CN104375836B - A kind of method and device of displaying screen locking window - Google Patents
A kind of method and device of displaying screen locking window Download PDFInfo
- Publication number
- CN104375836B CN104375836B CN201410665515.3A CN201410665515A CN104375836B CN 104375836 B CN104375836 B CN 104375836B CN 201410665515 A CN201410665515 A CN 201410665515A CN 104375836 B CN104375836 B CN 104375836B
- Authority
- CN
- China
- Prior art keywords
- window
- screen locking
- stack
- secret protection
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention discloses a kind of methods of displaying screen locking window, including:Obtain window object in operating status;Obtain the window ID of the window object in operating status;Obtain preset secret protection configuration, judge the window ID whether with the secret protection configurations match, if so,:Screen locking window corresponding with the window object is generated, operating status is set to and shows.The embodiment of the invention also discloses a kind of devices of displaying screen locking window.Using the present invention, the convenience of operation can be improved.
Description
Technical field
The present invention relates to mobile internet technical field more particularly to a kind of method and devices of displaying screen locking window
Background technology
With the rise of the development of development of Mobile Internet technology, especially mobile payment and Mobile banking, the guarantor of privacy of user
Shield becomes the very universal core demand of mobile terminal user, is at present to the one of secret protection by the latching of some privacy informations
A very universal way.Existing mobile terminal (such as smart mobile phone, tablet computer etc.) is generally using to there may be hidden
Private application locks this method to protect privacy of user.Such as in some online payments application, user clicks the application
Icon starts or switches to this in application, mobile terminal can show that mode (can not switch to another window of the application interface
Mouthful) coded lock control, user, which needs to input after password carries out authentication, could enter the application, to prevent mobile terminal not busy
Other users start the application and pry through privacy when setting or losing.
However, with the promotion of mobile terminal hardware performance, have been able to run more complicated platform on mobile terminal
The large-scale synthesis application of change.For example, certain large-scale synthesis social networking applications have included instant messaging, microblogging, individual
Multiple function modules such as homepage, gaming platform, map, e-commerce and network payment, if still according to corresponding in traditional technology
With the scheme locked, then user is when carrying out some and needing the lower operation of secret protection, it is also necessary to carry out frequent
Unlock operation.
For example, if user switches to browser searches net when by using the instant communication function of the social networking application
Page consults reference materials, then when switching back into the social networking application, and due to the social networking application planned network payment transaction, this is answered
With being locked, user's needs input correct password in the coded lock control of displaying to be reused immediately into the application
The content of access is sent to good friend by communication function.
Therefore, the method that inventor has found the displaying coded lock control based on application in the prior art will cause user to carry out
More meaningless unlock operation, to reduce the input efficiency of user so that the convenience of operation is insufficient.
Invention content
Based on this, in order to solve aforesaid operations convenience deficiency technical problem, provided a kind of displaying screen locking window
The method of mouth.
A method of displaying screen locking window, including:
Obtain window object in operating status;
Obtain the window ID of the window object in operating status;
Obtain preset secret protection configuration, judge the window ID whether with the secret protection configurations match, if
It is, then:
Screen locking window corresponding with the window object is generated, operating status is set to and shows.
Correspondingly, in order to solve aforesaid operations convenience deficiency technical problem, provided a kind of displaying screen locking window
The device of mouth.
A kind of device of displaying screen locking window, including:
Window object acquisition module, for obtaining window object in operating status;
Window ID acquisition module, the window ID for obtaining the window object in operating status;
Window match module, for obtaining preset secret protection configuration, judge the window ID whether with it is described hidden
Private relaying configuration matching;
Screen locking display module, for when the window ID matches, generating screen locking window corresponding with the window object
Mouthful, it is set to operating status and shows.
Implement the embodiment of the present invention, will have the advantages that:
For the comprehensive application with multiple function modules, user can be directed to function module relatively independent in the application
Secret protection configuration is carried out respectively to lock so that user using should in application, only need when accessing specific function module,
Side need to input corresponding check password, without when the application switches in any case, input validation password repeatedly, therefore
The checking procedure for reducing redundancy, improves operating efficiency so that the convenience of operation improves.
Further, since releasing process is reduced, mobile terminal will also expend less computing resource for showing locking screen interface
With carry out verification calculating so that the power consumption of mobile terminal also reduces, when battery durable to improve mobile terminal
Between.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of flow chart of the method for displaying screen locking window in one embodiment;
Fig. 2 is to show to wait locking the interface schematic diagram using selection interface in an application scenarios;
Fig. 3 is the interface schematic diagram for carrying out secret protection in an application scenarios and configuring selection window mark;
Fig. 4 is that interface schematic diagram is arranged in check password in an application scenarios;
Fig. 5 is the interface schematic diagram that prompt input password carries out authentication in one embodiment;
Fig. 6 is the interface schematic diagram of proof of identity failure prompt cipher mistake in one embodiment;
Fig. 7 is a kind of structural schematic diagram of the device of displaying screen locking window in one embodiment;
Fig. 8 is a kind of structural schematic diagram of the device of displaying screen locking window in another embodiment;
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment shall fall within the protection scope of the present invention.
The screen locking mechanism of the protection for privacy of user in traditional technology is for application.For example, being answered in android
In, screen locking is realized usually using KeyguardManager components.When running the component, can pass through
Method in KeyguardManager.KeyguardLock classes shows locking screen interface, can pass through calling
KeyguardManager.OnKeyguardExitResult functions generate unlock interface.User on locking screen interface by sliding
Into the unlock interface for carrying out cryptographic check, after input password success, then it can enter application and start to operate.Then as previously mentioned,
If user is comprehensive in application, frequent switching is used to other application with multiple relatively independent function modules in operation
Family switches to (being applied in andorid systems can be in running background) every time should be in application, then need to input in unlock interface close
Code so that input it is less efficient, to cause the convenience of operation insufficient.
Therefore, to solve the problems, such as that the convenience of aforesaid operations is insufficient, spy proposes a kind of method of displaying screen locking window,
The execution of this method depends on computer program, can run on the computer system of von Neumann system.The computer journey
Sequence can integrate in the application, also can be used as independent tool-class application operation.The computer system can be smart mobile phone, tablet
Super basis of computer, touch function etc. run intelligent operating system mobile device, especially run android, ios and
The terminal device of the systems such as windows phone.
Specifically, in the present embodiment, this method is as shown in Figure 1, include:
Step S102:Obtain window object in operating status.
Window object is the view object for interface expression in the intelligent operating system run on mobile terminal
Container can be used as the carrier of multiple view objects, control the display effect of multiple view object.
For example, in Android system, window object (i.e. activity objects, wherein containing one window pairs
As) be alternatively referred to as page object, can by add multiple view objects (view objects) express display effect (header, footer,
Text etc.), and the window object is the carrier of multiple view object.
And in ios systems, window object be UIViewController objects (its in Android system
Activity objects are similar, and realization is slightly different).In windows phone systems, window object is window objects.
Window object generally includes multiple states, for indicating that the window is in the state of input focus, just by other
The state (part shows and can not be used as input focus) of window half mulching in input focus, it is burnt to be in input by other
The state (do not show completely and input focus can not be used as) that the window of point is completely covered, and be marked as to delete in waiting
Deposit the state that reclaim mechanism discharges it in memory.In the present embodiment, operating status is that window is in input focus
And the state being shown completely.
For example, in Android system, activity objects include 4 kinds of states, respectively:
1.Active/Runing
After one new Activity starts stacking, it is shown in screen front end, and processing is the top in stack
(Activity stack tops), at this time it be in it is visible and can with user interact operating status, be called active state or operation shape
State (active or running).
2.Paused
When Activity loses focus, by new non-Activity or full frame transparent Activity quilt
It is placed on stack top, state at this time is called halted state (Paused).It still keeps connecting with window manager at this time,
Activity still maintains vigour and (all states, information about firms and window manager is kept to keep connection), but in system
Memory will be fallen when extremely low by force termination.So it still as it can be seen that but lost focus thus can not be with user
It interacts.
3.Stoped
If an Activity is completely covered by other Activity, it is called halted state (Stopped).It according to
So keep stateful and information about firms, but it is no longer visible, so its window is hidden, when Installed System Memory needs by with
When elsewhere, the Activity of Stopped will be fallen by force termination.
4.Killed
If an Activity is Paused Stopped states, system can be by the Activity from memory
It deletes, android system is deleted or required the Activity to terminate using two ways or directly terminated its
Process.When the Activity is shown to user again, it must start over and reset the state of front.
