CN107070915A - The guard method of mobile terminal and its application program and device - Google Patents
The guard method of mobile terminal and its application program and device Download PDFInfo
- Publication number
- CN107070915A CN107070915A CN201710233802.0A CN201710233802A CN107070915A CN 107070915 A CN107070915 A CN 107070915A CN 201710233802 A CN201710233802 A CN 201710233802A CN 107070915 A CN107070915 A CN 107070915A
- Authority
- CN
- China
- Prior art keywords
- network signal
- application program
- signal source
- sim card
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
Present invention is disclosed the guard method of a kind of mobile terminal and its application program and device, wherein, when mobile terminal logs in the application program using memory account and password, method includes:Obtain the first network signal source of current network data;Judge whether the first network signal source is identical with the second network signal source of a preceding network data;If identical, the application program is directly logged in;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application program.The mobile terminal of the present invention and its guard method and the device of application program; when mobile terminal logs in the application program using memory account and password; the application program of memory account and password can be set to prevent stranger from being logged in using the mobile terminal of user; may effectively prevent the privacy leakage of user, and money loss etc..
Description
Technical field
The present invention relates to the safe handling field of the application program of mobile terminal, a kind of mobile terminal is especially related to
And its guard method and the device of application program.
Background technology
The application programs such as social activity, finance on mobile terminals are installed on startup, it is necessary to input account and password, can be with
Effectively prevent other people from arbitrarily logging in, to improve the safety of application program when in use.Such as, the application program such as bank, user is not
It can for a long time log in and browse, log in needs to input password every time, and user can produce sensation safe to use, therefore will not dislike
Abandon the cumbersome action of input password;But, the application program that such as QQ, wechat user commonly use, log in needs to input password every time,
User will feel cumbersome, therefore, and developer provides a kind of function, as remember account and password, logged in next time
During application program, Auto-writing account and password are logged in, and setting is automatically entered after the function of account and password, as long as
Same mobile terminal, when logging in next time, can automatically enter account and password etc., directly log in.Automatically enter account and
, there is application risk in password, such as, mobile terminal is picked up by other people, and the people of pickup mobile terminal can log in setting memory account
Family and the application program of password, may make privacy leakage, monetary loss of user etc..
The content of the invention
The main object of the present invention for provide it is a kind of improve application program for mobile terminal using safety mobile terminal and its
Application program guard method and device.
In order to realize foregoing invention purpose, the present invention proposes a kind of guard method of application program, and mobile terminal, which is logged in, to be made
During with memory account and the application program of password, including:
Obtain the first network signal source of current network data;
Judge whether the first network signal source is identical with the second network signal source of a preceding network data;
If identical, the application program is directly logged in;Otherwise, obtain user input with the second network signal source pair
The identifying code answered logs in the application program.
Further, the first network signal source is identical with the data source path that the second network signal is originated.
Further, before the step of first network signal for obtaining current network data is originated, including:
The account and password are encrypted according to the specified parameter that second network signal is originated, wherein described refer to
Determine to include the identifying code in parameter.
Further, the first network signal source and the second network signal source include SIM card or WLAN, wherein,
Different SIM cards is originated for different network signals, and different WLAN originate for different network signals.
Further, it is described according to second network signal when second network signal source is the second SIM card
The account and password are encrypted the specified parameter in source, wherein including the step of the identifying code in the specified parameter
Suddenly, including:
The second card number of second SIM card is obtained, the account and password are encrypted using second card number,
Wherein, the second card number is the identifying code.
Further, the specified parameter originated according to second network signal is added to the account and password
Close step, in addition to:
The 2nd IMSI of second SIM card is obtained, the account and password are encrypted using the 2nd IMSI,
The 2nd IMSI formation private mark.
Further, it is described to judge that the first network signal source and the second network signal of a preceding network data come
The whether identical step in source, including:
Judge whether the first network signal source is the first SIM card;
If so, then obtaining the card number of first SIM card, and judge the card number and the identifying code of first SIM card
Whether match;
If the card number of first SIM card is matched with the identifying code, judge the first IMSI of first SIM card with
Whether the private mark matches;
If the first IMSI is matched with the checking private mark, the first network signal source and second network are judged
Signal source is identical.
Further, it is described when second network signal source is two WLAN, it is described according to second network
The account and password are encrypted the specified parameter in signal source, wherein including the identifying code in the specified parameter
The step of, including:
The WLAN passwords of the 2nd WLAN are obtained, the account and password are encrypted using the WLAN passwords,
Wherein, WLAN passwords are the identifying code.
The present invention also provides a kind of protection device of application program, mobile terminal log in using memory account and password should
When using program, including:
Acquiring unit, the first network signal for obtaining current network data is originated;
Judging unit, for judging that the first network signal source and the second network signal of a preceding network data are come
Whether source is identical;
Login authentication unit, if it is identical with the second network data source to be originated for first network signal, is directly logged in
The application program;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application journey
Sequence.
The embodiment of the present invention also provides a kind of mobile terminal, including processor and memory;
The memory is used to store the application program supported described in the protection device execution any of the above-described of application program
Guard method program;
The processor is configurable for performing the program stored in the memory.
The mobile terminal of the present invention and its guard method and the device of application program, mobile terminal are logged in using memory account
During with the application program of password, judge first network signal source and a preceding network data the second network signal source whether
It is identical, just it can otherwise need user's input validation code just to log in automated log on success only in the case of identical, to prevent
Only stranger logs in the application program for setting memory account and password using the mobile terminal of user, may effectively prevent user's
Privacy leakage, and money loss etc..
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the guard method of the application program of one embodiment of the invention;
Fig. 2 is the schematic flow sheet of the guard method of the application program of one embodiment of the invention;
Fig. 3 for one embodiment of the invention judgement first network signal source with second network signal originate whether phase
The schematic flow sheet of same method;
Whether Fig. 4 originates for the judgement first network signal source of another embodiment of the present invention with second network signal
The schematic flow sheet of identical method;
The schematic flow sheet for the determination methods that Fig. 5 originates for second network signal of one embodiment of the invention;
Fig. 6 is the structural schematic block diagram of the protection device of the application program of one embodiment of the invention;
Fig. 7 is the structural schematic block diagram of the protection device of the application program of one embodiment of the invention;
Fig. 8 is the structural schematic block diagram of the ciphering unit of one embodiment of the invention;
Fig. 9 is the structural schematic block diagram of the judging unit of one embodiment of the invention;
Figure 10 is the structural schematic block diagram of the ciphering unit of another embodiment of the present invention;
Figure 11 is the structural schematic block diagram of the judging unit of another embodiment of the present invention;
Figure 12 is the structural schematic block diagram of the judging unit of one embodiment of the invention;
Figure 13 is the structural schematic block diagram of the mobile terminal of one embodiment of the invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one
It is individual ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges
Diction " comprising " refer to there is the feature, integer, step, operation, element and/or establishment, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, establishment and/or their group.Wording used herein " and/
Or " include one or more associated wholes or any cell for listing item and all combine.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology), with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also
Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art
The consistent meaning of meaning, and unless by specific definitions as here, otherwise will not use idealization or excessively formal implication
To explain.
Those skilled in the art of the present technique are appreciated that mobile terminal here refers to smart mobile phone, tablet personal computer, intelligent hand
The electronic equipments such as table.
Reference picture 1, the embodiment of the present invention provides a kind of guard method of application program, and mobile terminal is logged in using memory account
During the application program of family and password, including step:
S1, the first network signal source for obtaining current network data;
S2, judge first network signal source and a preceding network data the second network signal originate whether phase
Together;
If S3, identical, the application program is directly logged in;Otherwise, coming with the second network signal for user's input is obtained
The corresponding identifying code in source logs in the application program.
Above-mentioned mobile terminal refers to that such as smart mobile phone, tablet personal computer, intelligent watch can install the intelligence of application program
Electronic equipment.
As described in above-mentioned step S1, the first network data source of above-mentioned current network data refers to that mobile terminal is currently stepped on
The network environment that can be normally used when recording above-mentioned application program, be its with network interaction when the data source used.Such as, when
Preceding data interaction is can only to block to complete by SIM (Subscriber Identification Module, client identification module)
, then it is considered that now first network signal source is SIM card;Current data can only pass through WLAN when interacting
(Wireless LocalAreaNetworks, WLAN) is completed, then it is considered that now first network signal
Source is WLAN;When residing network environment, both data interaction can be realized by SIM card, and data can also be realized by WLAN
Interaction, then can be originated according to the selection first network signal that is set for of user, such as, mobile terminal is smart mobile phone,
It is set as that the network environment residing for is WLAN environment, then preferential attachment WLAN, now, if setting SIM card in smart mobile phone,
And SIM card is when can also connect network, first network signal can select WLAN to be first network letter according to default priority
Number source etc..
As described in above-mentioned step S2, the second network signal source of an above-mentioned preceding network data refers to mobile terminal upper
Once log in network signal source used during above-mentioned application program.Such as, the mobile terminal last time logs in above-mentioned application program
Shi Liyong SIM cards carry out data interaction, then the second network signal source is SIM card.Judge first network signal source with
Whether identical method is many in second network signal source, such as passes through IMSI (the mobile use in the world of SIM card number and/or SIM card
Family identification code, IMSI:International Mobile Subscriber IdentificationNumber) judged,
It can also be judged by WLAN addresses and/or password etc..
As described in above-mentioned step S3, if first network signal source is identical with the second network signal source, then can be with
Judge that user is same person, or people known to user is in the mobile terminal using user, it is possible to directly using note
Recall the above-mentioned application program of the function automated log on of account and password.If first network signal is originated and the second network signal source
Different, then to can be determined that, the mobile terminal of user may be used by other strangers to be come, it is necessary to input with the second network signal
The corresponding identifying code in source, when only identifying code is correct, can just log in above-mentioned application program.Above-mentioned identifying code is according to second
One group of related data of network signal source, such as, and SIM card number etc., if first network signal source and the second network signal
Source is identical, then their SIM card number is identical, i.e., identifying code can be directly obtained.If first network signal originate and
Second network signal source is different, then their SIM card difference, then illustrates that current first network signal source changes
Become, if logining memory account and the application program of password, need the SIM card number for inputting the second network signal source to be tested
Card, being proved to be successful can just login successfully.
In the present embodiment, above-mentioned first network signal source and the second network signal source include SIM card or WLAN, its
In, different SIM cards are originated for different network signals, and different WLAN originate for different network signals.Such as, data are come
Source is all SIM card, but whether same SIM card, then also will be considered that network data source is different.
In the present embodiment, above-mentioned first network signal source is identical with the data source path that the second network signal is originated.
Such as, when first network data source is SIM card, then the second network signal of selection source is equally SIM card;First network number
During according to source for WLAN, then the second network signal of selection source is equally WLAN cards.That is, determining when previous login should
Behind the first network signal source used in program, it is determined that the second network signal source under same network signal source.
In other embodiments, the data source path that first network signal source and the second network signal are originated can also
Difference, such as, first network data source are SIM card, and the second network signal source is WLAN, then can directly judge two
Person is different.
In reference picture 2, the present embodiment, the step S1 in the first network signals of above-mentioned acquisition current network data source it
Before, including:
The account and password are encrypted for S11, the specified parameter originated according to second network signal, wherein institute
State and include the identifying code in specified parameter.
As described in above-mentioned step S11, above-mentioned specified parameter is generally that the second network signal source is carried, unique, no
The data that can change, such as, and card number, IMSI of SIM card etc..Above-mentioned identifying code is such as SIM card card number, WLAN passwords.
In one embodiment, when second network signal source is the second SIM card, according to the second network signal
The account and password are encrypted the specified parameter in source, wherein including the step of the identifying code in the specified parameter
Rapid S11, including:
S111, the second card number for obtaining second SIM card, are carried out using second card number to the account and password
Encryption, wherein, the second card number is the identifying code.
As described in above-mentioned step S111, that is, the second card number of the second SIM card is read, and by the second card number to application program
Account and password be encrypted, obtain a group encryption data, encryption rule operator can be configured according to demand, herein
Do not repeat.When logging on, the first card number of current first SIM card is got first, then using the first card number according to right
Answer the decryption rule of above-mentioned encryption rule that above-mentioned encryption data is decrypted, if successful decryption, illustrate that first network is believed
Number source is identical with the second network signal source, can log in above-mentioned application program, if decryption failure, illustrates first network
Signal is originated to originate with the second network signal and differed, it is necessary to which user is manually entered above-mentioned second card number is decrypted.
Further, the above-mentioned specified parameter originated according to second network signal is added to the account and password
Close step S11, in addition to:
S112, the 2nd IMSI for obtaining second SIM card, are carried out using the 2nd IMSI to the account and password
Encryption, the 2nd IMSI formation private mark.
As described in above-mentioned step S112, i.e., for the 2nd IMSI for reading the second SIM card, and by the 2nd IMSI to application
The account and password of program are encrypted, and obtain a group encryption data, and encryption rule operator can be configured according to demand,
It will not be described here.When logging on, the first IMSI of current first SIM card is got first, is then added according to correspondence is above-mentioned
Above-mentioned encryption data is decrypted close regular decryption rule, if successful decryption, illustrate first network signal source with
Second network signal source is identical, can log in above-mentioned application program, if decryption failure, illustrates that first network signal is originated
Differed with the second network signal source, it is necessary to which user is manually entered above-mentioned second card number is decrypted.That is, when second
When SIM card is provided with vice card, and first network signal source is when being above-mentioned vice card, although the vice card card number got can pair plus
Ciphertext data is decrypted, but because the IMSI of vice card is different from above-mentioned 2nd IMSI, then illustrates above-mentioned vice card and the 2nd SIM's
Signal source is different, equally can not directly log in above-mentioned application program.
Reference picture 3, further, the above-mentioned judgement first network signal source and the second net of a preceding network data
Network signal source whether identical step S2, including:
S211, judge whether first network signal source is the first SIM card;
S212, if so, then obtain the card number of first SIM card, and judge that the card number of first SIM card is tested with described
Whether card code matches;
If S213, the card number of first SIM card are matched with the identifying code, the first of first SIM card is judged
Whether IMSI matches with the private mark;
If S214, the first IMSI matchs with the checking private mark, first network signal source and described the are judged
Two network signals source is identical.
As described in above-mentioned step S211, S212, S213, S214, dual criterion is as set, application is logged in improve
The security of program, when the card number of the first SIM card be verified by after, now the first SIM card is probably the pair of the second SIM card
Card, so not interfering with login, can have potential safety hazard to privacy, property of the user of the first SIM card etc..So, pass through
After the card number decryption of one SIM card, in addition it is also necessary to which second is decrypted, i.e., be decrypted with the IMSI of the first SIM card, because main card and pair
The IMSI of card is different, thus using the second SIM card vice card when, equally can not with directly log in, raising privacy of user
With the safety of property.
In another embodiment, it is above-mentioned according to second net when above-mentioned second network signal source is two WLAN
The account and password are encrypted the specified parameter in network signal source, wherein including the checking in the specified parameter
The step S11 of code, including:
S113, the WLAN passwords for obtaining the 2nd WLAN, are carried out using the WLAN passwords to the account and password
Encryption, wherein, WLAN passwords are the identifying code.
As described in above-mentioned step S113, that is, the 2nd WLAN WLAN passwords are read, and by WLAN passwords to application program
Account and password be encrypted, obtain a group encryption data, encryption rule operator can be configured according to demand, herein
Do not repeat.When logging on, the first WLAN currently connected password is got first, is then advised according to the above-mentioned encryption of correspondence
Above-mentioned encryption data is decrypted decryption rule then, if successful decryption, illustrates first network signal source and second
Network signal source is identical, can log in above-mentioned application program, if decryption failure, illustrates first network signal source and the
Two network signals source is differed, it is necessary to which user is manually entered above-mentioned second card number is decrypted.
Reference picture 4, further, the above-mentioned judgement first network signal source and the second net of a preceding network data
Network signal source whether identical step S2, including:
S221, judge whether first network signal source is the first WLAN;
S222, if so, then obtain the password of the first WLAN, and judge the password of the first WLAN and the checking
Whether code matches;
If S223, the password of the first WLAN are matched with the identifying code, the first network signal source is judged
It is identical with the second network signal source.
As described in above-mentioned step S221, S222, S223, as verify the first WLAN password whether with previous second
WLAN password is identical, if identical, judges that first network signal source is identical with the second network signal source, can be with
Directly log in above-mentioned application program;Otherwise, it is necessary to be manually entered the 2nd WLAN password, above-mentioned application journey then can just be logged in
Sequence.
In reference picture 5, the present embodiment, the determination methods in above-mentioned second network signal source, including:
S231, judge whether the mobile terminal is provided with SIM card;
If S232, being provided with the SIM card, selection SIM card is the second network data source;
If S233, not installing the SIM card, judge whether the mobile terminal connects WLAN;
If S234, connection WLAN, selection WLAN are the second network data source.
As described in above-mentioned step S231, S232, S233, S234, if mobile terminal is provided with SIM card, preferred SIM card
Originated for the second network data, because the corresponding parameter of SIM card can be SIM card card number and IMSI, jointly to application program
Logon account and password are encrypted, and can also carry out using cooperatively for plain code and private mark, improve the safety of login application program
Property;If mobile terminal is fitted without SIM card, judge whether to connect WLAN, if connection, WLAN is the second network data
Source.In other embodiments, SIM card and WLAN priority can also be exchanged, specifically can be according to use habit
Deng being set..
In one embodiment, the application program on mobile terminal is logged in using memory account and password.When
When once logging in, judge whether mobile terminal is provided with the second SIM card, if so, then obtain the second SIM card the second card number and
The account and password of application program are encrypted 2nd IMSI, wherein it is private mark that the second card number, which is plain code, the 2nd IMSI,;If
The second SIM card has been fitted without, then has judged whether mobile terminal is connected with the 2nd WLAN, has obtained the 2nd WLAN's if connection
The account and password of application program are encrypted password.
When is once logging in, first determine whether whether mobile terminal is provided with the first SIM card, if the first SIM card,
The account and password of encryption are decrypted the first card number and the first IMSI for then obtaining the first SIM card, if plain code and private mark
It is correct, then the first SIM card and the second SIM card are judged as the same card, are directly logged in without being manually entered identifying code and are applied journey
Sequence, if the whole mistakes of plain code and private mark, or plain code is correct, private mark mistake when, then judge the first SIM card and the second SIM card
It is not same SIM card, i.e. first network signal source is different with the second network signal source, it is necessary to which user is manually entered checking
Code (plain code) is verified, then can just be logged in, after login, can be with the first card number of the first SIM card and the first IMSI weights
New account and password to application program is encrypted.If being fitted without the first SIM card, but with currently used first
WLAN connection networks, then the account and password of above-mentioned encryption are decrypted the password for then obtaining the first WLAN, if decryption
Success, then direct login application program, if decryption fails, is manually entered the 2nd WLAN password, is verified, and step on
Record, while above-mentioned account and password are encrypted with the first WLAN password.
Further, when logging in first time, mobile terminal is fitted without the second SIM card, uses the 2nd WLAN password
Account and password to application program are encrypted;When logging in again, although mobile terminal installs the first SIM card,
Still can preferably the first WLAN password the account and password of application program are decrypted, directly stepped on if successful decryption
Record, at this point it is possible to according to default rule, choose whether the first card number and the first IMSI using the first SIM card to applying journey
The account and password of sequence are encrypted.
Further, when logging in first time, mobile terminal installs the second SIM card, uses the second card number of the second SIM card
The account and password of application program are encrypted with the 2nd IMSI;When logging on, mobile terminal is fitted without the first SIM
Card, but the first WLAN of connection, at this time, it may be necessary to the card number checking of the first SIM card is manually entered, then using the close of the first WLAN
Code carries out re-encrypted to the account and password of application program.
The guard method of the application program of the embodiment of the present invention, when logging in the application program using memory account and password,
Judge whether first network signal source is identical with the second network signal source of a preceding network data, only identical situation
It is lower just otherwise to need user's input validation code just to log in automated log on success, to prevent stranger from using user's
Mobile terminal logs in the application program for setting memory account and password, may effectively prevent the privacy leakage of user, and money
Loss etc..
Reference picture 6, the present invention also provide a kind of protection device of application program, mobile terminal log in using memory account and
During the application program of password, said apparatus includes:
Acquiring unit 10, the first network signal for obtaining current network data is originated;
Judging unit 20, for judging the first network signal source and the second network signal of a preceding network data
Whether source is identical;
Login authentication unit 30, if it is identical with the second network data source to be originated for first network signal, is directly stepped on
Record the application program;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application
Program.
Above-mentioned mobile terminal refers to that such as smart mobile phone, tablet personal computer, intelligent watch can install the intelligence of application program
Electronic equipment.
Such as above-mentioned acquiring unit 10, the first network data source of above-mentioned current network data refers to that mobile terminal is currently stepped on
The network environment that can be normally used when recording above-mentioned application program, be its with network interaction when the data source used.Such as, when
Preceding data interaction can only be completed by SIM card, then it is considered that now first network signal source is SIM card;Currently
It can only be completed during data interaction by WLAN, then it is considered that now first network signal source is WLAN;When residing net
Network environment, both can realize data interaction by SIM card, can also realize data interaction by WLAN, then can according to
The selection first network signal that is set at family is originated, such as, mobile terminal is smart mobile phone, and it is set as when residing network rings
Border is WLAN environment, then preferential attachment WLAN, now, if SIM card were set in smart mobile phone, and SIM card could also connect net
During network, first network signal can select WLAN to be first network signal source etc. according to default priority.
Such as above-mentioned judging unit 20, the second network signal source of an above-mentioned preceding network data refers to mobile terminal upper
Once log in network signal source used during above-mentioned application program.Such as, the mobile terminal last time logs in above-mentioned application program
Shi Liyong SIM cards carry out data interaction, then the second network signal source is SIM card.Judge first network signal source with
Whether identical method is many in second network signal source, such as passes through IMSI (the mobile use in the world of SIM card number and/or SIM card
Family identification code, IMSI:International Mobile Subscriber IdentificationNumber) judged,
It can also be judged by WLAN addresses and/or password etc..
Such as above-mentioned login authentication unit 30, if first network signal source is identical with the second network signal source, then
Can be determined that user is same person, or people known to user is in the mobile terminal using user, it is possible to directly made
With memory account and the above-mentioned application program of function automated log on of password.If first network signal is originated and the second network signal
Source is different, then can be determined that, the mobile terminal of user may be used by other strangers to be believed, it is necessary to input with the second network
Number corresponding identifying code in source, when only identifying code is correct, can just log in above-mentioned application program.According to above-mentioned identifying code is
One group of related data of second network signal source, such as, and SIM card number etc., if first network signal source and the second network
Signal source is identical, then their SIM card number is identical, i.e., identifying code can be directly obtained.If first network signal comes
Source is different with the second network signal source, then their SIM card difference, then illustrates current first network signal source hair
It is raw to change, if logining memory account and the application program of password, need the SIM card number for inputting the second network signal source to enter
Row checking, being proved to be successful can just login successfully.
In the present embodiment, above-mentioned first network signal source and the second network signal source include SIM card or WLAN, its
In, different SIM cards are originated for different network signals, and different WLAN originate for different network signals.Such as, data are come
Source is all SIM card, but whether same SIM card, then also will be considered that network data source is different.
In the present embodiment, above-mentioned first network signal source is identical with the data source path that the second network signal is originated.
Such as, when first network data source is SIM card, then the second network signal of selection source is equally SIM card;First network number
During according to source for WLAN, then the second network signal of selection source is equally WLAN cards.That is, determining when previous login should
Behind the first network signal source used in program, it is determined that the second network signal source under same network signal source.
In other embodiments, the data source path that first network signal source and the second network signal are originated can also
Difference, such as, first network data source are SIM card, and the second network signal source is WLAN, then can directly judge two
Person is different.
In reference picture 7, the present embodiment, the protection device of above-mentioned application program also includes:
Ciphering unit 11, the specified parameter for being originated according to second network signal is carried out to the account and password
Encryption, wherein including the identifying code in the specified parameter.
Such as above-mentioned ciphering unit 11, above-mentioned specified parameter be generally it is that the second network signal source is carried, unique, will not
The data of change, such as, and card number, IMSI of SIM card etc..Above-mentioned identifying code is such as SIM card card number, WLAN passwords.
Reference picture 8, in one embodiment, when above-mentioned second network signal source is the second SIM card, above-mentioned encryption
Unit 11, including:
Card number encrypting module 111, the second card number for obtaining second SIM card, using second card number to institute
State account and password is encrypted, wherein, the second card number is the identifying code.
Such as above-mentioned card number encrypting module 111, i.e., for reading the second card number of the second SIM card, and pass through the second card number pair
The account and password of application program are encrypted, and obtain a group encryption data, and encryption rule operator can be carried out according to demand
Set, will not be described here.When logging on, the first card number of current first SIM card is got first, is then blocked using first
Number above-mentioned encryption data is decrypted according to the decryption rule of the above-mentioned encryption rule of correspondence, if successful decryption, illustrates the
One network signal source is identical with the second network signal source, can log in above-mentioned application program, if decryption failure, illustrates
First network signal is originated to originate with the second network signal and differed, it is necessary to which user is manually entered above-mentioned second card number is solved
It is close.
Further, above-mentioned ciphering unit 11 also includes:
IMSI encrypting modules 112, the 2nd IMSI for obtaining second SIM card, using the 2nd IMSI to institute
State account and password is encrypted, the 2nd IMSI formation private mark.
Such as above-mentioned IMSI encrypting modules 112, i.e., for the 2nd IMSI for reading the second SIM card, and by the 2nd IMSI pairs
The account and password of application program are encrypted, and obtain a group encryption data, and encryption rule operator can be carried out according to demand
Set, will not be described here.When logging on, the first IMSI of current first SIM card is got first, then according in correspondence
Above-mentioned encryption data is decrypted the decryption rule for stating encryption rule, if successful decryption, illustrates that first network signal comes
Source is identical with the second network signal source, can log in above-mentioned application program, if decryption failure, illustrates first network signal
Originate and differed, it is necessary to which user is manually entered above-mentioned second card number is decrypted with the second network signal in source.That is, working as
When second SIM card is provided with vice card, and first network signal source is when being above-mentioned vice card, although the vice card card number got can be with
Encryption data is decrypted, but because the IMSI of vice card is different from above-mentioned 2nd IMSI, then illustrates above-mentioned vice card and second
SIM signal source is different, equally can not directly log in above-mentioned application program.
Reference picture 9, further, above-mentioned judging unit 20, including:
First SIM card judge module 211, for judging whether the first network signal source is the first SIM card;
Second SIM card judge module 212, if being the first SIM card for first network signal source, obtains described
The card number of first SIM card, and judge whether the card number of first SIM card matches with the identifying code;
3rd SIM card judge module 213, if the card number for first SIM card is matched with the identifying code, judges
Whether the first IMSI of first SIM card matches with the private mark;
SIM card determination module 214, if being matched for the first IMSI with the checking private mark, judges the first network
Signal source is identical with the second network signal source.
That is, passing through above-mentioned first SIM card judge module 211, the second SIM card judge module 212, the 3rd SIM card
Judge module 213 and SIM card determination module 214 coordinate, and dual criterion are set, to improve the safety of login application program
Property, when the card number of the first SIM card be verified by after, now the first SIM card is probably the vice card of the second SIM card, so will not
Influence is logged in, and can have potential safety hazard to privacy, property of the user of the first SIM card etc..So, pass through the card of the first SIM card
Number decryption after, in addition it is also necessary to second decrypt, i.e., be decrypted with the IMSI of the first SIM card, because main card and the IMSI of vice card are
It is different, thus using the second SIM card vice card when, equally can not be with directly logging in, the peace of raising privacy of user and property
Entirely.
Reference picture 10, in another embodiment, when above-mentioned second network signal source is two WLAN, above-mentioned encryption list
Member 11, including:
WLAN encrypting modules 113, the WLAN passwords for obtaining the 2nd WLAN, using the WLAN passwords to described
Account and password are encrypted, wherein, WLAN passwords are the identifying code.
Such as above-mentioned WLAN encrypting modules 113, i.e., for the WLAN passwords for reading the 2nd WLAN, and pass through WLAN passwords correspondence
It is encrypted with the account and password of program, obtains a group encryption data, encryption rule operator can be set according to demand
Put, will not be described here.When logging on, the first WLAN currently connected password is got first, then according in correspondence
Above-mentioned encryption data is decrypted the decryption rule for stating encryption rule, if successful decryption, illustrates that first network signal comes
Source is identical with the second network signal source, can log in above-mentioned application program, if decryption failure, illustrates first network signal
Originate and differed, it is necessary to which user is manually entered above-mentioned second card number is decrypted with the second network signal in source.
Reference picture 11, further, above-mentioned judging unit 20, including:
First WLAN judge modules 221, for judging whether the first network signal source is the first WLAN;
2nd WLAN judge modules 222, if being the first WLAN for first network signal source, obtain described first
WLAN password, and judge whether the password of the first WLAN matches with the identifying code;
WLAN determination modules 223, if the password for the first WLAN is matched with the identifying code, judge described
One network signal source is identical with the second network signal source.
First WLAN judge modules 221, the 2nd WLAN judge modules 222 and WLAN determination modules 223 as described above, for testing
Whether the password for demonstrate,proving the first WLAN is identical with previous 2nd WLAN password, if identical, judges first network signal
Source is identical with the second network signal source, can directly log in above-mentioned application program;Otherwise, it is necessary to be manually entered second
WLAN password, then can just log in above-mentioned application program.
In reference picture 12, the present embodiment, above-mentioned judging unit 20, including:
Judge module 231 is installed, for judging whether the mobile terminal is provided with the second SIM card;
First determination module 232, if for being provided with second SIM card, it is the second network number to select the second SIM card
According to source;
Connection judgment module 233, if for not installing second SIM card, judging whether the mobile terminal connects
2nd WLAN;
Second determination module 234, if connecting the 2nd WLAN for the mobile terminal, the 2nd WLAN of selection is the second net
Network data source.
Judge module 231, the first determination module 232, the determination module of connection judgment module 233 and second are installed as described above
234, the device of the judgement for performing the second network signal source, if being provided with SIM card for mobile terminal, preferably
SIM card is originated for the second network data, because the corresponding parameter of SIM card can be SIM card card number and IMSI, jointly to applying journey
The logon account and password of sequence are encrypted, and can also carry out using cooperatively for plain code and private mark, improve login application program
Security;If mobile terminal is fitted without SIM card, judge whether to connect WLAN, if connection, WLAN is the second network
Data source.In other embodiments, SIM card and WLAN priority can also be exchanged, specifically can be according to using
Custom etc. is set.
In still another embodiment, the application program on mobile terminal is logged in using memory account and password.When
When logging in for the first time, judge whether mobile terminal is provided with the second SIM card, if so, then obtaining the second card number of the second SIM card
The account and password of application program are encrypted with the 2nd IMSI, wherein it is private mark that the second card number, which is plain code, the 2nd IMSI,;Such as
Fruit has been fitted without the second SIM card, then judges whether mobile terminal is connected with the 2nd WLAN, and the 2nd WLAN is obtained if connection
Password the account and password of application program are encrypted.
When is once logging in, first determine whether whether mobile terminal is provided with the first SIM card, if the first SIM card,
The account and password of encryption are decrypted the first card number and the first IMSI for then obtaining the first SIM card, if plain code and private mark
It is correct, then the first SIM card and the second SIM card are judged as the same card, are directly logged in without being manually entered identifying code and are applied journey
Sequence, if the whole mistakes of plain code and private mark, or plain code is correct, private mark mistake when, then judge the first SIM card and the second SIM card
It is not same SIM card, i.e. first network signal source is different with the second network signal source, it is necessary to which user is manually entered checking
Code (plain code) is verified, then can just be logged in, after login, can be with the first card number of the first SIM card and the first IMSI weights
New account and password to application program is encrypted.If being fitted without the first SIM card, but with currently used first
WLAN connection networks, then the account and password of above-mentioned encryption are decrypted the password for then obtaining the first WLAN, if decryption
Success, then direct login application program, if decryption fails, is manually entered the 2nd WLAN password, is verified, and step on
Record, while above-mentioned account and password are encrypted with the first WLAN password.
Further, when logging in first time, mobile terminal is fitted without the second SIM card, uses the 2nd WLAN password
Account and password to application program are encrypted;When logging in again, although mobile terminal installs the first SIM card,
Still can preferably the first WLAN password the account and password of application program are decrypted, directly stepped on if successful decryption
Record, at this point it is possible to according to default rule, choose whether the first card number and the first IMSI using the first SIM card to applying journey
The account and password of sequence are encrypted.
Further, when logging in first time, mobile terminal installs the second SIM card, uses the second card number of the second SIM card
The account and password of application program are encrypted with the 2nd IMSI;When logging on, mobile terminal is fitted without the first SIM
Card, but the first WLAN of connection, at this time, it may be necessary to the card number checking of the first SIM card is manually entered, then using the close of the first WLAN
Code carries out re-encrypted to the account and password of application program.
The protection device of the application program of the embodiment of the present invention, when logging in the application program using memory account and password,
Judge whether first network signal source is identical with the second network signal source of a preceding network data, only identical situation
It is lower just otherwise to need user's input validation code just to log in automated log on success, to prevent stranger from using user's
Mobile terminal logs in the application program for setting memory account and password, may effectively prevent the privacy leakage of user, and money
Loss etc..
A kind of mobile terminal, including processor 1180 and memory 1120 are also provided in reference picture 13, the embodiment of the present invention;
Above-mentioned memory 1120 is used for the guarantor for storing the application program for the above-mentioned any embodiment of protection device execution for supporting application program
The program of maintaining method;Above-mentioned processor 1180 is configurable for performing the program stored in the memory 1120.
For convenience of description, the part related to the embodiment of the present invention is illustrate only, particular technique details is not disclosed, please
With reference to present invention method part.The mobile terminal can be to include mobile phone, tablet personal computer, PDA (Personal
DigitalAssistant, personal digital assistant), POS (Point ofSales, point-of-sale terminal), any terminal such as vehicle-mounted computer
Equipment, so that mobile terminal is mobile phone as an example:
Figure 13 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng
Figure 13 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1110, memory 1120, input block 1130, display
Unit 1140, sensor 1150, voicefrequency circuit 1160, Wireless Fidelity (wireless fidelity, WiFi) module 1170, place
Manage the part such as device 1180 and power supply 1190.It will be understood by those skilled in the art that the handset structure shown in Figure 13 not structure
The restriction of paired mobile phone, can include than illustrating more or less parts, either combine some parts or different parts
Arrangement.
Each component parts of mobile phone is specifically introduced with reference to Figure 13:
Be typically provided with SIM card in RF circuits 1110, available for receive and send messages or communication process in, the reception of signal and hair
Send, especially, after the downlink information of base station is received, handled to processor 1180;In addition, being sent to up data are designed
Base station.Generally, RF circuits 1110 including but not limited to antenna, at least one amplifier, transceiver, coupler, low noise is put
Big device (LowNoiseAmplifier, LNA), duplexer etc..In addition, RF circuits 1110 can also pass through radio communication and network
With other equipment communication.Above-mentioned radio communication can use any communication standard or agreement, include but is not limited to the whole world mobile logical
News system (Global System ofMobile communication, GSM), general packet radio service (General
Packet Radio Service, GPRS), CDMA (Code DivisionMultipleAccess, CDMA), broadband code
Divide multiple access (Wideband Code Division MultipleAccess, WCDMA), Long Term Evolution (Long Term
Evolution, LTE), Email, Short Message Service (ShortMessaging Service, SMS) etc..
Memory 1120 can be used for storage software program and module, and processor 1180 is stored in memory by operation
1120 software program and module, so as to perform various function application and the data processing of mobile phone.Memory 1120 can be led
To include storing program area and storage data field, wherein, storing program area can be needed for storage program area, at least one function
Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone
Data (such as voice data, phone directory etc.) of establishment etc..In addition, memory 1120 can include high random access storage
Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are solid
State memory device.
Input block 1130 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with
And the relevant key signals input of function control.Specifically, input block 1130 may include contact panel 1131 and other inputs
Equipment 1132.Contact panel 1131, also referred to as touch-screen, collect touch operation (such as user of the user on or near it
Use the behaviour of any suitable object such as finger, stylus or annex on contact panel 1131 or near contact panel 1131
Make), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 1131 may include touch detection
Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 1180, and the order sent of reception processing device 1180 and can be performed.In addition,
Contact panel 1131 can be realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except touch surface
Plate 1131, input block 1130 can also include other input equipments 1132.Specifically, other input equipments 1132 can include
But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
It is one or more.
Display unit 1140 can be used for each of the information that is inputted by user of display or the information for being supplied to user and mobile phone
Plant menu.Display unit 1140 may include display panel 1141, optionally, can use liquid crystal display (Liquid
Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED)
To configure display panel 1141.Further, contact panel 1131 can cover display panel 1141, when contact panel 1131 is detected
To after the touch operation on or near it, processor 1180 is sent to determine the type of touch event, with preprocessor
1180 provide corresponding visual output according to the type of touch event on display panel 1141.Although in fig. 13, touch surface
Plate 1131 and display panel 1141 are input and the input function that mobile phone is realized as two independent parts, but some
, can be by contact panel 1131 and the input that is integrated and realizing mobile phone of display panel 1141 and output function in embodiment.
Mobile phone may also include at least one sensor 1150, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 1141, proximity transducer can close display panel when mobile phone is moved in one's ear
1141 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) and add
The size of speed, can detect that size and the direction of gravity when static, application (the such as horizontal/vertical screen available for identification mobile phone posture
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also
The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 1160, loudspeaker 1161, microphone 1162 can provide the COBBAIF between user and mobile phone.Audio
Electric signal after the voice data received conversion can be transferred to loudspeaker 1161, is changed by loudspeaker 1161 by circuit 1160
Exported for voice signal;On the other hand, the voice signal of collection is converted to electric signal by microphone 1162, by voicefrequency circuit 1160
Voice data is converted to after reception, then after voice data output processor 1180 is handled, through RF circuits 1110 to be sent to ratio
Such as another mobile phone, or voice data is exported to memory 1120 so as to further processing.
WiFi belongs to short range wireless transmission technology, for connecting wlan network, and mobile phone can be with by WiFi module 1170
Help user to send and receive e-mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet
Access.Although Figure 13 shows WiFi module 1170, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, complete
It can be omitted as needed in the essential scope for do not change invention entirely.
Processor 1180 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone,
By operation or perform and be stored in software program and/or module in memory 1120, and call and be stored in memory 1120
Interior data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor
1180 may include one or more processing units;It is preferred that, processor 1180 can integrated application processor and modulation /demodulation processing
Device, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is mainly located
Manage radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1180.
Mobile phone also includes the power supply 1190 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply
Management system and processor 1180 are logically contiguous, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
Reference picture 13, in embodiments of the present invention, the processor 1180 included by the mobile terminal also have following functions:
Obtain the first network signal source of current network data;
Judge whether the first network signal source is identical with the second network signal source of a preceding network data;
If identical, the application program is directly logged in;Otherwise, obtain user input with the second network signal source pair
The identifying code answered logs in the application program.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, such as multiple units or component
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or
The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces
Close or communicate to connect, can be electrical, machinery or other forms.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
Can be with one of ordinary skill in the art will appreciate that realizing that all or part of step in above-described embodiment method is
The hardware of correlation is instructed to complete by program, described program can be stored in a kind of computer-readable recording medium, on
It can be read-only storage, disk or CD etc. to state the storage medium mentioned.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize
Equivalent structure or equivalent flow conversion that description of the invention and accompanying drawing content are made, or directly or indirectly it is used in other correlations
Technical field, be included within the scope of the present invention.
The embodiment of the present invention is also provided:
A1, a kind of guard method of application program, when mobile terminal logs in the application program using memory account and password,
Including:
Obtain the first network signal source of current network data;
Judge whether the first network signal source is identical with the second network signal source of a preceding network data;
If identical, the application program is directly logged in;Otherwise, obtain user input with the second network signal source pair
The identifying code answered logs in the application program.
A2, application program according to A1 guard method, the first network signal source and the second network signal
The data source path in source is identical.
A3, application program according to A2 guard method, the first network signal of the acquisition current network data
Before the step of source, including:
The account and password are encrypted according to the specified parameter that second network signal is originated, wherein described refer to
Determine to include the identifying code in parameter.
A4, application program according to A3 guard method, the first network signal source and the second network signal
Source includes SIM card or WLAN, wherein, different SIM cards are originated for different network signals, and different WLAN is different net
Network signal is originated.
A5, application program according to A4 guard method, when second network signal source is the second SIM card
When, the account and password are encrypted the specified parameter originated according to second network signal, wherein described refer to
The step of determining to include the identifying code in parameter, including:
The second card number of second SIM card is obtained, the account and password are encrypted using second card number,
Wherein, the second card number is the identifying code.
A6, application program according to A5 guard method, it is described according to specifying that second network signal is originated
The step of account and password are encrypted parameter, in addition to:
The 2nd IMSI of second SIM card is obtained, the account and password are encrypted using the 2nd IMSI,
The 2nd IMSI formation private mark.
A7, application program according to A6 guard method, the judgement first network signal source with it is previous
Secondary network data the second network signal source whether identical step, including:
Judge whether the first network signal source is the first SIM card;
If so, then obtaining the card number of first SIM card, and judge the card number and the identifying code of first SIM card
Whether match;
If the card number of first SIM card is matched with the identifying code, judge the first IMSI of first SIM card with
Whether the private mark matches;
If the first IMSI is matched with the checking private mark, the first network signal source and second network are judged
Signal source is identical.
A8, application program according to A4 guard method, it is described when second network signal source is second
During WLAN, the account and password are encrypted the specified parameter originated according to second network signal, wherein institute
The step of including the identifying code in specified parameter is stated, including:
The WLAN passwords of the 2nd WLAN are obtained, the account and password are encrypted using the WLAN passwords,
Wherein, WLAN passwords are the identifying code.
A9, application program according to A8 guard method, the judgement first network signal source with it is previous
Secondary network data the second network signal source whether identical step, including:
Judge whether the first network signal source is the first WLAN;
If so, then obtain the password of the first WLAN, and judge that the password of the first WLAN is with the identifying code
No matching;
If the password of the first WLAN is matched with the identifying code, judge first network signal source with it is described
Second network signal source is identical.
A10, application program according to A4 guard method, the determination methods in the second network signal source, bag
Include:
Judge whether the mobile terminal is provided with SIM card;
If being provided with the SIM card, selection SIM card is originated for the second network data;
If not installing the SIM card, judge whether the mobile terminal connects WLAN;
If connecting WLAN, selection WLAN originates for the second network data.
B1, a kind of protection device of application program, when mobile terminal logs in the application program using memory account and password,
Including:
Acquiring unit, the first network signal for obtaining current network data is originated;
Judging unit, for judging that the first network signal source and the second network signal of a preceding network data are come
Whether source is identical;
Login authentication unit, if it is identical with the second network data source to be originated for first network signal, is directly logged in
The application program;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application journey
Sequence.
B2, application program according to B1 protection device, the first network signal source and the second network signal
The data source path in source is identical.
B3, application program according to B2 protection device, in addition to:
Ciphering unit, the specified parameter for being originated according to second network signal is added to the account and password
It is close, wherein including the identifying code in the specified parameter.
B4, application program according to B3 protection device, the first network signal source and the second network signal
Source includes SIM card or WLAN, wherein, different SIM cards are originated for different network signals, and different WLAN is different net
Network signal is originated.
B5, application program according to B4 protection device, when second network signal source is the second SIM card
When, the ciphering unit, including:
Card number encrypting module, the second card number for obtaining second SIM card, using second card number to the account
Family and password are encrypted, wherein, the second card number is the identifying code.
B6, application program according to B5 protection device, the ciphering unit also include:
IMSI encrypting modules, the 2nd IMSI for obtaining second SIM card, using the 2nd IMSI to the account
Family and password are encrypted, the 2nd IMSI formation private mark.
B7, application program according to B6 protection device, the judging unit, including:
First SIM card judge module, for judging whether the first network signal source is the first SIM card;
Second SIM card judge module, if being the first SIM card for first network signal source, obtains described the
The card number of one SIM card, and judge whether the card number of first SIM card matches with the identifying code;
3rd SIM card judge module, if the card number for first SIM card is matched with the identifying code, judges institute
Whether the first IMSI for stating the first SIM card matches with the private mark;
SIM card determination module, if being matched for the first IMSI with the checking private mark, judges the first network signal
Source is identical with the second network signal source.
B8, application program according to B4 protection device, it is described when second network signal source is second
During WLAN, the ciphering unit, including:
WLAN encrypting modules, the WLAN passwords for obtaining the 2nd WLAN, using the WLAN passwords to the account
Family and password are encrypted, wherein, WLAN passwords are the identifying code.
B9, application program according to B8 protection device, the judging unit, including:
First WLAN judge modules, for judging whether the first network signal source is the first WLAN;
2nd WLAN judge modules, if being the first WLAN for first network signal source, obtain the first WLAN
Password, and judge whether the password of the first WLAN matches with the identifying code;
WLAN determination modules, if the password for the first WLAN is matched with the identifying code, judge described first
Network signal source is identical with the second network signal source.
B10, application program according to B4 protection device, the judging unit, including:
Judge module is installed, for judging whether the mobile terminal is provided with SIM card;
First determination module, if for being provided with the SIM card, selection SIM card is originated for the second network data;
Connection judgment module, if for not installing the SIM card, judging whether the mobile terminal connects WLAN;
Second determination module, if connecting WLAN for the mobile terminal, selection WLAN originates for the second network data.
C1, a kind of mobile terminal, including processor and memory;
The memory, which is used to store, to be supported any one of the above-mentioned A1 to A10 of protection device execution of application program
The program of the guard method of application program;
The processor is configurable for performing the program stored in the memory.
Claims (10)
1. a kind of guard method of application program, when mobile terminal logs in the application program using memory account and password, it is special
Levy and be, including:
Obtain the first network signal source of current network data;
Judge whether the first network signal source is identical with the second network signal source of a preceding network data;
If identical, the application program is directly logged in;Otherwise, the corresponding with the second network signal source of user's input is obtained
Identifying code logs in the application program.
2. the guard method of application program according to claim 1, it is characterised in that the first network signal source and
The data source path in the second network signal source is identical.
3. the guard method of application program according to claim 2, it is characterised in that the acquisition current network data
Before the step of first network signal is originated, including:
The account and password are encrypted according to the specified parameter that second network signal is originated, wherein the specified ginseng
Include the identifying code in number.
4. the guard method of application program according to claim 3, it is characterised in that the first network signal source and
Second network signal source includes SIM card or WLAN, wherein, different SIM cards are originated for different network signals, different
WLAN originates for different network signals.
5. the guard method of application program according to claim 4, it is characterised in that when second network signal source
During for the second SIM card, the account and password are encrypted the specified parameter originated according to second network signal,
The step of including the identifying code in wherein described specified parameter, including:
The second card number of second SIM card is obtained, the account and password are encrypted using second card number, its
In, the second card number is the identifying code.
6. the guard method of application program according to claim 5, it is characterised in that described to be believed according to second network
The specified parameter in number source is the step of the account and password are encrypted, in addition to:
The 2nd IMSI of second SIM card is obtained, the account and password are encrypted using the 2nd IMSI, it is described
2nd IMSI formation private marks.
7. the guard method of application program according to claim 6, it is characterised in that the judgement first network letter
Number source and the second network signal of preceding network data source whether identical step, including:
Judge whether the first network signal source is the first SIM card;
If so, then obtain the card number of first SIM card, and judge whether are the card number of first SIM card and the identifying code
Matching;
If the card number of first SIM card is matched with the identifying code, judge the first IMSI of first SIM card with it is described
Whether private mark matches;
If the first IMSI is matched with the checking private mark, the first network signal source and second network signal are judged
Source is identical.
8. the guard method of application program according to claim 4, it is characterised in that described to work as second network signal
When originating as two WLAN, the specified parameter originated according to second network signal is added to the account and password
It is close, wherein the step of including the identifying code in the specified parameter, including:
The WLAN passwords of the 2nd WLAN are obtained, the account and password are encrypted using the WLAN passwords, wherein,
WLAN passwords are the identifying code.
9. a kind of protection device of application program, when mobile terminal logs in the application program using memory account and password, it is special
Levy and be, including:
Acquiring unit, the first network signal for obtaining current network data is originated;
Judging unit, be for judging that second network signal in the first network signal source and a preceding network data is originated
It is no identical;
Login authentication unit, if it is identical with the second network data source to be originated for first network signal, is directly logged in described
Application program;Otherwise, the identifying code corresponding with the second network signal source for obtaining user's input logs in the application program.
10. a kind of mobile terminal, it is characterised in that including processor and memory;
The memory, which is used to store, supports answering any one of the protection device perform claim requirement 1 to 8 of application program
With the program of the guard method of program;
The processor is configurable for performing the program stored in the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710233802.0A CN107070915A (en) | 2017-04-11 | 2017-04-11 | The guard method of mobile terminal and its application program and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710233802.0A CN107070915A (en) | 2017-04-11 | 2017-04-11 | The guard method of mobile terminal and its application program and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107070915A true CN107070915A (en) | 2017-08-18 |
Family
ID=59601889
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710233802.0A Pending CN107070915A (en) | 2017-04-11 | 2017-04-11 | The guard method of mobile terminal and its application program and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107070915A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107229846A (en) * | 2017-05-31 | 2017-10-03 | 奇酷互联网络科技(深圳)有限公司 | Information protecting method, device, mobile terminal and read/write memory medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015043172A1 (en) * | 2013-09-27 | 2015-04-02 | 惠州Tcl移动通信有限公司 | Method and system for automatically switching user modes by identifying imsis |
CN104883341A (en) * | 2014-02-28 | 2015-09-02 | 宇龙计算机通信科技(深圳)有限公司 | Application management device, terminal and application management method |
CN105281906A (en) * | 2014-07-04 | 2016-01-27 | 腾讯科技(深圳)有限公司 | Safety authentication method and device |
US9325696B1 (en) * | 2012-01-31 | 2016-04-26 | Google Inc. | System and method for authenticating to a participating website using locally stored credentials |
CN106470268A (en) * | 2015-08-20 | 2017-03-01 | 腾讯科技(深圳)有限公司 | A kind of method and apparatus of antitheft mobile phone |
-
2017
- 2017-04-11 CN CN201710233802.0A patent/CN107070915A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9325696B1 (en) * | 2012-01-31 | 2016-04-26 | Google Inc. | System and method for authenticating to a participating website using locally stored credentials |
WO2015043172A1 (en) * | 2013-09-27 | 2015-04-02 | 惠州Tcl移动通信有限公司 | Method and system for automatically switching user modes by identifying imsis |
CN104883341A (en) * | 2014-02-28 | 2015-09-02 | 宇龙计算机通信科技(深圳)有限公司 | Application management device, terminal and application management method |
CN105281906A (en) * | 2014-07-04 | 2016-01-27 | 腾讯科技(深圳)有限公司 | Safety authentication method and device |
CN106470268A (en) * | 2015-08-20 | 2017-03-01 | 腾讯科技(深圳)有限公司 | A kind of method and apparatus of antitheft mobile phone |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107229846A (en) * | 2017-05-31 | 2017-10-03 | 奇酷互联网络科技(深圳)有限公司 | Information protecting method, device, mobile terminal and read/write memory medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
CN108574940B (en) | Incoming call processing method and device | |
CN107437009B (en) | Authority control method and related product | |
CN106331370B (en) | A kind of data transmission method and terminal device | |
CN104426919B (en) | Page sharing method, apparatus and system | |
JP2018537027A (en) | Service processing method, device and system | |
CN108536783A (en) | Data processing method and device, terminal, computer readable storage medium | |
CN106412311B (en) | A kind of data transmission method and terminal device | |
CN104915119B (en) | Terminal desktop icon method of adjustment and device | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN107071775A (en) | Mobile terminal and its method and apparatus for redirecting access base station | |
CN107451450B (en) | Biometric identification method and related product | |
CN106920307A (en) | Gate inhibition's open method, device and mobile terminal | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN109102297A (en) | A kind of voidable method of payment and device | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN106130735A (en) | The processing method of a kind of communication information, device and mobile terminal | |
CN109743696A (en) | Identifying code encryption method, system and readable storage medium storing program for executing | |
CN107229846A (en) | Information protecting method, device, mobile terminal and read/write memory medium | |
CN107480495B (en) | Unlocking method of mobile terminal and related product | |
CN107046595A (en) | Announcement information processing method, device and mobile terminal | |
CN107347059A (en) | The method and detection terminal of a kind of Hole Detection | |
CN106909854A (en) | Picture management method, device and mobile terminal | |
CN108984231A (en) | A kind of login method and mobile terminal of application program account | |
CN107102913A (en) | Data back up method, device and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170818 |