CN107070915A - The guard method of mobile terminal and its application program and device - Google Patents

The guard method of mobile terminal and its application program and device Download PDF

Info

Publication number
CN107070915A
CN107070915A CN201710233802.0A CN201710233802A CN107070915A CN 107070915 A CN107070915 A CN 107070915A CN 201710233802 A CN201710233802 A CN 201710233802A CN 107070915 A CN107070915 A CN 107070915A
Authority
CN
China
Prior art keywords
network signal
application program
signal source
sim card
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710233802.0A
Other languages
Chinese (zh)
Inventor
李春林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201710233802.0A priority Critical patent/CN107070915A/en
Publication of CN107070915A publication Critical patent/CN107070915A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

Present invention is disclosed the guard method of a kind of mobile terminal and its application program and device, wherein, when mobile terminal logs in the application program using memory account and password, method includes:Obtain the first network signal source of current network data;Judge whether the first network signal source is identical with the second network signal source of a preceding network data;If identical, the application program is directly logged in;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application program.The mobile terminal of the present invention and its guard method and the device of application program; when mobile terminal logs in the application program using memory account and password; the application program of memory account and password can be set to prevent stranger from being logged in using the mobile terminal of user; may effectively prevent the privacy leakage of user, and money loss etc..

Description

The guard method of mobile terminal and its application program and device
Technical field
The present invention relates to the safe handling field of the application program of mobile terminal, a kind of mobile terminal is especially related to And its guard method and the device of application program.
Background technology
The application programs such as social activity, finance on mobile terminals are installed on startup, it is necessary to input account and password, can be with Effectively prevent other people from arbitrarily logging in, to improve the safety of application program when in use.Such as, the application program such as bank, user is not It can for a long time log in and browse, log in needs to input password every time, and user can produce sensation safe to use, therefore will not dislike Abandon the cumbersome action of input password;But, the application program that such as QQ, wechat user commonly use, log in needs to input password every time, User will feel cumbersome, therefore, and developer provides a kind of function, as remember account and password, logged in next time During application program, Auto-writing account and password are logged in, and setting is automatically entered after the function of account and password, as long as Same mobile terminal, when logging in next time, can automatically enter account and password etc., directly log in.Automatically enter account and , there is application risk in password, such as, mobile terminal is picked up by other people, and the people of pickup mobile terminal can log in setting memory account Family and the application program of password, may make privacy leakage, monetary loss of user etc..
The content of the invention
The main object of the present invention for provide it is a kind of improve application program for mobile terminal using safety mobile terminal and its Application program guard method and device.
In order to realize foregoing invention purpose, the present invention proposes a kind of guard method of application program, and mobile terminal, which is logged in, to be made During with memory account and the application program of password, including:
Obtain the first network signal source of current network data;
Judge whether the first network signal source is identical with the second network signal source of a preceding network data;
If identical, the application program is directly logged in;Otherwise, obtain user input with the second network signal source pair The identifying code answered logs in the application program.
Further, the first network signal source is identical with the data source path that the second network signal is originated.
Further, before the step of first network signal for obtaining current network data is originated, including:
The account and password are encrypted according to the specified parameter that second network signal is originated, wherein described refer to Determine to include the identifying code in parameter.
Further, the first network signal source and the second network signal source include SIM card or WLAN, wherein, Different SIM cards is originated for different network signals, and different WLAN originate for different network signals.
Further, it is described according to second network signal when second network signal source is the second SIM card The account and password are encrypted the specified parameter in source, wherein including the step of the identifying code in the specified parameter Suddenly, including:
The second card number of second SIM card is obtained, the account and password are encrypted using second card number, Wherein, the second card number is the identifying code.
Further, the specified parameter originated according to second network signal is added to the account and password Close step, in addition to:
The 2nd IMSI of second SIM card is obtained, the account and password are encrypted using the 2nd IMSI, The 2nd IMSI formation private mark.
Further, it is described to judge that the first network signal source and the second network signal of a preceding network data come The whether identical step in source, including:
Judge whether the first network signal source is the first SIM card;
If so, then obtaining the card number of first SIM card, and judge the card number and the identifying code of first SIM card Whether match;
If the card number of first SIM card is matched with the identifying code, judge the first IMSI of first SIM card with Whether the private mark matches;
If the first IMSI is matched with the checking private mark, the first network signal source and second network are judged Signal source is identical.
Further, it is described when second network signal source is two WLAN, it is described according to second network The account and password are encrypted the specified parameter in signal source, wherein including the identifying code in the specified parameter The step of, including:
The WLAN passwords of the 2nd WLAN are obtained, the account and password are encrypted using the WLAN passwords, Wherein, WLAN passwords are the identifying code.
The present invention also provides a kind of protection device of application program, mobile terminal log in using memory account and password should When using program, including:
Acquiring unit, the first network signal for obtaining current network data is originated;
Judging unit, for judging that the first network signal source and the second network signal of a preceding network data are come Whether source is identical;
Login authentication unit, if it is identical with the second network data source to be originated for first network signal, is directly logged in The application program;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application journey Sequence.
The embodiment of the present invention also provides a kind of mobile terminal, including processor and memory;
The memory is used to store the application program supported described in the protection device execution any of the above-described of application program Guard method program;
The processor is configurable for performing the program stored in the memory.
The mobile terminal of the present invention and its guard method and the device of application program, mobile terminal are logged in using memory account During with the application program of password, judge first network signal source and a preceding network data the second network signal source whether It is identical, just it can otherwise need user's input validation code just to log in automated log on success only in the case of identical, to prevent Only stranger logs in the application program for setting memory account and password using the mobile terminal of user, may effectively prevent user's Privacy leakage, and money loss etc..
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the guard method of the application program of one embodiment of the invention;
Fig. 2 is the schematic flow sheet of the guard method of the application program of one embodiment of the invention;
Fig. 3 for one embodiment of the invention judgement first network signal source with second network signal originate whether phase The schematic flow sheet of same method;
Whether Fig. 4 originates for the judgement first network signal source of another embodiment of the present invention with second network signal The schematic flow sheet of identical method;
The schematic flow sheet for the determination methods that Fig. 5 originates for second network signal of one embodiment of the invention;
Fig. 6 is the structural schematic block diagram of the protection device of the application program of one embodiment of the invention;
Fig. 7 is the structural schematic block diagram of the protection device of the application program of one embodiment of the invention;
Fig. 8 is the structural schematic block diagram of the ciphering unit of one embodiment of the invention;
Fig. 9 is the structural schematic block diagram of the judging unit of one embodiment of the invention;
Figure 10 is the structural schematic block diagram of the ciphering unit of another embodiment of the present invention;
Figure 11 is the structural schematic block diagram of the judging unit of another embodiment of the present invention;
Figure 12 is the structural schematic block diagram of the judging unit of one embodiment of the invention;
Figure 13 is the structural schematic block diagram of the mobile terminal of one embodiment of the invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one It is individual ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges Diction " comprising " refer to there is the feature, integer, step, operation, element and/or establishment, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, establishment and/or their group.Wording used herein " and/ Or " include one or more associated wholes or any cell for listing item and all combine.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art The consistent meaning of meaning, and unless by specific definitions as here, otherwise will not use idealization or excessively formal implication To explain.
Those skilled in the art of the present technique are appreciated that mobile terminal here refers to smart mobile phone, tablet personal computer, intelligent hand The electronic equipments such as table.
Reference picture 1, the embodiment of the present invention provides a kind of guard method of application program, and mobile terminal is logged in using memory account During the application program of family and password, including step:
S1, the first network signal source for obtaining current network data;
S2, judge first network signal source and a preceding network data the second network signal originate whether phase Together;
If S3, identical, the application program is directly logged in;Otherwise, coming with the second network signal for user's input is obtained The corresponding identifying code in source logs in the application program.
Above-mentioned mobile terminal refers to that such as smart mobile phone, tablet personal computer, intelligent watch can install the intelligence of application program Electronic equipment.
As described in above-mentioned step S1, the first network data source of above-mentioned current network data refers to that mobile terminal is currently stepped on The network environment that can be normally used when recording above-mentioned application program, be its with network interaction when the data source used.Such as, when Preceding data interaction is can only to block to complete by SIM (Subscriber Identification Module, client identification module) , then it is considered that now first network signal source is SIM card;Current data can only pass through WLAN when interacting (Wireless LocalAreaNetworks, WLAN) is completed, then it is considered that now first network signal Source is WLAN;When residing network environment, both data interaction can be realized by SIM card, and data can also be realized by WLAN Interaction, then can be originated according to the selection first network signal that is set for of user, such as, mobile terminal is smart mobile phone, It is set as that the network environment residing for is WLAN environment, then preferential attachment WLAN, now, if setting SIM card in smart mobile phone, And SIM card is when can also connect network, first network signal can select WLAN to be first network letter according to default priority Number source etc..
As described in above-mentioned step S2, the second network signal source of an above-mentioned preceding network data refers to mobile terminal upper Once log in network signal source used during above-mentioned application program.Such as, the mobile terminal last time logs in above-mentioned application program Shi Liyong SIM cards carry out data interaction, then the second network signal source is SIM card.Judge first network signal source with Whether identical method is many in second network signal source, such as passes through IMSI (the mobile use in the world of SIM card number and/or SIM card Family identification code, IMSI:International Mobile Subscriber IdentificationNumber) judged, It can also be judged by WLAN addresses and/or password etc..
As described in above-mentioned step S3, if first network signal source is identical with the second network signal source, then can be with Judge that user is same person, or people known to user is in the mobile terminal using user, it is possible to directly using note Recall the above-mentioned application program of the function automated log on of account and password.If first network signal is originated and the second network signal source Different, then to can be determined that, the mobile terminal of user may be used by other strangers to be come, it is necessary to input with the second network signal The corresponding identifying code in source, when only identifying code is correct, can just log in above-mentioned application program.Above-mentioned identifying code is according to second One group of related data of network signal source, such as, and SIM card number etc., if first network signal source and the second network signal Source is identical, then their SIM card number is identical, i.e., identifying code can be directly obtained.If first network signal originate and Second network signal source is different, then their SIM card difference, then illustrates that current first network signal source changes Become, if logining memory account and the application program of password, need the SIM card number for inputting the second network signal source to be tested Card, being proved to be successful can just login successfully.
In the present embodiment, above-mentioned first network signal source and the second network signal source include SIM card or WLAN, its In, different SIM cards are originated for different network signals, and different WLAN originate for different network signals.Such as, data are come Source is all SIM card, but whether same SIM card, then also will be considered that network data source is different.
In the present embodiment, above-mentioned first network signal source is identical with the data source path that the second network signal is originated. Such as, when first network data source is SIM card, then the second network signal of selection source is equally SIM card;First network number During according to source for WLAN, then the second network signal of selection source is equally WLAN cards.That is, determining when previous login should Behind the first network signal source used in program, it is determined that the second network signal source under same network signal source.
In other embodiments, the data source path that first network signal source and the second network signal are originated can also Difference, such as, first network data source are SIM card, and the second network signal source is WLAN, then can directly judge two Person is different.
In reference picture 2, the present embodiment, the step S1 in the first network signals of above-mentioned acquisition current network data source it Before, including:
The account and password are encrypted for S11, the specified parameter originated according to second network signal, wherein institute State and include the identifying code in specified parameter.
As described in above-mentioned step S11, above-mentioned specified parameter is generally that the second network signal source is carried, unique, no The data that can change, such as, and card number, IMSI of SIM card etc..Above-mentioned identifying code is such as SIM card card number, WLAN passwords.
In one embodiment, when second network signal source is the second SIM card, according to the second network signal The account and password are encrypted the specified parameter in source, wherein including the step of the identifying code in the specified parameter Rapid S11, including:
S111, the second card number for obtaining second SIM card, are carried out using second card number to the account and password Encryption, wherein, the second card number is the identifying code.
As described in above-mentioned step S111, that is, the second card number of the second SIM card is read, and by the second card number to application program Account and password be encrypted, obtain a group encryption data, encryption rule operator can be configured according to demand, herein Do not repeat.When logging on, the first card number of current first SIM card is got first, then using the first card number according to right Answer the decryption rule of above-mentioned encryption rule that above-mentioned encryption data is decrypted, if successful decryption, illustrate that first network is believed Number source is identical with the second network signal source, can log in above-mentioned application program, if decryption failure, illustrates first network Signal is originated to originate with the second network signal and differed, it is necessary to which user is manually entered above-mentioned second card number is decrypted.
Further, the above-mentioned specified parameter originated according to second network signal is added to the account and password Close step S11, in addition to:
S112, the 2nd IMSI for obtaining second SIM card, are carried out using the 2nd IMSI to the account and password Encryption, the 2nd IMSI formation private mark.
As described in above-mentioned step S112, i.e., for the 2nd IMSI for reading the second SIM card, and by the 2nd IMSI to application The account and password of program are encrypted, and obtain a group encryption data, and encryption rule operator can be configured according to demand, It will not be described here.When logging on, the first IMSI of current first SIM card is got first, is then added according to correspondence is above-mentioned Above-mentioned encryption data is decrypted close regular decryption rule, if successful decryption, illustrate first network signal source with Second network signal source is identical, can log in above-mentioned application program, if decryption failure, illustrates that first network signal is originated Differed with the second network signal source, it is necessary to which user is manually entered above-mentioned second card number is decrypted.That is, when second When SIM card is provided with vice card, and first network signal source is when being above-mentioned vice card, although the vice card card number got can pair plus Ciphertext data is decrypted, but because the IMSI of vice card is different from above-mentioned 2nd IMSI, then illustrates above-mentioned vice card and the 2nd SIM's Signal source is different, equally can not directly log in above-mentioned application program.
Reference picture 3, further, the above-mentioned judgement first network signal source and the second net of a preceding network data Network signal source whether identical step S2, including:
S211, judge whether first network signal source is the first SIM card;
S212, if so, then obtain the card number of first SIM card, and judge that the card number of first SIM card is tested with described Whether card code matches;
If S213, the card number of first SIM card are matched with the identifying code, the first of first SIM card is judged Whether IMSI matches with the private mark;
If S214, the first IMSI matchs with the checking private mark, first network signal source and described the are judged Two network signals source is identical.
As described in above-mentioned step S211, S212, S213, S214, dual criterion is as set, application is logged in improve The security of program, when the card number of the first SIM card be verified by after, now the first SIM card is probably the pair of the second SIM card Card, so not interfering with login, can have potential safety hazard to privacy, property of the user of the first SIM card etc..So, pass through After the card number decryption of one SIM card, in addition it is also necessary to which second is decrypted, i.e., be decrypted with the IMSI of the first SIM card, because main card and pair The IMSI of card is different, thus using the second SIM card vice card when, equally can not with directly log in, raising privacy of user With the safety of property.
In another embodiment, it is above-mentioned according to second net when above-mentioned second network signal source is two WLAN The account and password are encrypted the specified parameter in network signal source, wherein including the checking in the specified parameter The step S11 of code, including:
S113, the WLAN passwords for obtaining the 2nd WLAN, are carried out using the WLAN passwords to the account and password Encryption, wherein, WLAN passwords are the identifying code.
As described in above-mentioned step S113, that is, the 2nd WLAN WLAN passwords are read, and by WLAN passwords to application program Account and password be encrypted, obtain a group encryption data, encryption rule operator can be configured according to demand, herein Do not repeat.When logging on, the first WLAN currently connected password is got first, is then advised according to the above-mentioned encryption of correspondence Above-mentioned encryption data is decrypted decryption rule then, if successful decryption, illustrates first network signal source and second Network signal source is identical, can log in above-mentioned application program, if decryption failure, illustrates first network signal source and the Two network signals source is differed, it is necessary to which user is manually entered above-mentioned second card number is decrypted.
Reference picture 4, further, the above-mentioned judgement first network signal source and the second net of a preceding network data Network signal source whether identical step S2, including:
S221, judge whether first network signal source is the first WLAN;
S222, if so, then obtain the password of the first WLAN, and judge the password of the first WLAN and the checking Whether code matches;
If S223, the password of the first WLAN are matched with the identifying code, the first network signal source is judged It is identical with the second network signal source.
As described in above-mentioned step S221, S222, S223, as verify the first WLAN password whether with previous second WLAN password is identical, if identical, judges that first network signal source is identical with the second network signal source, can be with Directly log in above-mentioned application program;Otherwise, it is necessary to be manually entered the 2nd WLAN password, above-mentioned application journey then can just be logged in Sequence.
In reference picture 5, the present embodiment, the determination methods in above-mentioned second network signal source, including:
S231, judge whether the mobile terminal is provided with SIM card;
If S232, being provided with the SIM card, selection SIM card is the second network data source;
If S233, not installing the SIM card, judge whether the mobile terminal connects WLAN;
If S234, connection WLAN, selection WLAN are the second network data source.
As described in above-mentioned step S231, S232, S233, S234, if mobile terminal is provided with SIM card, preferred SIM card Originated for the second network data, because the corresponding parameter of SIM card can be SIM card card number and IMSI, jointly to application program Logon account and password are encrypted, and can also carry out using cooperatively for plain code and private mark, improve the safety of login application program Property;If mobile terminal is fitted without SIM card, judge whether to connect WLAN, if connection, WLAN is the second network data Source.In other embodiments, SIM card and WLAN priority can also be exchanged, specifically can be according to use habit Deng being set..
In one embodiment, the application program on mobile terminal is logged in using memory account and password.When When once logging in, judge whether mobile terminal is provided with the second SIM card, if so, then obtain the second SIM card the second card number and The account and password of application program are encrypted 2nd IMSI, wherein it is private mark that the second card number, which is plain code, the 2nd IMSI,;If The second SIM card has been fitted without, then has judged whether mobile terminal is connected with the 2nd WLAN, has obtained the 2nd WLAN's if connection The account and password of application program are encrypted password.
When is once logging in, first determine whether whether mobile terminal is provided with the first SIM card, if the first SIM card, The account and password of encryption are decrypted the first card number and the first IMSI for then obtaining the first SIM card, if plain code and private mark It is correct, then the first SIM card and the second SIM card are judged as the same card, are directly logged in without being manually entered identifying code and are applied journey Sequence, if the whole mistakes of plain code and private mark, or plain code is correct, private mark mistake when, then judge the first SIM card and the second SIM card It is not same SIM card, i.e. first network signal source is different with the second network signal source, it is necessary to which user is manually entered checking Code (plain code) is verified, then can just be logged in, after login, can be with the first card number of the first SIM card and the first IMSI weights New account and password to application program is encrypted.If being fitted without the first SIM card, but with currently used first WLAN connection networks, then the account and password of above-mentioned encryption are decrypted the password for then obtaining the first WLAN, if decryption Success, then direct login application program, if decryption fails, is manually entered the 2nd WLAN password, is verified, and step on Record, while above-mentioned account and password are encrypted with the first WLAN password.
Further, when logging in first time, mobile terminal is fitted without the second SIM card, uses the 2nd WLAN password Account and password to application program are encrypted;When logging in again, although mobile terminal installs the first SIM card, Still can preferably the first WLAN password the account and password of application program are decrypted, directly stepped on if successful decryption Record, at this point it is possible to according to default rule, choose whether the first card number and the first IMSI using the first SIM card to applying journey The account and password of sequence are encrypted.
Further, when logging in first time, mobile terminal installs the second SIM card, uses the second card number of the second SIM card The account and password of application program are encrypted with the 2nd IMSI;When logging on, mobile terminal is fitted without the first SIM Card, but the first WLAN of connection, at this time, it may be necessary to the card number checking of the first SIM card is manually entered, then using the close of the first WLAN Code carries out re-encrypted to the account and password of application program.
The guard method of the application program of the embodiment of the present invention, when logging in the application program using memory account and password, Judge whether first network signal source is identical with the second network signal source of a preceding network data, only identical situation It is lower just otherwise to need user's input validation code just to log in automated log on success, to prevent stranger from using user's Mobile terminal logs in the application program for setting memory account and password, may effectively prevent the privacy leakage of user, and money Loss etc..
Reference picture 6, the present invention also provide a kind of protection device of application program, mobile terminal log in using memory account and During the application program of password, said apparatus includes:
Acquiring unit 10, the first network signal for obtaining current network data is originated;
Judging unit 20, for judging the first network signal source and the second network signal of a preceding network data Whether source is identical;
Login authentication unit 30, if it is identical with the second network data source to be originated for first network signal, is directly stepped on Record the application program;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application Program.
Above-mentioned mobile terminal refers to that such as smart mobile phone, tablet personal computer, intelligent watch can install the intelligence of application program Electronic equipment.
Such as above-mentioned acquiring unit 10, the first network data source of above-mentioned current network data refers to that mobile terminal is currently stepped on The network environment that can be normally used when recording above-mentioned application program, be its with network interaction when the data source used.Such as, when Preceding data interaction can only be completed by SIM card, then it is considered that now first network signal source is SIM card;Currently It can only be completed during data interaction by WLAN, then it is considered that now first network signal source is WLAN;When residing net Network environment, both can realize data interaction by SIM card, can also realize data interaction by WLAN, then can according to The selection first network signal that is set at family is originated, such as, mobile terminal is smart mobile phone, and it is set as when residing network rings Border is WLAN environment, then preferential attachment WLAN, now, if SIM card were set in smart mobile phone, and SIM card could also connect net During network, first network signal can select WLAN to be first network signal source etc. according to default priority.
Such as above-mentioned judging unit 20, the second network signal source of an above-mentioned preceding network data refers to mobile terminal upper Once log in network signal source used during above-mentioned application program.Such as, the mobile terminal last time logs in above-mentioned application program Shi Liyong SIM cards carry out data interaction, then the second network signal source is SIM card.Judge first network signal source with Whether identical method is many in second network signal source, such as passes through IMSI (the mobile use in the world of SIM card number and/or SIM card Family identification code, IMSI:International Mobile Subscriber IdentificationNumber) judged, It can also be judged by WLAN addresses and/or password etc..
Such as above-mentioned login authentication unit 30, if first network signal source is identical with the second network signal source, then Can be determined that user is same person, or people known to user is in the mobile terminal using user, it is possible to directly made With memory account and the above-mentioned application program of function automated log on of password.If first network signal is originated and the second network signal Source is different, then can be determined that, the mobile terminal of user may be used by other strangers to be believed, it is necessary to input with the second network Number corresponding identifying code in source, when only identifying code is correct, can just log in above-mentioned application program.According to above-mentioned identifying code is One group of related data of second network signal source, such as, and SIM card number etc., if first network signal source and the second network Signal source is identical, then their SIM card number is identical, i.e., identifying code can be directly obtained.If first network signal comes Source is different with the second network signal source, then their SIM card difference, then illustrates current first network signal source hair It is raw to change, if logining memory account and the application program of password, need the SIM card number for inputting the second network signal source to enter Row checking, being proved to be successful can just login successfully.
In the present embodiment, above-mentioned first network signal source and the second network signal source include SIM card or WLAN, its In, different SIM cards are originated for different network signals, and different WLAN originate for different network signals.Such as, data are come Source is all SIM card, but whether same SIM card, then also will be considered that network data source is different.
In the present embodiment, above-mentioned first network signal source is identical with the data source path that the second network signal is originated. Such as, when first network data source is SIM card, then the second network signal of selection source is equally SIM card;First network number During according to source for WLAN, then the second network signal of selection source is equally WLAN cards.That is, determining when previous login should Behind the first network signal source used in program, it is determined that the second network signal source under same network signal source.
In other embodiments, the data source path that first network signal source and the second network signal are originated can also Difference, such as, first network data source are SIM card, and the second network signal source is WLAN, then can directly judge two Person is different.
In reference picture 7, the present embodiment, the protection device of above-mentioned application program also includes:
Ciphering unit 11, the specified parameter for being originated according to second network signal is carried out to the account and password Encryption, wherein including the identifying code in the specified parameter.
Such as above-mentioned ciphering unit 11, above-mentioned specified parameter be generally it is that the second network signal source is carried, unique, will not The data of change, such as, and card number, IMSI of SIM card etc..Above-mentioned identifying code is such as SIM card card number, WLAN passwords.
Reference picture 8, in one embodiment, when above-mentioned second network signal source is the second SIM card, above-mentioned encryption Unit 11, including:
Card number encrypting module 111, the second card number for obtaining second SIM card, using second card number to institute State account and password is encrypted, wherein, the second card number is the identifying code.
Such as above-mentioned card number encrypting module 111, i.e., for reading the second card number of the second SIM card, and pass through the second card number pair The account and password of application program are encrypted, and obtain a group encryption data, and encryption rule operator can be carried out according to demand Set, will not be described here.When logging on, the first card number of current first SIM card is got first, is then blocked using first Number above-mentioned encryption data is decrypted according to the decryption rule of the above-mentioned encryption rule of correspondence, if successful decryption, illustrates the One network signal source is identical with the second network signal source, can log in above-mentioned application program, if decryption failure, illustrates First network signal is originated to originate with the second network signal and differed, it is necessary to which user is manually entered above-mentioned second card number is solved It is close.
Further, above-mentioned ciphering unit 11 also includes:
IMSI encrypting modules 112, the 2nd IMSI for obtaining second SIM card, using the 2nd IMSI to institute State account and password is encrypted, the 2nd IMSI formation private mark.
Such as above-mentioned IMSI encrypting modules 112, i.e., for the 2nd IMSI for reading the second SIM card, and by the 2nd IMSI pairs The account and password of application program are encrypted, and obtain a group encryption data, and encryption rule operator can be carried out according to demand Set, will not be described here.When logging on, the first IMSI of current first SIM card is got first, then according in correspondence Above-mentioned encryption data is decrypted the decryption rule for stating encryption rule, if successful decryption, illustrates that first network signal comes Source is identical with the second network signal source, can log in above-mentioned application program, if decryption failure, illustrates first network signal Originate and differed, it is necessary to which user is manually entered above-mentioned second card number is decrypted with the second network signal in source.That is, working as When second SIM card is provided with vice card, and first network signal source is when being above-mentioned vice card, although the vice card card number got can be with Encryption data is decrypted, but because the IMSI of vice card is different from above-mentioned 2nd IMSI, then illustrates above-mentioned vice card and second SIM signal source is different, equally can not directly log in above-mentioned application program.
Reference picture 9, further, above-mentioned judging unit 20, including:
First SIM card judge module 211, for judging whether the first network signal source is the first SIM card;
Second SIM card judge module 212, if being the first SIM card for first network signal source, obtains described The card number of first SIM card, and judge whether the card number of first SIM card matches with the identifying code;
3rd SIM card judge module 213, if the card number for first SIM card is matched with the identifying code, judges Whether the first IMSI of first SIM card matches with the private mark;
SIM card determination module 214, if being matched for the first IMSI with the checking private mark, judges the first network Signal source is identical with the second network signal source.
That is, passing through above-mentioned first SIM card judge module 211, the second SIM card judge module 212, the 3rd SIM card Judge module 213 and SIM card determination module 214 coordinate, and dual criterion are set, to improve the safety of login application program Property, when the card number of the first SIM card be verified by after, now the first SIM card is probably the vice card of the second SIM card, so will not Influence is logged in, and can have potential safety hazard to privacy, property of the user of the first SIM card etc..So, pass through the card of the first SIM card Number decryption after, in addition it is also necessary to second decrypt, i.e., be decrypted with the IMSI of the first SIM card, because main card and the IMSI of vice card are It is different, thus using the second SIM card vice card when, equally can not be with directly logging in, the peace of raising privacy of user and property Entirely.
Reference picture 10, in another embodiment, when above-mentioned second network signal source is two WLAN, above-mentioned encryption list Member 11, including:
WLAN encrypting modules 113, the WLAN passwords for obtaining the 2nd WLAN, using the WLAN passwords to described Account and password are encrypted, wherein, WLAN passwords are the identifying code.
Such as above-mentioned WLAN encrypting modules 113, i.e., for the WLAN passwords for reading the 2nd WLAN, and pass through WLAN passwords correspondence It is encrypted with the account and password of program, obtains a group encryption data, encryption rule operator can be set according to demand Put, will not be described here.When logging on, the first WLAN currently connected password is got first, then according in correspondence Above-mentioned encryption data is decrypted the decryption rule for stating encryption rule, if successful decryption, illustrates that first network signal comes Source is identical with the second network signal source, can log in above-mentioned application program, if decryption failure, illustrates first network signal Originate and differed, it is necessary to which user is manually entered above-mentioned second card number is decrypted with the second network signal in source.
Reference picture 11, further, above-mentioned judging unit 20, including:
First WLAN judge modules 221, for judging whether the first network signal source is the first WLAN;
2nd WLAN judge modules 222, if being the first WLAN for first network signal source, obtain described first WLAN password, and judge whether the password of the first WLAN matches with the identifying code;
WLAN determination modules 223, if the password for the first WLAN is matched with the identifying code, judge described One network signal source is identical with the second network signal source.
First WLAN judge modules 221, the 2nd WLAN judge modules 222 and WLAN determination modules 223 as described above, for testing Whether the password for demonstrate,proving the first WLAN is identical with previous 2nd WLAN password, if identical, judges first network signal Source is identical with the second network signal source, can directly log in above-mentioned application program;Otherwise, it is necessary to be manually entered second WLAN password, then can just log in above-mentioned application program.
In reference picture 12, the present embodiment, above-mentioned judging unit 20, including:
Judge module 231 is installed, for judging whether the mobile terminal is provided with the second SIM card;
First determination module 232, if for being provided with second SIM card, it is the second network number to select the second SIM card According to source;
Connection judgment module 233, if for not installing second SIM card, judging whether the mobile terminal connects 2nd WLAN;
Second determination module 234, if connecting the 2nd WLAN for the mobile terminal, the 2nd WLAN of selection is the second net Network data source.
Judge module 231, the first determination module 232, the determination module of connection judgment module 233 and second are installed as described above 234, the device of the judgement for performing the second network signal source, if being provided with SIM card for mobile terminal, preferably SIM card is originated for the second network data, because the corresponding parameter of SIM card can be SIM card card number and IMSI, jointly to applying journey The logon account and password of sequence are encrypted, and can also carry out using cooperatively for plain code and private mark, improve login application program Security;If mobile terminal is fitted without SIM card, judge whether to connect WLAN, if connection, WLAN is the second network Data source.In other embodiments, SIM card and WLAN priority can also be exchanged, specifically can be according to using Custom etc. is set.
In still another embodiment, the application program on mobile terminal is logged in using memory account and password.When When logging in for the first time, judge whether mobile terminal is provided with the second SIM card, if so, then obtaining the second card number of the second SIM card The account and password of application program are encrypted with the 2nd IMSI, wherein it is private mark that the second card number, which is plain code, the 2nd IMSI,;Such as Fruit has been fitted without the second SIM card, then judges whether mobile terminal is connected with the 2nd WLAN, and the 2nd WLAN is obtained if connection Password the account and password of application program are encrypted.
When is once logging in, first determine whether whether mobile terminal is provided with the first SIM card, if the first SIM card, The account and password of encryption are decrypted the first card number and the first IMSI for then obtaining the first SIM card, if plain code and private mark It is correct, then the first SIM card and the second SIM card are judged as the same card, are directly logged in without being manually entered identifying code and are applied journey Sequence, if the whole mistakes of plain code and private mark, or plain code is correct, private mark mistake when, then judge the first SIM card and the second SIM card It is not same SIM card, i.e. first network signal source is different with the second network signal source, it is necessary to which user is manually entered checking Code (plain code) is verified, then can just be logged in, after login, can be with the first card number of the first SIM card and the first IMSI weights New account and password to application program is encrypted.If being fitted without the first SIM card, but with currently used first WLAN connection networks, then the account and password of above-mentioned encryption are decrypted the password for then obtaining the first WLAN, if decryption Success, then direct login application program, if decryption fails, is manually entered the 2nd WLAN password, is verified, and step on Record, while above-mentioned account and password are encrypted with the first WLAN password.
Further, when logging in first time, mobile terminal is fitted without the second SIM card, uses the 2nd WLAN password Account and password to application program are encrypted;When logging in again, although mobile terminal installs the first SIM card, Still can preferably the first WLAN password the account and password of application program are decrypted, directly stepped on if successful decryption Record, at this point it is possible to according to default rule, choose whether the first card number and the first IMSI using the first SIM card to applying journey The account and password of sequence are encrypted.
Further, when logging in first time, mobile terminal installs the second SIM card, uses the second card number of the second SIM card The account and password of application program are encrypted with the 2nd IMSI;When logging on, mobile terminal is fitted without the first SIM Card, but the first WLAN of connection, at this time, it may be necessary to the card number checking of the first SIM card is manually entered, then using the close of the first WLAN Code carries out re-encrypted to the account and password of application program.
The protection device of the application program of the embodiment of the present invention, when logging in the application program using memory account and password, Judge whether first network signal source is identical with the second network signal source of a preceding network data, only identical situation It is lower just otherwise to need user's input validation code just to log in automated log on success, to prevent stranger from using user's Mobile terminal logs in the application program for setting memory account and password, may effectively prevent the privacy leakage of user, and money Loss etc..
A kind of mobile terminal, including processor 1180 and memory 1120 are also provided in reference picture 13, the embodiment of the present invention; Above-mentioned memory 1120 is used for the guarantor for storing the application program for the above-mentioned any embodiment of protection device execution for supporting application program The program of maintaining method;Above-mentioned processor 1180 is configurable for performing the program stored in the memory 1120.
For convenience of description, the part related to the embodiment of the present invention is illustrate only, particular technique details is not disclosed, please With reference to present invention method part.The mobile terminal can be to include mobile phone, tablet personal computer, PDA (Personal DigitalAssistant, personal digital assistant), POS (Point ofSales, point-of-sale terminal), any terminal such as vehicle-mounted computer Equipment, so that mobile terminal is mobile phone as an example:
Figure 13 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng Figure 13 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1110, memory 1120, input block 1130, display Unit 1140, sensor 1150, voicefrequency circuit 1160, Wireless Fidelity (wireless fidelity, WiFi) module 1170, place Manage the part such as device 1180 and power supply 1190.It will be understood by those skilled in the art that the handset structure shown in Figure 13 not structure The restriction of paired mobile phone, can include than illustrating more or less parts, either combine some parts or different parts Arrangement.
Each component parts of mobile phone is specifically introduced with reference to Figure 13:
Be typically provided with SIM card in RF circuits 1110, available for receive and send messages or communication process in, the reception of signal and hair Send, especially, after the downlink information of base station is received, handled to processor 1180;In addition, being sent to up data are designed Base station.Generally, RF circuits 1110 including but not limited to antenna, at least one amplifier, transceiver, coupler, low noise is put Big device (LowNoiseAmplifier, LNA), duplexer etc..In addition, RF circuits 1110 can also pass through radio communication and network With other equipment communication.Above-mentioned radio communication can use any communication standard or agreement, include but is not limited to the whole world mobile logical News system (Global System ofMobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code DivisionMultipleAccess, CDMA), broadband code Divide multiple access (Wideband Code Division MultipleAccess, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (ShortMessaging Service, SMS) etc..
Memory 1120 can be used for storage software program and module, and processor 1180 is stored in memory by operation 1120 software program and module, so as to perform various function application and the data processing of mobile phone.Memory 1120 can be led To include storing program area and storage data field, wherein, storing program area can be needed for storage program area, at least one function Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone Data (such as voice data, phone directory etc.) of establishment etc..In addition, memory 1120 can include high random access storage Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are solid State memory device.
Input block 1130 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 1130 may include contact panel 1131 and other inputs Equipment 1132.Contact panel 1131, also referred to as touch-screen, collect touch operation (such as user of the user on or near it Use the behaviour of any suitable object such as finger, stylus or annex on contact panel 1131 or near contact panel 1131 Make), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 1131 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 1180, and the order sent of reception processing device 1180 and can be performed.In addition, Contact panel 1131 can be realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except touch surface Plate 1131, input block 1130 can also include other input equipments 1132.Specifically, other input equipments 1132 can include But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. It is one or more.
Display unit 1140 can be used for each of the information that is inputted by user of display or the information for being supplied to user and mobile phone Plant menu.Display unit 1140 may include display panel 1141, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 1141.Further, contact panel 1131 can cover display panel 1141, when contact panel 1131 is detected To after the touch operation on or near it, processor 1180 is sent to determine the type of touch event, with preprocessor 1180 provide corresponding visual output according to the type of touch event on display panel 1141.Although in fig. 13, touch surface Plate 1131 and display panel 1141 are input and the input function that mobile phone is realized as two independent parts, but some , can be by contact panel 1131 and the input that is integrated and realizing mobile phone of display panel 1141 and output function in embodiment.
Mobile phone may also include at least one sensor 1150, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 1141, proximity transducer can close display panel when mobile phone is moved in one's ear 1141 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) and add The size of speed, can detect that size and the direction of gravity when static, application (the such as horizontal/vertical screen available for identification mobile phone posture Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 1160, loudspeaker 1161, microphone 1162 can provide the COBBAIF between user and mobile phone.Audio Electric signal after the voice data received conversion can be transferred to loudspeaker 1161, is changed by loudspeaker 1161 by circuit 1160 Exported for voice signal;On the other hand, the voice signal of collection is converted to electric signal by microphone 1162, by voicefrequency circuit 1160 Voice data is converted to after reception, then after voice data output processor 1180 is handled, through RF circuits 1110 to be sent to ratio Such as another mobile phone, or voice data is exported to memory 1120 so as to further processing.
WiFi belongs to short range wireless transmission technology, for connecting wlan network, and mobile phone can be with by WiFi module 1170 Help user to send and receive e-mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet Access.Although Figure 13 shows WiFi module 1170, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, complete It can be omitted as needed in the essential scope for do not change invention entirely.
Processor 1180 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, By operation or perform and be stored in software program and/or module in memory 1120, and call and be stored in memory 1120 Interior data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 1180 may include one or more processing units;It is preferred that, processor 1180 can integrated application processor and modulation /demodulation processing Device, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is mainly located Manage radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1180.
Mobile phone also includes the power supply 1190 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply Management system and processor 1180 are logically contiguous, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
Reference picture 13, in embodiments of the present invention, the processor 1180 included by the mobile terminal also have following functions:
Obtain the first network signal source of current network data;
Judge whether the first network signal source is identical with the second network signal source of a preceding network data;
If identical, the application program is directly logged in;Otherwise, obtain user input with the second network signal source pair The identifying code answered logs in the application program.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, such as multiple units or component Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces Close or communicate to connect, can be electrical, machinery or other forms.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
Can be with one of ordinary skill in the art will appreciate that realizing that all or part of step in above-described embodiment method is The hardware of correlation is instructed to complete by program, described program can be stored in a kind of computer-readable recording medium, on It can be read-only storage, disk or CD etc. to state the storage medium mentioned.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize Equivalent structure or equivalent flow conversion that description of the invention and accompanying drawing content are made, or directly or indirectly it is used in other correlations Technical field, be included within the scope of the present invention.
The embodiment of the present invention is also provided:
A1, a kind of guard method of application program, when mobile terminal logs in the application program using memory account and password, Including:
Obtain the first network signal source of current network data;
Judge whether the first network signal source is identical with the second network signal source of a preceding network data;
If identical, the application program is directly logged in;Otherwise, obtain user input with the second network signal source pair The identifying code answered logs in the application program.
A2, application program according to A1 guard method, the first network signal source and the second network signal The data source path in source is identical.
A3, application program according to A2 guard method, the first network signal of the acquisition current network data Before the step of source, including:
The account and password are encrypted according to the specified parameter that second network signal is originated, wherein described refer to Determine to include the identifying code in parameter.
A4, application program according to A3 guard method, the first network signal source and the second network signal Source includes SIM card or WLAN, wherein, different SIM cards are originated for different network signals, and different WLAN is different net Network signal is originated.
A5, application program according to A4 guard method, when second network signal source is the second SIM card When, the account and password are encrypted the specified parameter originated according to second network signal, wherein described refer to The step of determining to include the identifying code in parameter, including:
The second card number of second SIM card is obtained, the account and password are encrypted using second card number, Wherein, the second card number is the identifying code.
A6, application program according to A5 guard method, it is described according to specifying that second network signal is originated The step of account and password are encrypted parameter, in addition to:
The 2nd IMSI of second SIM card is obtained, the account and password are encrypted using the 2nd IMSI, The 2nd IMSI formation private mark.
A7, application program according to A6 guard method, the judgement first network signal source with it is previous Secondary network data the second network signal source whether identical step, including:
Judge whether the first network signal source is the first SIM card;
If so, then obtaining the card number of first SIM card, and judge the card number and the identifying code of first SIM card Whether match;
If the card number of first SIM card is matched with the identifying code, judge the first IMSI of first SIM card with Whether the private mark matches;
If the first IMSI is matched with the checking private mark, the first network signal source and second network are judged Signal source is identical.
A8, application program according to A4 guard method, it is described when second network signal source is second During WLAN, the account and password are encrypted the specified parameter originated according to second network signal, wherein institute The step of including the identifying code in specified parameter is stated, including:
The WLAN passwords of the 2nd WLAN are obtained, the account and password are encrypted using the WLAN passwords, Wherein, WLAN passwords are the identifying code.
A9, application program according to A8 guard method, the judgement first network signal source with it is previous Secondary network data the second network signal source whether identical step, including:
Judge whether the first network signal source is the first WLAN;
If so, then obtain the password of the first WLAN, and judge that the password of the first WLAN is with the identifying code No matching;
If the password of the first WLAN is matched with the identifying code, judge first network signal source with it is described Second network signal source is identical.
A10, application program according to A4 guard method, the determination methods in the second network signal source, bag Include:
Judge whether the mobile terminal is provided with SIM card;
If being provided with the SIM card, selection SIM card is originated for the second network data;
If not installing the SIM card, judge whether the mobile terminal connects WLAN;
If connecting WLAN, selection WLAN originates for the second network data.
B1, a kind of protection device of application program, when mobile terminal logs in the application program using memory account and password, Including:
Acquiring unit, the first network signal for obtaining current network data is originated;
Judging unit, for judging that the first network signal source and the second network signal of a preceding network data are come Whether source is identical;
Login authentication unit, if it is identical with the second network data source to be originated for first network signal, is directly logged in The application program;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application journey Sequence.
B2, application program according to B1 protection device, the first network signal source and the second network signal The data source path in source is identical.
B3, application program according to B2 protection device, in addition to:
Ciphering unit, the specified parameter for being originated according to second network signal is added to the account and password It is close, wherein including the identifying code in the specified parameter.
B4, application program according to B3 protection device, the first network signal source and the second network signal Source includes SIM card or WLAN, wherein, different SIM cards are originated for different network signals, and different WLAN is different net Network signal is originated.
B5, application program according to B4 protection device, when second network signal source is the second SIM card When, the ciphering unit, including:
Card number encrypting module, the second card number for obtaining second SIM card, using second card number to the account Family and password are encrypted, wherein, the second card number is the identifying code.
B6, application program according to B5 protection device, the ciphering unit also include:
IMSI encrypting modules, the 2nd IMSI for obtaining second SIM card, using the 2nd IMSI to the account Family and password are encrypted, the 2nd IMSI formation private mark.
B7, application program according to B6 protection device, the judging unit, including:
First SIM card judge module, for judging whether the first network signal source is the first SIM card;
Second SIM card judge module, if being the first SIM card for first network signal source, obtains described the The card number of one SIM card, and judge whether the card number of first SIM card matches with the identifying code;
3rd SIM card judge module, if the card number for first SIM card is matched with the identifying code, judges institute Whether the first IMSI for stating the first SIM card matches with the private mark;
SIM card determination module, if being matched for the first IMSI with the checking private mark, judges the first network signal Source is identical with the second network signal source.
B8, application program according to B4 protection device, it is described when second network signal source is second During WLAN, the ciphering unit, including:
WLAN encrypting modules, the WLAN passwords for obtaining the 2nd WLAN, using the WLAN passwords to the account Family and password are encrypted, wherein, WLAN passwords are the identifying code.
B9, application program according to B8 protection device, the judging unit, including:
First WLAN judge modules, for judging whether the first network signal source is the first WLAN;
2nd WLAN judge modules, if being the first WLAN for first network signal source, obtain the first WLAN Password, and judge whether the password of the first WLAN matches with the identifying code;
WLAN determination modules, if the password for the first WLAN is matched with the identifying code, judge described first Network signal source is identical with the second network signal source.
B10, application program according to B4 protection device, the judging unit, including:
Judge module is installed, for judging whether the mobile terminal is provided with SIM card;
First determination module, if for being provided with the SIM card, selection SIM card is originated for the second network data;
Connection judgment module, if for not installing the SIM card, judging whether the mobile terminal connects WLAN;
Second determination module, if connecting WLAN for the mobile terminal, selection WLAN originates for the second network data.
C1, a kind of mobile terminal, including processor and memory;
The memory, which is used to store, to be supported any one of the above-mentioned A1 to A10 of protection device execution of application program The program of the guard method of application program;
The processor is configurable for performing the program stored in the memory.

Claims (10)

1. a kind of guard method of application program, when mobile terminal logs in the application program using memory account and password, it is special Levy and be, including:
Obtain the first network signal source of current network data;
Judge whether the first network signal source is identical with the second network signal source of a preceding network data;
If identical, the application program is directly logged in;Otherwise, the corresponding with the second network signal source of user's input is obtained Identifying code logs in the application program.
2. the guard method of application program according to claim 1, it is characterised in that the first network signal source and The data source path in the second network signal source is identical.
3. the guard method of application program according to claim 2, it is characterised in that the acquisition current network data Before the step of first network signal is originated, including:
The account and password are encrypted according to the specified parameter that second network signal is originated, wherein the specified ginseng Include the identifying code in number.
4. the guard method of application program according to claim 3, it is characterised in that the first network signal source and Second network signal source includes SIM card or WLAN, wherein, different SIM cards are originated for different network signals, different WLAN originates for different network signals.
5. the guard method of application program according to claim 4, it is characterised in that when second network signal source During for the second SIM card, the account and password are encrypted the specified parameter originated according to second network signal, The step of including the identifying code in wherein described specified parameter, including:
The second card number of second SIM card is obtained, the account and password are encrypted using second card number, its In, the second card number is the identifying code.
6. the guard method of application program according to claim 5, it is characterised in that described to be believed according to second network The specified parameter in number source is the step of the account and password are encrypted, in addition to:
The 2nd IMSI of second SIM card is obtained, the account and password are encrypted using the 2nd IMSI, it is described 2nd IMSI formation private marks.
7. the guard method of application program according to claim 6, it is characterised in that the judgement first network letter Number source and the second network signal of preceding network data source whether identical step, including:
Judge whether the first network signal source is the first SIM card;
If so, then obtain the card number of first SIM card, and judge whether are the card number of first SIM card and the identifying code Matching;
If the card number of first SIM card is matched with the identifying code, judge the first IMSI of first SIM card with it is described Whether private mark matches;
If the first IMSI is matched with the checking private mark, the first network signal source and second network signal are judged Source is identical.
8. the guard method of application program according to claim 4, it is characterised in that described to work as second network signal When originating as two WLAN, the specified parameter originated according to second network signal is added to the account and password It is close, wherein the step of including the identifying code in the specified parameter, including:
The WLAN passwords of the 2nd WLAN are obtained, the account and password are encrypted using the WLAN passwords, wherein, WLAN passwords are the identifying code.
9. a kind of protection device of application program, when mobile terminal logs in the application program using memory account and password, it is special Levy and be, including:
Acquiring unit, the first network signal for obtaining current network data is originated;
Judging unit, be for judging that second network signal in the first network signal source and a preceding network data is originated It is no identical;
Login authentication unit, if it is identical with the second network data source to be originated for first network signal, is directly logged in described Application program;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application program.
10. a kind of mobile terminal, it is characterised in that including processor and memory;
The memory, which is used to store, supports answering any one of the protection device perform claim requirement 1 to 8 of application program With the program of the guard method of program;
The processor is configurable for performing the program stored in the memory.
CN201710233802.0A 2017-04-11 2017-04-11 The guard method of mobile terminal and its application program and device Pending CN107070915A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710233802.0A CN107070915A (en) 2017-04-11 2017-04-11 The guard method of mobile terminal and its application program and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710233802.0A CN107070915A (en) 2017-04-11 2017-04-11 The guard method of mobile terminal and its application program and device

Publications (1)

Publication Number Publication Date
CN107070915A true CN107070915A (en) 2017-08-18

Family

ID=59601889

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710233802.0A Pending CN107070915A (en) 2017-04-11 2017-04-11 The guard method of mobile terminal and its application program and device

Country Status (1)

Country Link
CN (1) CN107070915A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107229846A (en) * 2017-05-31 2017-10-03 奇酷互联网络科技(深圳)有限公司 Information protecting method, device, mobile terminal and read/write memory medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015043172A1 (en) * 2013-09-27 2015-04-02 惠州Tcl移动通信有限公司 Method and system for automatically switching user modes by identifying imsis
CN104883341A (en) * 2014-02-28 2015-09-02 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN105281906A (en) * 2014-07-04 2016-01-27 腾讯科技(深圳)有限公司 Safety authentication method and device
US9325696B1 (en) * 2012-01-31 2016-04-26 Google Inc. System and method for authenticating to a participating website using locally stored credentials
CN106470268A (en) * 2015-08-20 2017-03-01 腾讯科技(深圳)有限公司 A kind of method and apparatus of antitheft mobile phone

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9325696B1 (en) * 2012-01-31 2016-04-26 Google Inc. System and method for authenticating to a participating website using locally stored credentials
WO2015043172A1 (en) * 2013-09-27 2015-04-02 惠州Tcl移动通信有限公司 Method and system for automatically switching user modes by identifying imsis
CN104883341A (en) * 2014-02-28 2015-09-02 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN105281906A (en) * 2014-07-04 2016-01-27 腾讯科技(深圳)有限公司 Safety authentication method and device
CN106470268A (en) * 2015-08-20 2017-03-01 腾讯科技(深圳)有限公司 A kind of method and apparatus of antitheft mobile phone

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107229846A (en) * 2017-05-31 2017-10-03 奇酷互联网络科技(深圳)有限公司 Information protecting method, device, mobile terminal and read/write memory medium

Similar Documents

Publication Publication Date Title
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
CN108574940B (en) Incoming call processing method and device
CN107437009B (en) Authority control method and related product
CN106331370B (en) A kind of data transmission method and terminal device
CN104426919B (en) Page sharing method, apparatus and system
JP2018537027A (en) Service processing method, device and system
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN106412311B (en) A kind of data transmission method and terminal device
CN104915119B (en) Terminal desktop icon method of adjustment and device
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN107071775A (en) Mobile terminal and its method and apparatus for redirecting access base station
CN107451450B (en) Biometric identification method and related product
CN106920307A (en) Gate inhibition's open method, device and mobile terminal
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN109102297A (en) A kind of voidable method of payment and device
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN106130735A (en) The processing method of a kind of communication information, device and mobile terminal
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN107229846A (en) Information protecting method, device, mobile terminal and read/write memory medium
CN107480495B (en) Unlocking method of mobile terminal and related product
CN107046595A (en) Announcement information processing method, device and mobile terminal
CN107347059A (en) The method and detection terminal of a kind of Hole Detection
CN106909854A (en) Picture management method, device and mobile terminal
CN108984231A (en) A kind of login method and mobile terminal of application program account
CN107102913A (en) Data back up method, device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170818