In the application scenarios based on Android system, window object in operating status is to be in Active/
The activity objects of Runing states.And in the systems such as android, usually grasped with the data structure storage user of window stack
The multiple activity objects made and created.Window stack has characteristic first-in last-out, window object in operating status total
It is the stack top location in window stack, therefore, in the present embodiment, the step of obtaining window object in operating status is:
The window stack of memory window object is obtained, the window object of the stack top in window stack is obtained.
For example, user first start using then show main interface window (the activity objects of corresponding main interface window, and
The activity objects are pressed into window stack), then selection starts instant communication function, then the instant communication message window popped up
(the activity objects of corresponding instant communication message window) can cover main interface window, and the input focus of user also switches to
The instant communication message window, at this time in window stack, the activity objects of corresponding instant communication message window are then pressed into
Window stack, and it is in stack top location.And return is clicked when user terminates input, when back switching to main interface window, then this is right
It answers the activity objects of instant communication message window to be removed surely by the stack from window stack, and makes corresponding main interface window
Activity objects are placed in stack top location, so that main interface window regains input focus.
In the present embodiment, then periodically (compared with short cycle) window stack object can be obtained, obtains the window object of its stack top (only
Its reference and pointer are obtained, is not removed from stack top).The handover event that also can detect window object in other embodiments,
Window stack object is obtained in the event handling function of handover event, obtains the window object of its stack top.Using timing acquisition or thing
The mechanism of part processing obtains window object, it is ensured that is not detected and omits when will not have window object in stack top.
In another embodiment, window in operating status can be also obtained by searching for the state parameter of window object
Object.For example, for the system that window object stores not in the form of stack, then the container of memory window object can be polled
It searches, finds the window object that state parameter is operating status.
In another embodiment, it also can carry out obtaining window pair in operating status by detecting focus handover event
As.For example, detectable focus obtains event, and the source pair of the event is obtained in the event handling function that the focus obtains event
As then the source object is window object in operating status or using window object in operating status as container pair
As (if for example, focus obtains the switching that event is input frame of the user in the same window object, source object is to be switched to
Input frame object, and window object in operating status is still the window object as the container of the input frame object,
It does not change)
Certainly, it in the application scenarios using window stack memory window object, is obtained by obtaining the window object of stack top
It is preferably scheme to take window object in operating status still, it is only necessary to which adding the weaker code of simple coupling can be real
It is existing, so that the autgmentability of program is stronger.In addition, due to the object that window stack is operating system grade, can also facilitate the party
Method is implemented in tool-class using upper.
Step S104:Obtain the window ID of window object in operating status.
The window ID of window object is the identification information for identifying window object, the predeterminable category for window object
Property is stored.Preferably, suffix can be referred to as with the name of window in the application, using application identities as prefix to distinguish
Window object in different applications.Such as A and B application include " setting " function and the function by corresponding window
Mouth object shows user, then in A applications, the window ID of the setting window can be predefined as A-config, and be applied in B
In can then be predefined as B-config, to be distinguished.And for the application based on URL, then it can be using URL as window mark
Know.If for example, A application setting function need access a.com/config address reading window object display data,
It can be using the URL as the window ID of window object.
Step S106:Obtain preset secret protection configuration, judge window ID whether with secret protection configurations match, if
It is to then follow the steps S108;Otherwise, step S110 is executed.
Step S108:Screen locking window corresponding with window object is generated, operating status is set to and shows.
Step S110:It does not operate.
Secret protection configuration is the configuration of certain function modules of the preset application for needing to carry out locking operation,
It is storable in configuration file.At runtime, secret protection configuration can be read, and cache in memory.Judge window ID
Whether it is to judge in secret protection configuration whether to include that the window ID or privacy are protected with secret protection configurations match
Whether shield configuration, which is marked with window mark, needs to carry out secret protection (being usually an attribute item), if matching, shows lock
Shield window.
In the present embodiment, screen locking window is also a window object, and it is to place it in be set to operating status
The stack top of window stack, or set its Window state to active state or operating status.It may include in screen locking window common
Proof of identity component removes its own, if verification passes through so that being locked application below window stack positioned at it
Window object come back to the stack top of window stack, be able to show and obtain input focus.
It should be noted that due to the interface processing mechanism that window stack is operating system, such as abovementioned steps S102 is logical
The stack top for crossing window stack obtains window object in operating status, and by the way that screen locking window is placed in window in step S108
The stack top of mouth stack is shown so that the implementation of this method can be realized by the application of third-party tool-class, and can be not limited to
It is realized with independent function module in.
Preferably, the step of generating screen locking window corresponding with window object may also include:Obtain the size of window object
And position, screen locking window is generated according to the size and location of window object.
In some operating systems, such as in 5.0 systems of android, the mechanism of split screen is provided, same screen can be opened up
Show multiple window objects, then when showing screen locking window, only covers and need capped window object on same screen, without to it
He has an impact window.
In the present embodiment, it can also show that secret protection configures the page, secret protection configuration page face includes optionally and window
Mouth identifies corresponding options.User can be configured by configuring to carry out operating on the page in secret protection, by choosing
Corresponding options inputs secret protection configuration-direct, and terminal then receives the secret protection configuration-direct of input, extracts corresponding choosing
In window ID, by window ID storage in secret protection configuration file.
For example, as shown in Fig. 2, in the application scenarios, the operation of this method is based on the application of independently operated tool-class (i.e.
Software locks shown in Fig. 2), run the tool-class application after, you can selection application whether it is needed carry out secret protection into
Row configuration.In Fig. 2, user can select " wechat " application to configure.After user selects " wechat " application, as shown in figure 3,
Can then show multiple configurable function options of " wechat " application, for example, " my bank card " in Fig. 3, " circle of friends ",
" message " and " when entering wechat " 4 options.The function modules such as the bank card for me are related to the personal finance number of user
According to, therefore degree of privacy is higher, usual recommended user, which opens, locks function.In Fig. 3, user by sliding have selected " I
The corresponding window ID of " my bank card " options is then added in secret protection configuration file by bank card " options.
And in this application scene, if user using wechat in application, user checks into its bank card functionality module
Remaining sum, then the corresponding window object of bank card functionality module be placed in stack top to after in operating status, by abovementioned steps
S102 detections are got, and obtain the object identity of the window object by step S104, then by reading secret protection configuration
File obtains secret protection configuration (this step can be previously-completed, and in memory by the secret protection allocating cache of reading), sentences
Disconnected wherein whether to have recorded the window ID, middle user has been arranged as in the previous example, then fits through, to show screen locking window.
In the present embodiment, the screen locking window of generation includes cryptographic check component (by inputting word password, PIN code, postal
The verification components that are verified of approach such as case verification), sliding trace verify component (by sliding out preset figure in touch screen
The component that track is verified), vocal print verification component (carries out voice input by microphone and carries out the verification group of vocal print comparison
Part) and/or finger-mark check component (component verified by fingerprint sensor).May be used also after the step of showing screen locking window
Password unlock instruction, sliding trace unlock instruction, vocal print unlock instruction and/or the unlocked by fingerprint instruction of input are received, and to it
It is verified;After verification passes through, then screen locking window is removed.
And also provide the option of check password setting in the secret protection configuration page.For example, in this application scene, screen locking
Window may include that sliding trace verifies component (i.e. graphic lock), as shown in figure 4, can present graphical lock the page is set, user passes through
Sliding setting sliding trace, mobile terminal store after the sliding trace is then extracted feature.Enter " my silver in the user
When row card " function, then displaying includes the screen locking window of sliding trace verification component as shown in Figure 5, if sliding trace input error,
User is then prompted to verify failure (as shown in Figure 6).
Preferably, for each window object for needing to add secret protection, independent check password can be arranged in user.Example
Such as, in figure 3, if user, which is " my bank card " and " circle of friends ", adds privacy protection function, the user is in sliding button
After unlatching, " my bank card " and " circle of friends " separate password setting interface can be shown respectively, it is single close to prevent
Criminal walks entire application after code leakage, improves the safety of secret protection.
In the present embodiment, judge window ID whether with the step of secret protection configurations match after further include:It obtains
Association window mark corresponding with window ID, obtains association window and identifies the corresponding verification frequency of failure, judge whether it is big
In or be equal to frequency of failure threshold value, if so, judging its matching.
User can also configure the incidence relation of window ID in secret protection configuration.If being configured in secret protection configuration
Window ID A needs to carry out secret protection, and window ID B and C need not carry out secret protection, but window ID A association windows
B and window ID C is identified, then in the corresponding window objects of impression window mark A, can preferentially show screen locking prompt user
Password is inputted, if the number that user inputs password mistake is more than frequency of failure threshold value, which is opening window ID B or window
When mouthful mark corresponding window objects of C, window ID B and window ID C also can successful match, therefore mobile terminal can also be shown
Screen locking window, after preventing mobile terminal stolen, even if criminal is being unaware of the function of being locked by privacy protection function
The unlocking cipher of module but remain to by correlation function obtain password the case where, to improve safety.
For example, in this application scene, if as shown in figure 3, it is to need to be configured with " my bank card " in secret protection configuration
Secret protection is carried out, " message " is that need not carry out secret protection, but " my bank card " association " message ", then criminal
It needs to input unlocking pin when entering " my bank card " function, if its password attempt number is greater than or equal to threshold number,
Then the criminal enter " message " function when, it is also desirable to input unlocking pin, to prevent criminal be unaware of into
When entering the unlocking pin of " my bank card " function, the user is pretended to be to send fraud information as other good friends by " message " function
Or inquiry password, to further improve safety.
In the present embodiment, further include after the step of verification passes through:Calculate screen locking window school corresponding with window ID
It tests and filters out the window ID that its verification is greater than or equal to frequency threshold by frequency by frequency, it is matched in secret protection
It centers as mismatch state.
That is, if user's same function of Reusability in a short time, has input more multiple password and is unlocked,
And verify and pass through, then it can confirm that the user is the validated user of mobile terminal, in order to improve input efficiency, then to the window pair
As not regenerating screen locking window, to save the time.It is to remove or labeled as mismatch to be set as mismatch state.
Preferably, the step of setting the window ID filtered out to mismatch state in secret protection configuration is also wrapped
It includes:
The life cycle that window ID is mismatch state is set;When life cycle arrives at, set window ID to
Matching status.
For example, unmatched mark, and parameter (example additional time can be added for the window ID in secret protection configuration
Such as 1 hour, 30 minutes etc.), then by way of timer or cycle detection when the time parameter expires, by the window mark
The unmatched mark known is changed to match.After being expired due to life cycle, there is still a need for input passwords to enter system by the user,
Therefore the safety of secret protection is improved.
It should be noted that the implementation of this method is not limited to the above-mentioned embodiment applied based on tool-class (as above
State " software locks " application in application scenarios), it can also be integrated in and need to carry out what secret protection locked its window respectively
Among, it is equivalent to another independent function module operation (such as being directly integrated in wechat application) of the application.
In one embodiment, as shown in fig. 7, a kind of device of displaying screen locking window, including window object acquisition module
102, window ID acquisition module 104, Window match module 106 and screen locking display module 108, wherein:
Window object acquisition module 102, for obtaining window object in operating status.
Window ID acquisition module 104, the window ID for obtaining window object in operating status.
Window match module 106, for obtaining preset secret protection configuration, judge window ID whether with secret protection
Configurations match.
Screen locking display module 108 will for when window ID matches, generating screen locking window corresponding with window object
It is set as operating status and shows.
In the present embodiment, window object acquisition module 102 is additionally operable to obtain the window stack of memory window object, at acquisition
In the window object of the stack top of window stack.
In the present embodiment, screen locking display module 108 is additionally operable to for screen locking window to be added to the stack top of window stack.
In the present embodiment, screen locking display module 108 is additionally operable to obtain the size and location of window object, according to window pair
The size and location of elephant generates screen locking window.
In the present embodiment, as shown in figure 8, the device, which further includes window, locks configuration module 110, for showing that privacy is protected
The shield configuration page, secret protection configuration page face include options optionally corresponding with window ID;The privacy for receiving input is protected
Configuration-direct is protected, the corresponding window ID chosen of extraction will be in window ID storage to secret protection configuration file.
Window match module 106 is additionally operable to read secret protection configuration file.
In the present embodiment, Window match module 106 is additionally operable to obtain association window mark corresponding with window ID, obtains
It takes association window to identify the corresponding verification frequency of failure, judges whether it is greater than or equal to frequency of failure threshold value, if so, judgement
It is matched.
In the present embodiment, screen locking window includes cryptographic check component, sliding trace verification component, vocal print verification component
And/or finger-mark check component.As shown in figure 8, the device further includes proof of identity module 112, the password solution for receiving input
Instruction, sliding trace unlock instruction, vocal print unlock instruction and/or unlocked by fingerprint instruction are locked, and it is verified;Verification passes through
Afterwards, then screen locking window is removed.
In the present embodiment, as shown in figure 8, the device further includes verification frequency statistics module 114, for calculating screen locking window
Mouth verification corresponding with window ID filters out its window ID of the verification by frequency more than frequency threshold by frequency, will
It is set as mismatch state in secret protection configuration.
In the present embodiment, as shown in figure 8, it is to mismatch that verification frequency statistics module 114, which is additionally operable to setting window ID,
The life cycle of state;When life cycle arrives at, it sets window ID to matching status.
In conclusion implementing the embodiment of the present invention, will have the advantages that:
For the comprehensive application with multiple function modules, user can be directed to function module relatively independent in the application
Secret protection configuration is carried out respectively to lock so that user using should in application, only need when accessing specific function module,
Side need to input corresponding check password, without when the application switches in any case, input validation password repeatedly, therefore
The checking procedure for reducing redundancy, improves operating efficiency so that the convenience of operation improves.
Further, since releasing process is reduced, mobile terminal will also expend less computing resource for showing locking screen interface
With carry out verification calculating so that the power consumption of mobile terminal also reduces, when battery durable to improve mobile terminal
Between.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer read/write memory medium
In, the program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly
It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.
Claims (12)
1. a kind of method of displaying screen locking window, including:
The window stack of memory window object is obtained, the window object of the stack top in the window stack is obtained;
Obtain the window ID of the window object of the stack top in the window stack;
Obtain preset secret protection configuration, judge the window ID whether with the secret protection configurations match, if so,
Then:
The size and location for obtaining the window object generates screen locking window according to the size and location of the window object, will
The screen locking window is added to stack top and the displaying of the window stack, includes proof of identity component in the screen locking window, in institute
The verification of proof of identity component is stated when passing through, the screen locking window is removed, so that positioned at the screen locking window below window stack
The corresponding window object of the window ID come back to the stack top of window stack, be able to show and obtain input focus.
2. the method for displaying screen locking window according to claim 1, which is characterized in that the method further includes:
Show that secret protection configures the page, secret protection configuration page face includes selection optionally corresponding with window ID
;
The secret protection configuration-direct of input is received, the corresponding window ID chosen of extraction stores the window ID to hidden
In private relaying configuration file;
Described the step of obtaining preset secret protection configuration is:
Read the secret protection configuration file.
3. the method for displaying screen locking window according to claim 1, which is characterized in that described to judge that the window ID is
It is no to further include with the step of secret protection configurations match:
Association window mark corresponding with the window ID is obtained, the association window is obtained and identifies corresponding verification failure time
Number, judges whether it is greater than or equal to frequency of failure threshold value, if so, judging its matching.
4. the method for displaying screen locking window according to claim 1, which is characterized in that the identity school in the screen locking window
It includes cryptographic check component, sliding trace verification component, vocal print verification component and/or finger-mark check component to test component;
Further include after the step of stack top and displaying that the screen locking window is added to the window stack:
Receive the password unlock instruction, sliding trace unlock instruction, sound inputted in the proof of identity component in the screen locking window
Line unlock instruction and/or unlocked by fingerprint instruction, and it is verified by the proof of identity component;
After verification passes through, then the screen locking window is removed.
5. the method for displaying screen locking window according to claim 4, which is characterized in that after the step of verification passes through
Further include:
Screen locking window verification corresponding with the window ID is calculated by frequency, its verification is filtered out and is more than by frequency
The window ID of frequency threshold sets the window ID filtered out to mismatch state in secret protection configuration.
6. the method for displaying screen locking window according to claim 5, which is characterized in that the window ID that will be filtered out
Further include in the step of being set as mismatch state during the secret protection configures:
The life cycle that the window ID is mismatch state is set;
When the life cycle arrives at, it sets the window ID to matching status.
7. a kind of device of displaying screen locking window, which is characterized in that including:
Window object acquisition module obtains the stack in the window stack for obtaining the window stack for storing the window object
The window object on top;
Window ID acquisition module, the window ID of the window object for obtaining the stack top in the window stack;
Window match module judges whether the window ID protects with the privacy for obtaining preset secret protection configuration
Protect configurations match;
Screen locking display module, for when the window ID matches, the size and location of the window object being obtained, according to institute
The size and location for stating window object generates screen locking window, and the screen locking window is added to stack top and the exhibition of the window stack
Show, includes proof of identity component in the screen locking window, when proof of identity component verification passes through, the screen locking window quilt
It removes, so as to come back to window positioned at the window ID corresponding window object of the screen locking window below window stack
The stack top of stack is able to show and obtains input focus.
8. the device of displaying screen locking window according to claim 7, which is characterized in that described device further includes that window locks
Configuration module, for show secret protection configure the page, secret protection configuration page face include optionally with window ID pair
The options answered;The secret protection configuration-direct of input is received, the corresponding window ID chosen of extraction deposits the window ID
It stores up in secret protection configuration file;
The Window match module is additionally operable to read the secret protection configuration file.
9. the device of displaying screen locking window according to claim 7, which is characterized in that the Window match module is additionally operable to
Association window mark corresponding with the window ID is obtained, the association window is obtained and identifies the corresponding verification frequency of failure,
Judge whether it is greater than or equal to frequency of failure threshold value, if so, judging its matching.
10. the device of displaying screen locking window according to claim 7, which is characterized in that the identity in the screen locking window
Verification component includes cryptographic check component, sliding trace verification component, vocal print verification component and/or finger-mark check component;
Described device further includes proof of identity module, for receive inputted in the proof of identity component in the screen locking window it is close
Code unlock instruction, sliding trace unlock instruction, vocal print unlock instruction and/or unlocked by fingerprint instruction, and it is verified;Pass through
After the proof of identity component verification passes through, then the screen locking window is removed.
11. the device of displaying screen locking window according to claim 10, which is characterized in that described device further includes verification frequency
Rate statistical module filters out its verification for calculating screen locking window verification corresponding with the window ID by frequency
It is more than the window ID of frequency threshold by frequency, sets it to mismatch state in secret protection configuration.
12. the device of displaying screen locking window according to claim 11, which is characterized in that the verification frequency statistics module
It is additionally operable to that the life cycle that the window ID is mismatch state is arranged;When the life cycle arrives at, by the window
Mark is set as matching status.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410665515.3A CN104375836B (en) | 2014-11-19 | 2014-11-19 | A kind of method and device of displaying screen locking window |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410665515.3A CN104375836B (en) | 2014-11-19 | 2014-11-19 | A kind of method and device of displaying screen locking window |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104375836A CN104375836A (en) | 2015-02-25 |
CN104375836B true CN104375836B (en) | 2018-08-17 |
Family
ID=52554779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410665515.3A Active CN104375836B (en) | 2014-11-19 | 2014-11-19 | A kind of method and device of displaying screen locking window |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104375836B (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104780209A (en) * | 2015-04-07 | 2015-07-15 | 北京奇点机智信息技术有限公司 | Portable equipment and server for realizing sharing interface scenario |
CN105260658A (en) * | 2015-09-17 | 2016-01-20 | 广东欧珀移动通信有限公司 | Method and system for setting privacy interface |
CN105354030A (en) * | 2015-11-06 | 2016-02-24 | 天脉聚源(北京)教育科技有限公司 | Method and apparatus for controlling minimization of window |
CN105426717A (en) * | 2015-11-11 | 2016-03-23 | 广东欧珀移动通信有限公司 | Interface display method and apparatus |
CN105956434A (en) * | 2016-05-25 | 2016-09-21 | 乐视控股(北京)有限公司 | Screen locking/unlocking method and device of intelligent terminal |
CN112800401B (en) * | 2016-07-27 | 2024-01-30 | 创新先进技术有限公司 | Privacy processing method, privacy processing device and terminal |
US10146560B2 (en) | 2016-09-30 | 2018-12-04 | Xiaoyun Wu | Method and apparatus for automatic processing of service requests on an electronic device |
CN106325889A (en) | 2016-09-30 | 2017-01-11 | 北京奇点机智信息技术有限公司 | Data processing method and device |
CN107608726A (en) * | 2017-08-10 | 2018-01-19 | 珠海市君天电子科技有限公司 | Monitoring method, device, electronic equipment and storage medium |
CN107659490B (en) * | 2017-09-27 | 2021-01-12 | Oppo广东移动通信有限公司 | File sending method, terminal and storage medium |
CN107679377A (en) * | 2017-09-30 | 2018-02-09 | 广东欧珀移动通信有限公司 | Application interface switching method, device, storage medium and electronic equipment |
CN109871706A (en) * | 2017-12-04 | 2019-06-11 | 广州市动景计算机科技有限公司 | Method for secret protection and device calculate equipment and storage medium |
CN109101289B (en) * | 2018-06-21 | 2021-09-10 | 海信视像科技股份有限公司 | Data processing method and device for terminal equipment |
CN109583228B (en) * | 2018-10-30 | 2021-05-07 | 中国科学院信息工程研究所 | Privacy information management method, device and system |
CN110321079B (en) * | 2019-06-27 | 2023-04-25 | 暨南大学 | Disk cache deduplication method based on mixed page |
CN110764844B (en) * | 2019-10-25 | 2023-04-11 | 芜湖盟博科技有限公司 | Multi-application window custom layout method on vehicle-mounted system |
CN111274564A (en) * | 2020-01-14 | 2020-06-12 | 青岛海信移动通信技术股份有限公司 | Communication terminal and application unlocking method in split screen mode |
CN112051954A (en) * | 2020-10-12 | 2020-12-08 | 展讯通信(天津)有限公司 | Page fixing display method and device, electronic equipment and storage medium |
CN114611118A (en) * | 2022-05-12 | 2022-06-10 | 麒麟软件有限公司 | Android multi-window application screen locking method based on Linux system |
CN115113774B (en) * | 2022-06-28 | 2023-10-24 | 上海中汇亿达金融信息技术有限公司 | Screen locking and unlocking method and related device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727281A (en) * | 2009-09-04 | 2010-06-09 | 丁贵 | System and method for one-key locking of computer monitor |
CN103064585A (en) * | 2012-12-24 | 2013-04-24 | 东莞宇龙通信科技有限公司 | Terminal unlocking method and terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102063602B (en) * | 2010-12-28 | 2014-06-11 | 中兴通讯股份有限公司 | Method and terminal for locking and unlocking terminal screen based on RFID (Radio Frequency Identification) |
-
2014
- 2014-11-19 CN CN201410665515.3A patent/CN104375836B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727281A (en) * | 2009-09-04 | 2010-06-09 | 丁贵 | System and method for one-key locking of computer monitor |
CN103064585A (en) * | 2012-12-24 | 2013-04-24 | 东莞宇龙通信科技有限公司 | Terminal unlocking method and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104375836A (en) | 2015-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104375836B (en) | A kind of method and device of displaying screen locking window | |
US20180247483A1 (en) | Security systems for protecting an asset | |
CN106453061B (en) | A kind of method and system identifying network fraudulent act | |
CN106952096A (en) | Security certification system, method and the credible identifying device of client of client device | |
CN107004080A (en) | Environment sensing security token | |
CN108229956A (en) | Network bank business method, apparatus, system and mobile terminal | |
US9756028B2 (en) | Methods, systems and computer program products for secure access to information | |
CN106341313A (en) | Method and apparatus for obtaining billing information | |
CN103745148A (en) | Information protection method based on fingerprint recognition and mobile terminal | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN105138887B (en) | A kind of input method of log-on message, device and terminal device | |
CN106874718A (en) | privacy processing method, device and terminal | |
CN104853030A (en) | Information processing method and mobile terminal | |
CN111882425B (en) | Service data processing method, device and server | |
CN109088872A (en) | Application method, device, electronic equipment and the medium of cloud platform with service life | |
CN107977841A (en) | The method and its terminal of two-dimension code safe payment are realized based on driving layer | |
CN107609362A (en) | A kind of smart card logs in the method for Windows systems and privately owned authority provides device | |
CN107274179A (en) | A kind of bank card identity identifying method, system and Cloud Server | |
CN103873442B (en) | The treating method and apparatus of log-on message | |
CN108734014A (en) | Cryptographic data authentication method and apparatus, code data guard method and device | |
Reno | Multifactor authentication: Its time has come | |
CN105897708A (en) | Information protection method and mobile terminal | |
Jones et al. | Digital forensics and the issues of identity | |
CN107153994A (en) | A kind of method for authenticating user identity, fiscard and financial terminal | |
WO2012155818A1 (en) | Method and device for protecting user information based on credible resource |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |