC tag is a bound NFC tag or not, and enter a password storing process if it is.
[0089] In this embodiment, the password storing process includes: utilizing the mobile terminal to obtain a password string (e.g., 123456) from a password input box of the password input interface; encrypting the password string utilizing the identifier of the bound NFC tag to obtain a password field by, for example, encrypting the password string 123456 and the identifier ID of the NFC tag to obtain the password field and an identifier of the current password input interface (e.g., in Android system, a program name or a Java class path corresponding to the current interface can be used as the interface identifier); making identifier of the password input interface and the password field as a record, and adding the record to a database so as to store in the mobile terminal.
[0090] That is, the password storing process is as follows: obtaining the password string from the password input box of the password input interface; encrypting the password string utilizing the identifier of the bound NFC tag to obtain the password field, and obtaining the identifier of the current password input interface (e.g., in Android system, a program name or a Java class path corresponding to the current interface can be used as the interface identifier); and making the identifier of the current password input interface and the password field as the record to be added to the database so as to store in the mobile terminal.
[0091] At block S300: utilizing the mobile terminal to contact and read the NFC tag if the mobile terminal opens the password input interface to input a password, determine whether the current NFC tag is a bound NFC tag, and decrypt the encrypted password information through the identifier of the bound NFC tag and input the password obtained after the decrypting into the password input interface if the current NFC tag is a bound NFC tag.
[0092] In this embodiment, when it is needed to input the password, the mobile terminal opens the password input interface; when the password is not inputted, the mobile device contacts the NFC tag to read the NFC tag, and determines whether the current NFC is a bound NFC tag; if not, it ends, otherwise the current interface is determined whether has stored the password, and the corresponding password is decrypted and inputted into the password input interface.
[0093] In one embodiment, the decrypting the corresponding password and inputting into the password input interface includes:
[0094] obtaining the corresponding password field by the mobile terminal based on the identifier of the current interface; decrypting the password field based on the identifier of the bound NFC tag to obtain the password string; and setting the password string obtained by the decrypting to the password input box on the password input interface so as to complete inputting the password.
[0095] That is, in this embodiment, if the password is not inputted in the password input interface, and the user makes the mobile terminal to contact the NFC tag and read the NFC tag, it is determined whether the current NFC is the password verification device which has been stored and the current interface has stored the password. If it is, a password recovery process is triggered.
[0096] The password recovery process is as follows: obtaining the password field based on the identifier of the current interface; decrypting the password field based on the identifier of the password verification device to obtain the password string; and setting the password string to the password input box on the password input interface so as to complete inputting the password.
[0097] As can be seen from the above, a method adopting NFC to automatically recover the stored password is provided. After the password is stored, the user is not need to input the password repeatedly in the subsequent use. The recovery of the password can be performed by the user through merely using the mobile device to touch an NFC label, which is not needed to input the password, and is easy to use while there is no risk of password leak.
[0098] Based on the above-mentioned method embodiment, the present disclosure further provides an embodiment of password storage and recovery system for a mobile terminal. Referring to
[0099] The display screen 21 is configured to display the password input interface.
[0100] The NFC module 22 is configured to read the NFC tag and obtain the identifier ID of the NFC tag.
[0101] The one or more programs 25 are stored in the storage 24 and configured to be executed by the processor 23. The one or more applications 25 include instructions to execute a binding module 210, an encryption module 220, a reading module 230, and a decryption module 240.
[0102] The binding module 210 is configured to control the mobile terminal to add an NFC tag as the password verification device, store the ID of the NFC tag as the password verification device identifier, and bind the mobile terminal and the NFC tag. The NFC tag has one unique ID identifier.
[0103] The encryption module 220 is configured to store the password information of the mobile terminal after encrypting the password information utilizing the identifier of the bound NFC tag.
[0104] The reading module 230 is configured to control the mobile terminal to contact and read the NFC tag if the mobile terminal opens the password input interface to input the password.
[0105] The decryption module 240 is configured to determine whether the current NFC tag is a bound NFC tag, and decrypt the encrypted password information through the identifier of the bound NFC tag and input the password obtained after the decrypting into the password input interface if the current NFC tag is a bound NFC tag.
[0106] Particularly, the binding module 210 includes:
[0107] a reading and binding unit 211 configured to control the mobile terminal to contact and read the NFC tag, and set the NFC tag to be the password verification device; and
[0108] a storage unit 212 configured to store the ID of the NFC tag as the password verification device identifier.
[0109] Particularly, the encryption module 220 includes:
[0110] a password input interface control unit 221 configured to control the mobile terminal to receive an operation instruction of a user, and enter the password input interface;
[0111] a first determination unit 222 configured to control the mobile terminal to contact and read the NFC tag after receiving the operation instruction of the user and inputting the password, determine whether the current NFC tag is a bound NFC tag, and if it is, enter the password storing process;
[0112] a password string unit 223 configured to control the mobile terminal to obtain the password string from the password input box of the password input interface;
[0113] an encryption unit 224 configured to encrypt the password string utilizing the identifier of the bound NFC tag to obtain the password field, and obtain the identifier of the current password input interface; and
[0114] an adding unit 225 configured to make the identifier of the password input interface and the password field as the record to be added to the database so as to store in the mobile terminal.
[0115] Particularly, the reading module 230 includes:
[0116] an opening unit 231 configured to open the password input interface; and
[0117] a reading unit 232 configured to control the mobile terminal to contact and read the NFC tag if the password is not inputted.
[0118] Particularly, the decryption module 240 includes:
[0119] a second determination unit 241 configured to determine whether the current NFC tag is a bound NFC tag;
[0120] a third determination unit 242 configured to determine whether the current interface has stored the password, and decrypt the corresponding password and input to the password input interface if the current interface has stored the password;
[0121] an identifier obtaining unit 243 configured to control the mobile terminal to obtain the corresponding password field based on the identifier of the current interface;
[0122] a decryption unit 244 configured to decrypt the password field based on the identifier of the bound NFC tag to obtain the password string; and
[0123] a password input unit 245 configured to set the password string obtained by the decrypting to the password input box on the password input interface so as to complete inputting the password.
[0124] In view of the above, the method and system for NFC-based mobile terminal password storage and recovery provided by the present disclosure adds a new function to a mobile device: NFC password storage and recovery. Whenever a password is stored by the user, the password will not need to be re-input afterward. The recovery of the password can be performed by the user through merely using the mobile device to touch an NFC label, which is not need to input the password, and is easy to use while there is no risk of password leak. As a result, the security of password input is improved, which provides the user with a convenience.
[0125] Of course, those skilled in the art will understand that implementing all or part of the processes in the method of the embodiments described above may be accomplished by a computer program that commands the associated hardware (e.g., a processor or a controller, etc.). The program can be stored in a computer-readable storage medium such as a storage, a magnetic disk, an optical disk, etc. The program may include, at the time of execution, the steps of the method embodiments as described above.
[0126] It is to be understood that the application of the present disclosure is not limited to the above-mentioned examples, and for those skilled in the art, improvements or modifications can be performed in accordance with the above description, and all the improvements and modifications should be within the scope of the protection of the present disclosure.