CN104375836A - Method and device for showing lock screen window - Google Patents

Method and device for showing lock screen window Download PDF

Info

Publication number
CN104375836A
CN104375836A CN201410665515.3A CN201410665515A CN104375836A CN 104375836 A CN104375836 A CN 104375836A CN 201410665515 A CN201410665515 A CN 201410665515A CN 104375836 A CN104375836 A CN 104375836A
Authority
CN
China
Prior art keywords
window
screen locking
secret protection
verification
protection configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410665515.3A
Other languages
Chinese (zh)
Other versions
CN104375836B (en
Inventor
赵磊
陈就标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201410665515.3A priority Critical patent/CN104375836B/en
Publication of CN104375836A publication Critical patent/CN104375836A/en
Application granted granted Critical
Publication of CN104375836B publication Critical patent/CN104375836B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention discloses a method for showing a lock screen window. The method includes the steps that a window object in a running status is obtained; a window identifier of the window object in the running status is obtained; a preset privacy protection configuration is obtained, and whether the window identifier is matched with the privacy protection configuration or not is judged; if yes, the lock screen window corresponding to the window object is generated, set to be in the running status and shown. The embodiment of the invention further discloses a device for showing the lock screen window. By the adoption of the method and device for showing the lock screen window, operation convenience can be improved.

Description

A kind of method and device showing screen locking window
Technical field
The present invention relates to mobile internet technical field, particularly relate to a kind of method and the device of showing screen locking window
Background technology
Along with the development of development of Mobile Internet technology; the particularly rise of mobile payment and Mobile banking; the protection of privacy of user becomes the very general core demand of mobile phone users, and being pinned by some privacy informations is way very general to of secret protection at present.Existing mobile terminal (such as smart mobile phone, panel computer etc.) generally adopts and locks this method to protect privacy of user to the application that may produce privacy.Such as in some online payments application, when user clicks the icon startup of this application or switches to this application, mobile terminal can show mode (namely cannot switch to another window of this application interface) coded lock control, user just can enter this application after needing input password to carry out authentication, thus prevent mobile terminal idle or lose time other users start this application and spy on privacy.
But, along with the lifting of mobile terminal hardware performance, mobile terminal can run the large-scale synthesis application of more complicated hardware and software platform.Such as; the application of some large-scale synthesis social networks has comprised multiple functional modules such as instant messaging, microblogging, personal homepage, gaming platform, map, ecommerce and network payment; if still conventionally in applying the scheme that locks; then user is when carrying out the operation that some need secret protection lower, also must carry out unlocking operation frequently.
Such as, if user switches to browser searches webpage when the instant communication function by using this social networks to apply and consults reference materials, when switching back the application of this social networks again, due to this social networks application planned network payment transaction, therefore this application is locked, and user needs to input correct password in the coded lock control shown and just can enter this application and reuse instant communication function the content of consulting is sent to good friend.
Therefore, inventor finds to carry out more meaningless unlocking operation based on the method for the displaying coded lock control of application by causing user in prior art, thus reduces the input efficiency of user, makes the convenience deficiency operated.
Summary of the invention
Based on this, in order to solve the technical matters of the convenience deficiency of aforesaid operations, spy provides a kind of method of showing screen locking window.
Show a method for screen locking window, comprising:
Obtain the window object being in running status;
The window ID of the window object of running status is in described in acquisition;
Obtain the secret protection configuration preset, judge described window ID whether with described secret protection configurations match, if so, then:
Generate the screen locking window corresponding with described window object, be set to running status and show.
Correspondingly, in order to solve the technical matters of the convenience deficiency of aforesaid operations, spy provides a kind of device showing screen locking window.
Show a device for screen locking window, comprising:
Window object acquisition module, for obtaining the window object being in running status;
Window ID acquisition module, for being in the window ID of the window object of running status described in obtaining;
Window match module, for obtaining default secret protection configuration, judge described window ID whether with described secret protection configurations match;
Screen locking display module, for when described window ID is mated, generates the screen locking window corresponding with described window object, is set to running status and shows.
Implement the embodiment of the present invention, following beneficial effect will be had:
For the comprehensive application with multiple functional module; user can carry out secret protection configuration respectively for functional module relatively independent in this application and lock; make user when using this application; only need when accessing specific functional module, side need input and verifies password accordingly, and without the need to this be applied in switch in any situation time; input validation password repeatedly; because this reducing the checking procedure of redundancy, improve operating efficiency, the convenience operated is improved.
In addition, because releasing process reduces, mobile terminal is also used for showing locking screen interface and carrying out verify calculation by expending less computational resource, therefore makes the power consumption of mobile terminal also reduce, thus improves the battery life of mobile terminal.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of process flow diagram showing the method for screen locking window in an embodiment;
Fig. 2 is the interface schematic diagram showing application choice interface to be locked in an application scenarios;
Fig. 3 is the interface schematic diagram carrying out secret protection configuration selection window mark in an application scenarios;
Fig. 4 verifies password in an application scenarios to arrange interface schematic diagram;
Fig. 5 is the interface schematic diagram that in an embodiment, prompting input password carries out authentication;
Fig. 6 is the interface schematic diagram of proof of identity failure prompt cipher mistake in an embodiment;
Fig. 7 is a kind of structural representation showing the device of screen locking window in an embodiment;
Fig. 8 is a kind of structural representation showing the device of screen locking window in another embodiment;
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The screen locking mechanism of the protection for privacy of user in conventional art is for application.Such as, in android application, KeyguardManager assembly is usually used to realize screen locking.When running this assembly, showing locking screen interface by the method in KeyguardManager.KeyguardLock class, generating unlock interface by calling KeyguardManager.OnKeyguardExitResult function.User, by slipping into the unlock interface of carrying out cryptographic check on locking screen interface, after the success of input password, then can enter application and start operation.Then as previously mentioned, user is when operation has the comprehensive application of multiple relatively independent functional module, if frequently switch to other application, when then user switches to (in andorid system application can at running background) this application at every turn, then need at unlock interface input password, make the efficiency of input lower, thus cause the convenience of operation not enough.
Therefore, be the problem of convenience deficiency solving aforesaid operations, spy proposes a kind of method of showing screen locking window, and the execution of the method depends on computer program, on the computer system that can run on von Neumann system.This computer program accessible site in the application, also can be used as independently tool-class application and runs.This computer system can be smart mobile phone, the super of panel computer, touch function this etc. run the mobile device of intelligent operating system, particularly run the terminal device of the systems such as android, ios and windows phone.
Concrete, in the present embodiment, the method as shown in Figure 1, comprising:
Step S102: obtain the window object being in running status.
Window object is the container of the view object for interface expression in the intelligent operating system that mobile terminal runs, and it can be used as the carrier of multiple view object, controls the display effect of the plurality of view object.
Such as, in Android system, window object (i.e. activity object, wherein contain a window object) also can be described as page object, express display effect (header, footer, text etc.) by adding multiple view object (view object), and this window object is the carrier of the plurality of view object.
And in ios system, window object is UIViewController object (it is similar to the activity object in Android system, realizes slightly different).In windows phone system, window object is window object.
Window object generally includes multiple state, for representing that this window is in the state of input focus, the state (part display and cannot as input focus) of the window half mulching of input focus is in by other, the state that covered completely by other windows being in input focus (do not show completely and cannot as input focus), and be marked as the state can deleted and wait for that it discharges by Memory recycle mechanism in internal memory.In the present embodiment, running status is window and is in input focus and carries out the state of showing completely.
Such as, in Android system, namely activity object comprises 4 kinds of states, is respectively:
1.Active/Runing
After a new Activity startup is stacked, it is presented at screen foremost, process is the top (Activity stack top) being in stack, now it be in visible and can with the running status of user interactions, be called active state or running status (active or running).
2.Paused
When Activity loses focus, be placed on stack top by a new non-full frame Activity or transparent Activity, state is now called halted state (Paused).Now it still keeps being connected with window manager, and Activity still maintains vigour (keep all states, information about firms, keep being connected with window manager), but will be fallen by force termination when Installed System Memory is extremely low.So it is still visible, but loses focus therefore can not carry out alternately with user.
3.Stoped
If an Activity is override completely by other Activity, be called halted state (Stopped).It still keeps all states and information about firms, but it is no longer visible, so its window is hidden, when Installed System Memory needs to be used in other places time, the Activity of Stopped will be fallen by force termination.
4.Killed
If an Activity is Paused or Stopped state, this Activity can delete by system from internal memory, and android system is adopted and deleted in two ways, or requires that this Activity terminates, or directly stops its process.When this Activity is shown to user again, it must restart and reset state above.
Based in the application scenarios of Android system, the window object being in running status is the activity object being in Active/Runing state.And in the systems such as android, the multiple activity objects usually created with the data structure storage user operation of window stack.Window stack has characteristic first-in last-out, the window object being in running status is always in the stack top location of window stack, therefore, in the present embodiment, obtaining the step being in the window object of running status is: the window stack obtaining memory window object, obtains the window object being in the stack top of window stack.
Such as, user first starts window (the activity object of corresponding main interfaces windows that main interface is then shown in application, and this activity object is pressed into window stack), then select to start instant communication function, main interfaces windows can cover by the instant communication message window (the activity object of corresponding instant communication message window) then ejected, the input focus of user also switches to this instant communication message window, now in window stack, the activity object of corresponding instant communication message window is then pressed into window stack, and is in stack top location.And return when user terminates input click, when again switching to main interfaces windows, then the activity object of this corresponding instant communication message window is shifted out surely by the stack from window stack, and make the activity object of corresponding main interfaces windows be placed in stack top location, thus winner's interfaces windows is made to regain input focus.
In the present embodiment, then timing (comparatively short period) window stack object can be obtained, obtain the window object (only obtain it to quote and pointer, do not shift out from stack top) of its stack top.In other embodiments also can the handover event of detection window object, in the event handling function of handover event, obtain window stack object, obtain the window object of its stack top.Adopt the mechanism of timing acquisition or event handling to obtain window object, can ensure be not detected and omit when window object can not be had to be in stack top.
In another embodiment, the state parameter also by searching window object obtains the window object being in running status.Such as, for window object not with the system that the form of stack stores, then can carry out poll to the container of memory window object and search, find state parameter to be the window object of running status.
In another embodiment, also undertaken obtaining the window object being in running status by detecting focus handover event.Such as, focus can be detected and obtain event, and the source object obtaining this event in the event handling function of event is obtained in this focus, then this source object is the window object that is in running status or will be in the window object of running status as container object (such as, if focus obtains the switching that event is the input frame of user in same window object, then source object is the input frame object be switched to, and the window object being in running status remains the window object of the container as this input frame object, do not change)
Certainly, in the application scenarios using window stack memory window object, by obtaining the window object of stack top, to obtain the window object being in running status be still preferably scheme, and only needing to add the more weak code of simple coupling can realize, and therefore makes the extendability of calling program stronger.In addition, because window stack is the object of operating system grade, also can conveniently the method be implemented in tool-class application.
Step S104: obtain the window ID being in the window object of running status.
The window ID of window object is the identification information for identifying window object, and the predeterminable attribute for window object stores.Preferably, can application identities as prefix, be referred to as suffix with window name in the application, thus distinguish the window object in different application.Such as A and B application all includes the function of " setting " and this function all shows user by corresponding window object, then in A application, this window ID arranging window can be predefined as A-config, then can be predefined as B-config, thus obtain differentiation in B application.And for the application based on URL, then can URL as window ID.Such as, if the function that arranges of A application needs the address accessing a.com/config to read the display data of window object, then can using the window ID of this URL as window object.
Step S106: obtain the secret protection configuration preset, judge window ID whether with secret protection configurations match, if so, then execution step S108; Otherwise, perform step S110.
Step S108: generate the screen locking window corresponding with window object, be set to running status and show.
Step S110: do not operate.
Secret protection configuration is the configuration that the needs preset carry out some functional module of the application adding latching operation, can be stored in configuration file.Operationally, can read this secret protection configuration, and be buffered in internal memory.Judge that whether window ID is with secret protection configurations match to judge whether to include during this secret protection configures this window ID or secret protection and configure and whether be marked with this window and indicate and need to carry out secret protection (being generally an attribute item); if coupling, then show screen locking window.
In the present embodiment, screen locking window is also a window object, is set to running status and is the stack top being placed on window stack, or its Window state is set to active state or running status.Conventional proof of identity assembly can be comprised in screen locking window, if verification is passed through, then himself is removed, thus make to be positioned at its stack top being come back to window stack by the window object of the application that locks below window stack, shown and obtain input focus.
It should be noted that, due to the interface processing mechanism that window stack is operating system, therefore as abovementioned steps S102 obtains by the stack top of window stack the window object being in running status, and the stack top by screen locking window being placed in window stack in step S108 is shown, the enforcement of this method is realized by the application of third-party tool-class, and can be not limited to realize with independently functional module in the application.
Preferably, the step generating the screen locking window corresponding with window object also can comprise: the size and the position that obtain window object, according to size and the position generation screen locking window of window object.
In some operating systems, such as, in android 5.0 system, the mechanism of split screen is provided, same screen can show multiple window object, when then showing screen locking window, only cover the window object same screen needing be capped, and other windows are not had an impact.
In the present embodiment, also can show the secret protection configuration page, secret protection configuration page face comprises optional corresponding with window ID options.User is namely by being configured at the enterprising line operate of the secret protection configuration page; secret protection configuration-direct is inputted by choosing corresponding options; terminal then receives the secret protection configuration-direct of input; extract the corresponding window ID chosen, window ID is stored in secret protection configuration file.
Such as; as shown in Figure 2, in this application scenarios, the operation of this method is applied (software locks namely shown in Fig. 2) based on the tool-class of independent operating; after running the application of this tool-class, can it be configured the need of carrying out secret protection selective gist.As in Fig. 2, user can select " micro-letter " application to be configured.User as shown in Figure 3, then can show the multiple configurable function options that " micro-letter " is applied, such as, " my bank card ", " circle of friends ", " message " and " when entering micro-letter " 4 options in Fig. 3 after selecting " micro-letter " application.For my functional module such as bank card, relate to the personal finance data of user, therefore degree of privacy is higher, usually recommends user to open and adds lock function.As in Fig. 3, user have selected " my bank card " options by slip, then window ID corresponding for " my bank card " options added in secret protection configuration file.
And in this application scene, user is when using the application of micro-letter, if user enters its bank card functionality module and checks remaining sum, the window object that then bank card functionality module is corresponding is placed in stack top thus after being in running status, detected by abovementioned steps S102 and get, and the object identity of this window object is obtained by step S104, then (this step can complete in advance to obtain secret protection configuration by reading secret protection configuration file, and by the secret protection allocating cache of reading in internal memory), judge wherein whether record this window ID, as in precedent, user is arranged, then fit through, thus show screen locking window.
In the present embodiment, the screen locking window of generation comprises cryptographic check assembly (being carried out the verification assembly verified by approach such as input characters password, PIN code, mailbox checkings), sliding trace verification assembly (being carried out the assembly verified by the default graphics track that slides out at touch-screen), vocal print verification assembly (carry out phonetic entry by microphone and carry out the verification assembly of vocal print comparison) and/or finger-mark check assembly (being carried out the assembly verified by fingerprint sensor).Also can receive the unlock password instruction of input, sliding trace unlock command, vocal print unlock command and/or unlocked by fingerprint instruction after showing the step of screen locking window, and it is verified; Verification by rear, then removes screen locking window.
And also provide the verification option that password is arranged at the secret protection configuration page.Such as, in this application scene, screen locking window can comprise sliding trace verification assembly (i.e. figure lock), as shown in Figure 4, can arrange the page by present graphical lock, user arranges sliding trace by slip, and mobile terminal stores after then this sliding trace being extracted feature.When this user enters " my bank card " function, then show the screen locking window comprising sliding trace verification assembly as shown in Figure 5, if sliding trace input error, then point out user to verify failure (as shown in Figure 6).
Preferably, need for each the window object adding secret protection, user can arrange and independently verify password.Such as; in figure 3; if user is " my bank card " and " circle of friends " add privacy protection function; then this user is after sliding button is opened; can show that " my bank card " and " circle of friends " respective independently password arranges interface respectively; thus after preventing single password from leaking, lawless person walks whole application, improves the security of secret protection.
In the present embodiment; judge whether window ID also comprises with after the step of secret protection configurations match: obtain the association window corresponding with window ID and identify; obtain the verification frequency of failure that association window mark is corresponding; judge whether it is more than or equal to frequency of failure threshold value; if so, then judge that it mates.
The incidence relation of user's also configurable window ID in secret protection configuration.If be configured with window ID A in secret protection configuration to need to carry out secret protection, window ID B and C does not need to carry out secret protection, but window ID A association window mark B and window ID C, then when the window object that impression window mark A is corresponding, preferentially can show that screen locking prompt user inputs password, if the number of times that user inputs code error exceedes frequency of failure threshold value, then this user is when opening window object corresponding to window ID B or window ID C, window ID B and window ID C also can the match is successful, therefore mobile terminal also can show screen locking window, thus after preventing mobile terminal stolen, even if lawless person is not knowing the unlocking cipher of the functional module locked by privacy protection function but still is obtaining the situation of password by correlation function, thus raising security.
Such as, in this application scene, as shown in Figure 3, secret protection is carried out if be configured with " my bank card " in secret protection configuration for needs, " message " is not for need to carry out secret protection, but " my bank card " association " message ", then lawless person needs when entering " my bank card " function to input unlocking pin, if its password attempt number of times is more than or equal to threshold number, then this lawless person is when entering " message " function, also need to input unlocking pin, thus prevent lawless person when not knowing the unlocking pin entering " my bank card " function, this user is pretended to be to send swindle information or inquiry password as other good friends by " message " function, thus further increase security.
In the present embodiment; also comprise after verifying the step passed through: frequency is passed through in the verification calculating screen locking window corresponding with window ID; filter out its verification is more than or equal to frequency threshold window ID by frequency, it is set to not matching status in secret protection configuration.
That is, if user is the same function of Reusability at short notice, the password that have input more repeatedly unlocks, and verification is all passed through, then can confirm that this user is the validated user of mobile terminal, in order to improve input efficiency, then to this window object not regeneration screen locking window, thus save the time.Be set to not matching status be to remove or be labeled as and do not mate.
Preferably, the step window ID filtered out being set in secret protection configuration not matching status also comprises:
The life cycle that window ID is not matching status is set; When life cycle arrives at, window ID is set to matching status.
Such as; can for this window ID adds unmatched mark in secret protection configuration; and additional period parameter (such as 1 hour; 30 minutes etc.); then by the mode of timer or cycle detection when this time parameter expires, the unmatched mark of this window ID is changed to coupling.Because life cycle is to after date, this user still needs input password to enter system, therefore improves the security of secret protection.
It should be noted that; the enforcement of the method is not limited to the above-mentioned embodiment based on tool-class application (" software locks " application as in above-mentioned application scenarios); also accessible site is in needing to carry out among the application that secret protection locks respectively to its window, be equivalent to this application another independently functional module run (be such as directly integrated in micro-letter apply in).
In one embodiment, as shown in Figure 7, a kind of device showing screen locking window, comprises window object acquisition module 102, window ID acquisition module 104, Window match module 106 and screen locking display module 108, wherein:
Window object acquisition module 102, for obtaining the window object being in running status.
Window ID acquisition module 104, for obtaining the window ID of the window object being in running status.
Window match module 106, for obtaining default secret protection configuration, judge window ID whether with secret protection configurations match.
Screen locking display module 108, for when window ID is mated, generates the screen locking window corresponding with window object, is set to running status and shows.
In the present embodiment, window object acquisition module 102, also for obtaining the window stack of memory window object, obtains the window object being in the stack top of window stack.
In the present embodiment, screen locking display module 108 is also for adding the stack top of window stack to by screen locking window.
In the present embodiment, screen locking display module 108, also for obtaining size and the position of window object, generates screen locking window according to the size of window object and position.
In the present embodiment, as shown in Figure 8, this device also comprises window and to lock configuration module 110, and for showing the secret protection configuration page, secret protection configuration page face comprises optional corresponding with window ID options; Receive the secret protection configuration-direct of input, extract the corresponding window ID chosen, window ID is stored in secret protection configuration file.
Window match module 106 is also for reading secret protection configuration file.
In the present embodiment, Window match module 106 also for obtaining the association window mark corresponding with window ID, obtaining the verification frequency of failure that association window mark is corresponding, judging whether it is more than or equal to frequency of failure threshold value, if so, then judge that it mates.
In the present embodiment, screen locking window comprises cryptographic check assembly, sliding trace verification assembly, vocal print verification assembly and/or finger-mark check assembly.As shown in Figure 8, this device also comprises proof of identity module 112, for receiving the unlock password instruction of input, sliding trace unlock command, vocal print unlock command and/or unlocked by fingerprint instruction, and verifies it; Verification by rear, then removes screen locking window.
In the present embodiment; as shown in Figure 8; this device also comprises verification frequency statistics module 114; frequency is passed through in verification for calculating screen locking window corresponding with window ID; filter out its verification is greater than frequency threshold window ID by frequency, it is set to not matching status in secret protection configuration.
In the present embodiment, as shown in Figure 8, frequency statistics module 114 is verified also for arranging the life cycle that window ID is not matching status; When life cycle arrives at, window ID is set to matching status.
In sum, implement the embodiment of the present invention, following beneficial effect will be had:
For the comprehensive application with multiple functional module; user can carry out secret protection configuration respectively for functional module relatively independent in this application and lock; make user when using this application; only need when accessing specific functional module, side need input and verifies password accordingly, and without the need to this be applied in switch in any situation time; input validation password repeatedly; because this reducing the checking procedure of redundancy, improve operating efficiency, the convenience operated is improved.
In addition, because releasing process reduces, mobile terminal is also used for showing locking screen interface and carrying out verify calculation by expending less computational resource, therefore makes the power consumption of mobile terminal also reduce, thus improves the battery life of mobile terminal.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (18)

1. show a method for screen locking window, comprising:
Obtain the window object being in running status;
The window ID of the window object of running status is in described in acquisition;
Obtain the secret protection configuration preset, judge described window ID whether with described secret protection configurations match, if so, then:
Generate the screen locking window corresponding with described window object, be set to running status and show.
2. the method for displaying screen locking window according to claim 1, is characterized in that, the step that described acquisition is in the window object of running status is:
Obtain the window stack storing described window object, obtain the window object being in the stack top of described window stack.
3. the method for displaying screen locking window according to claim 2, is characterized in that, described step screen locking window being set to running status is:
Described screen locking window is added to the stack top of described window stack.
4. the method for displaying screen locking window according to claim 1, is characterized in that, the step of the screen locking window that described generation is corresponding with described window object also comprises:
Obtain size and the position of described window object, according to size and the position generation screen locking window of described window object.
5. the method for displaying screen locking window according to claim 1, it is characterized in that, described method also comprises:
Show the secret protection configuration page, described secret protection configuration page face comprises optional corresponding with window ID options;
Receive the secret protection configuration-direct of input, extract the corresponding window ID chosen, described window ID is stored in secret protection configuration file;
The step of the secret protection configuration that described acquisition is preset is:
Read described secret protection configuration file.
6. the method for displaying screen locking window according to claim 1, is characterized in that, the described step judging whether described window ID mates in described secret protection configuration also comprises:
Obtain the association window corresponding with described window ID to identify, obtain the verification frequency of failure that described association window mark is corresponding, judge whether it is more than or equal to frequency of failure threshold value, if so, then judge that it mates.
7. the method for displaying screen locking window according to claim 1, is characterized in that, described screen locking window comprises cryptographic check assembly, sliding trace verification assembly, vocal print verification assembly and/or finger-mark check assembly;
Also comprise after the step of described displaying screen locking window:
Receive the unlock password instruction of input, sliding trace unlock command, vocal print unlock command and/or unlocked by fingerprint instruction, and it is verified;
Verification by rear, then removes described screen locking window.
8. the method for displaying screen locking window according to claim 7, is characterized in that, also comprises after the step that described verification is passed through:
Calculate the verification corresponding with described window ID of described screen locking window by frequency, filter out its verification is greater than frequency threshold window ID by frequency, it is set to not matching status in described secret protection configuration.
9. the method for displaying screen locking window according to claim 8, is characterized in that, the described step window ID filtered out being set in described secret protection configuration not matching status also comprises:
The life cycle that described window ID is not matching status is set;
When described life cycle arrives at, described window ID is set to matching status.
10. show a device for screen locking window, it is characterized in that, comprising:
Window object acquisition module, for obtaining the window object being in running status;
Window ID acquisition module, for being in the window ID of the window object of running status described in obtaining;
Window match module, for obtaining default secret protection configuration, judge described window ID whether with described secret protection configurations match;
Screen locking display module, for when described window ID is mated, generates the screen locking window corresponding with described window object, is set to running status and shows.
The device of 11. displaying screen locking windows according to claim 10, is characterized in that, described window object acquisition module, also for obtaining the window stack storing described window object, obtains the window object being in the stack top of described window stack.
The device of 12. displaying screen locking windows according to claim 11, is characterized in that, described screen locking display module is also for adding the stack top of described window stack to by described screen locking window.
The device of 13. displaying screen locking windows according to claim 10, is characterized in that, described screen locking display module, also for obtaining size and the position of described window object, generates screen locking window according to the size of described window object and position.
The device of 14. displaying screen locking windows according to claim 10, it is characterized in that, described device also comprises window and to lock configuration module, and for showing the secret protection configuration page, described secret protection configuration page face comprises optional corresponding with window ID options; Receive the secret protection configuration-direct of input, extract the corresponding window ID chosen, described window ID is stored in secret protection configuration file;
Described Window match module is also for reading described secret protection configuration file.
The device of 15. displaying screen locking windows according to claim 10, it is characterized in that, described Window match module also identifies for obtaining the association window corresponding with described window ID, obtain the verification frequency of failure that described association window mark is corresponding, judge whether it is more than or equal to frequency of failure threshold value, if so, then judge that it mates.
The device of 16. displaying screen locking windows according to claim 10, is characterized in that, described screen locking window comprises cryptographic check assembly, sliding trace verification assembly, vocal print verification assembly and/or finger-mark check assembly;
Described device also comprises proof of identity module, for receiving the unlock password instruction of input, sliding trace unlock command, vocal print unlock command and/or unlocked by fingerprint instruction, and verifies it; Verification by rear, then removes described screen locking window.
The device of 17. displaying screen locking windows according to claim 16; it is characterized in that; described device also comprises verification frequency statistics module; frequency is passed through in verification for calculating described screen locking window corresponding with described window ID; filter out its verification is greater than frequency threshold window ID by frequency, it is set to not matching status in described secret protection configuration.
The device of 18. displaying screen locking windows according to claim 17, is characterized in that, described verification frequency statistics module is also for arranging the life cycle that described window ID is not matching status; When described life cycle arrives at, described window ID is set to matching status.
CN201410665515.3A 2014-11-19 2014-11-19 A kind of method and device of displaying screen locking window Active CN104375836B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410665515.3A CN104375836B (en) 2014-11-19 2014-11-19 A kind of method and device of displaying screen locking window

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410665515.3A CN104375836B (en) 2014-11-19 2014-11-19 A kind of method and device of displaying screen locking window

Publications (2)

Publication Number Publication Date
CN104375836A true CN104375836A (en) 2015-02-25
CN104375836B CN104375836B (en) 2018-08-17

Family

ID=52554779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410665515.3A Active CN104375836B (en) 2014-11-19 2014-11-19 A kind of method and device of displaying screen locking window

Country Status (1)

Country Link
CN (1) CN104375836B (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780209A (en) * 2015-04-07 2015-07-15 北京奇点机智信息技术有限公司 Portable equipment and server for realizing sharing interface scenario
CN105260658A (en) * 2015-09-17 2016-01-20 广东欧珀移动通信有限公司 Method and system for setting privacy interface
CN105354030A (en) * 2015-11-06 2016-02-24 天脉聚源(北京)教育科技有限公司 Method and apparatus for controlling minimization of window
CN105426717A (en) * 2015-11-11 2016-03-23 广东欧珀移动通信有限公司 Interface display method and apparatus
CN105956434A (en) * 2016-05-25 2016-09-21 乐视控股(北京)有限公司 Screen locking/unlocking method and device of intelligent terminal
CN107608726A (en) * 2017-08-10 2018-01-19 珠海市君天电子科技有限公司 Monitoring method, device, electronic equipment and storage medium
CN107659490A (en) * 2017-09-27 2018-02-02 广东欧珀移动通信有限公司 Method, terminal and the storage medium that a kind of file is sent
CN107679377A (en) * 2017-09-30 2018-02-09 广东欧珀移动通信有限公司 Application interface switching method, device, storage medium and electronic equipment
CN109871706A (en) * 2017-12-04 2019-06-11 广州市动景计算机科技有限公司 Method for secret protection and device calculate equipment and storage medium
US10372512B2 (en) 2016-09-30 2019-08-06 DeepAssist Inc. Method and apparatus for automatic processing of service requests on an electronic device
US10394577B2 (en) 2016-09-30 2019-08-27 DeepAssist Inc. Method and apparatus for automatic processing of service requests on an electronic device
CN110321079A (en) * 2019-06-27 2019-10-11 暨南大学 A kind of disk buffering De-weight method based on the mixing page
CN110764844A (en) * 2019-10-25 2020-02-07 芜湖盟博科技有限公司 Multi-application window custom layout method on vehicle-mounted system
WO2020087879A1 (en) * 2018-10-30 2020-05-07 中国科学院信息工程研究所 Method, device, and system for protecting private information
CN111274564A (en) * 2020-01-14 2020-06-12 青岛海信移动通信技术股份有限公司 Communication terminal and application unlocking method in split screen mode
CN112051954A (en) * 2020-10-12 2020-12-08 展讯通信(天津)有限公司 Page fixing display method and device, electronic equipment and storage medium
CN112800401A (en) * 2016-07-27 2021-05-14 创新先进技术有限公司 Privacy processing method and device and terminal
CN109101289B (en) * 2018-06-21 2021-09-10 海信视像科技股份有限公司 Data processing method and device for terminal equipment
CN114611118A (en) * 2022-05-12 2022-06-10 麒麟软件有限公司 Android multi-window application screen locking method based on Linux system
CN115113774A (en) * 2022-06-28 2022-09-27 上海中汇亿达金融信息技术有限公司 Screen locking and unlocking method and related device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727281A (en) * 2009-09-04 2010-06-09 丁贵 System and method for one-key locking of computer monitor
CN103064585A (en) * 2012-12-24 2013-04-24 东莞宇龙通信科技有限公司 Terminal unlocking method and terminal
US20130298226A1 (en) * 2010-12-28 2013-11-07 Zte Corporation Method and Terminal for Locking/Unlocking Terminal Screen Based on RFID

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727281A (en) * 2009-09-04 2010-06-09 丁贵 System and method for one-key locking of computer monitor
US20130298226A1 (en) * 2010-12-28 2013-11-07 Zte Corporation Method and Terminal for Locking/Unlocking Terminal Screen Based on RFID
CN103064585A (en) * 2012-12-24 2013-04-24 东莞宇龙通信科技有限公司 Terminal unlocking method and terminal

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780209A (en) * 2015-04-07 2015-07-15 北京奇点机智信息技术有限公司 Portable equipment and server for realizing sharing interface scenario
CN105260658A (en) * 2015-09-17 2016-01-20 广东欧珀移动通信有限公司 Method and system for setting privacy interface
CN105354030A (en) * 2015-11-06 2016-02-24 天脉聚源(北京)教育科技有限公司 Method and apparatus for controlling minimization of window
CN105426717A (en) * 2015-11-11 2016-03-23 广东欧珀移动通信有限公司 Interface display method and apparatus
CN105956434A (en) * 2016-05-25 2016-09-21 乐视控股(北京)有限公司 Screen locking/unlocking method and device of intelligent terminal
CN112800401B (en) * 2016-07-27 2024-01-30 创新先进技术有限公司 Privacy processing method, privacy processing device and terminal
CN112800401A (en) * 2016-07-27 2021-05-14 创新先进技术有限公司 Privacy processing method and device and terminal
US10372512B2 (en) 2016-09-30 2019-08-06 DeepAssist Inc. Method and apparatus for automatic processing of service requests on an electronic device
US10394577B2 (en) 2016-09-30 2019-08-27 DeepAssist Inc. Method and apparatus for automatic processing of service requests on an electronic device
CN107608726A (en) * 2017-08-10 2018-01-19 珠海市君天电子科技有限公司 Monitoring method, device, electronic equipment and storage medium
CN107659490B (en) * 2017-09-27 2021-01-12 Oppo广东移动通信有限公司 File sending method, terminal and storage medium
CN107659490A (en) * 2017-09-27 2018-02-02 广东欧珀移动通信有限公司 Method, terminal and the storage medium that a kind of file is sent
CN107679377A (en) * 2017-09-30 2018-02-09 广东欧珀移动通信有限公司 Application interface switching method, device, storage medium and electronic equipment
CN109871706A (en) * 2017-12-04 2019-06-11 广州市动景计算机科技有限公司 Method for secret protection and device calculate equipment and storage medium
CN109101289B (en) * 2018-06-21 2021-09-10 海信视像科技股份有限公司 Data processing method and device for terminal equipment
WO2020087879A1 (en) * 2018-10-30 2020-05-07 中国科学院信息工程研究所 Method, device, and system for protecting private information
CN110321079A (en) * 2019-06-27 2019-10-11 暨南大学 A kind of disk buffering De-weight method based on the mixing page
CN110764844A (en) * 2019-10-25 2020-02-07 芜湖盟博科技有限公司 Multi-application window custom layout method on vehicle-mounted system
CN111274564A (en) * 2020-01-14 2020-06-12 青岛海信移动通信技术股份有限公司 Communication terminal and application unlocking method in split screen mode
CN112051954A (en) * 2020-10-12 2020-12-08 展讯通信(天津)有限公司 Page fixing display method and device, electronic equipment and storage medium
CN114611118A (en) * 2022-05-12 2022-06-10 麒麟软件有限公司 Android multi-window application screen locking method based on Linux system
CN115113774A (en) * 2022-06-28 2022-09-27 上海中汇亿达金融信息技术有限公司 Screen locking and unlocking method and related device
CN115113774B (en) * 2022-06-28 2023-10-24 上海中汇亿达金融信息技术有限公司 Screen locking and unlocking method and related device

Also Published As

Publication number Publication date
CN104375836B (en) 2018-08-17

Similar Documents

Publication Publication Date Title
CN104375836A (en) Method and device for showing lock screen window
CN104392157B (en) Method and device for locking screen by using passwords
US9824244B1 (en) Systems and methods for a wearable user authentication factor
US9959694B2 (en) Security systems for protecting an asset
CN110826043B (en) Digital identity application system and method, identity authentication system and method
US20080194296A1 (en) System and method for securely managing data stored on mobile devices, such as enterprise mobility data
CN104813631A (en) Pluggable authentication mechanism for mobile device applications
CN103745144A (en) Terminal and terminal unlocking method
KR20150113152A (en) Smart card and smart card system with enhanced security features
CN102411814A (en) Identity authentication method, handheld ATM (automated teller machine) terminal and system
CN110400145A (en) A kind of digital identity application system and method, identity authorization system and method
CN105426717A (en) Interface display method and apparatus
CN102075627A (en) Information prompting method and mobile terminal
JP2019504566A (en) Information image display method and apparatus
CN104363589A (en) Identity authentication method, device and terminal
US20210287221A1 (en) Systems and methods for active signature detection
CN111130602A (en) Near field communication card data writing system, method, device and medium
CN105827622A (en) Method and device for protecting user information
CN109033866A (en) Bank card privacy information hidden method, bank card and computer readable storage medium
US20120102565A1 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
TWI534711B (en) Smart card and access method thereof
CN106211070A (en) The anti-theft protection method of a kind of mobile terminal and mobile terminal
CN109088872A (en) Application method, device, electronic equipment and the medium of cloud platform with service life
CN109151151A (en) Realize the method and device of the user mode switching of terminal
CN107679411A (en) A kind of mobile terminal privacy processing method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant