CN104375836B - A kind of method and device of displaying screen locking window - Google Patents

A kind of method and device of displaying screen locking window Download PDF

Info

Publication number
CN104375836B
CN104375836B CN201410665515.3A CN201410665515A CN104375836B CN 104375836 B CN104375836 B CN 104375836B CN 201410665515 A CN201410665515 A CN 201410665515A CN 104375836 B CN104375836 B CN 104375836B
Authority
CN
China
Prior art keywords
window
screen locking
stack
secret protection
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410665515.3A
Other languages
Chinese (zh)
Other versions
CN104375836A (en
Inventor
赵磊
陈就标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201410665515.3A priority Critical patent/CN104375836B/en
Publication of CN104375836A publication Critical patent/CN104375836A/en
Application granted granted Critical
Publication of CN104375836B publication Critical patent/CN104375836B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention discloses a kind of methods of displaying screen locking window, including:Obtain window object in operating status;Obtain the window ID of the window object in operating status;Obtain preset secret protection configuration, judge the window ID whether with the secret protection configurations match, if so,:Screen locking window corresponding with the window object is generated, operating status is set to and shows.The embodiment of the invention also discloses a kind of devices of displaying screen locking window.Using the present invention, the convenience of operation can be improved.

Description

A kind of method and device of displaying screen locking window
Technical field
The present invention relates to mobile internet technical field more particularly to a kind of method and devices of displaying screen locking window
Background technology
With the rise of the development of development of Mobile Internet technology, especially mobile payment and Mobile banking, the guarantor of privacy of user Shield becomes the very universal core demand of mobile terminal user, is at present to the one of secret protection by the latching of some privacy informations A very universal way.Existing mobile terminal (such as smart mobile phone, tablet computer etc.) is generally using to there may be hidden Private application locks this method to protect privacy of user.Such as in some online payments application, user clicks the application Icon starts or switches to this in application, mobile terminal can show that mode (can not switch to another window of the application interface Mouthful) coded lock control, user, which needs to input after password carries out authentication, could enter the application, to prevent mobile terminal not busy Other users start the application and pry through privacy when setting or losing.
However, with the promotion of mobile terminal hardware performance, have been able to run more complicated platform on mobile terminal The large-scale synthesis application of change.For example, certain large-scale synthesis social networking applications have included instant messaging, microblogging, individual Multiple function modules such as homepage, gaming platform, map, e-commerce and network payment, if still according to corresponding in traditional technology With the scheme locked, then user is when carrying out some and needing the lower operation of secret protection, it is also necessary to carry out frequent Unlock operation.
For example, if user switches to browser searches net when by using the instant communication function of the social networking application Page consults reference materials, then when switching back into the social networking application, and due to the social networking application planned network payment transaction, this is answered With being locked, user's needs input correct password in the coded lock control of displaying to be reused immediately into the application The content of access is sent to good friend by communication function.
Therefore, the method that inventor has found the displaying coded lock control based on application in the prior art will cause user to carry out More meaningless unlock operation, to reduce the input efficiency of user so that the convenience of operation is insufficient.
Invention content
Based on this, in order to solve aforesaid operations convenience deficiency technical problem, provided a kind of displaying screen locking window The method of mouth.
A method of displaying screen locking window, including:
Obtain window object in operating status;
Obtain the window ID of the window object in operating status;
Obtain preset secret protection configuration, judge the window ID whether with the secret protection configurations match, if It is, then:
Screen locking window corresponding with the window object is generated, operating status is set to and shows.
Correspondingly, in order to solve aforesaid operations convenience deficiency technical problem, provided a kind of displaying screen locking window The device of mouth.
A kind of device of displaying screen locking window, including:
Window object acquisition module, for obtaining window object in operating status;
Window ID acquisition module, the window ID for obtaining the window object in operating status;
Window match module, for obtaining preset secret protection configuration, judge the window ID whether with it is described hidden Private relaying configuration matching;
Screen locking display module, for when the window ID matches, generating screen locking window corresponding with the window object Mouthful, it is set to operating status and shows.
Implement the embodiment of the present invention, will have the advantages that:
For the comprehensive application with multiple function modules, user can be directed to function module relatively independent in the application Secret protection configuration is carried out respectively to lock so that user using should in application, only need when accessing specific function module, Side need to input corresponding check password, without when the application switches in any case, input validation password repeatedly, therefore The checking procedure for reducing redundancy, improves operating efficiency so that the convenience of operation improves.
Further, since releasing process is reduced, mobile terminal will also expend less computing resource for showing locking screen interface With carry out verification calculating so that the power consumption of mobile terminal also reduces, when battery durable to improve mobile terminal Between.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of flow chart of the method for displaying screen locking window in one embodiment;
Fig. 2 is to show to wait locking the interface schematic diagram using selection interface in an application scenarios;
Fig. 3 is the interface schematic diagram for carrying out secret protection in an application scenarios and configuring selection window mark;
Fig. 4 is that interface schematic diagram is arranged in check password in an application scenarios;
Fig. 5 is the interface schematic diagram that prompt input password carries out authentication in one embodiment;
Fig. 6 is the interface schematic diagram of proof of identity failure prompt cipher mistake in one embodiment;
Fig. 7 is a kind of structural schematic diagram of the device of displaying screen locking window in one embodiment;
Fig. 8 is a kind of structural schematic diagram of the device of displaying screen locking window in another embodiment;
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts Embodiment shall fall within the protection scope of the present invention.
The screen locking mechanism of the protection for privacy of user in traditional technology is for application.For example, being answered in android In, screen locking is realized usually using KeyguardManager components.When running the component, can pass through Method in KeyguardManager.KeyguardLock classes shows locking screen interface, can pass through calling KeyguardManager.OnKeyguardExitResult functions generate unlock interface.User on locking screen interface by sliding Into the unlock interface for carrying out cryptographic check, after input password success, then it can enter application and start to operate.Then as previously mentioned, If user is comprehensive in application, frequent switching is used to other application with multiple relatively independent function modules in operation Family switches to (being applied in andorid systems can be in running background) every time should be in application, then need to input in unlock interface close Code so that input it is less efficient, to cause the convenience of operation insufficient.
Therefore, to solve the problems, such as that the convenience of aforesaid operations is insufficient, spy proposes a kind of method of displaying screen locking window, The execution of this method depends on computer program, can run on the computer system of von Neumann system.The computer journey Sequence can integrate in the application, also can be used as independent tool-class application operation.The computer system can be smart mobile phone, tablet Super basis of computer, touch function etc. run intelligent operating system mobile device, especially run android, ios and The terminal device of the systems such as windows phone.
Specifically, in the present embodiment, this method is as shown in Figure 1, include:
Step S102:Obtain window object in operating status.
Window object is the view object for interface expression in the intelligent operating system run on mobile terminal Container can be used as the carrier of multiple view objects, control the display effect of multiple view object.
For example, in Android system, window object (i.e. activity objects, wherein containing one window pairs As) be alternatively referred to as page object, can by add multiple view objects (view objects) express display effect (header, footer, Text etc.), and the window object is the carrier of multiple view object.
And in ios systems, window object be UIViewController objects (its in Android system Activity objects are similar, and realization is slightly different).In windows phone systems, window object is window objects.
Window object generally includes multiple states, for indicating that the window is in the state of input focus, just by other The state (part shows and can not be used as input focus) of window half mulching in input focus, it is burnt to be in input by other The state (do not show completely and input focus can not be used as) that the window of point is completely covered, and be marked as to delete in waiting Deposit the state that reclaim mechanism discharges it in memory.In the present embodiment, operating status is that window is in input focus And the state being shown completely.
For example, in Android system, activity objects include 4 kinds of states, respectively:
1.Active/Runing
After one new Activity starts stacking, it is shown in screen front end, and processing is the top in stack (Activity stack tops), at this time it be in it is visible and can with user interact operating status, be called active state or operation shape State (active or running).
2.Paused
When Activity loses focus, by new non-Activity or full frame transparent Activity quilt It is placed on stack top, state at this time is called halted state (Paused).It still keeps connecting with window manager at this time, Activity still maintains vigour and (all states, information about firms and window manager is kept to keep connection), but in system Memory will be fallen when extremely low by force termination.So it still as it can be seen that but lost focus thus can not be with user It interacts.
3.Stoped
If an Activity is completely covered by other Activity, it is called halted state (Stopped).It according to So keep stateful and information about firms, but it is no longer visible, so its window is hidden, when Installed System Memory needs by with When elsewhere, the Activity of Stopped will be fallen by force termination.
4.Killed
If an Activity is Paused Stopped states, system can be by the Activity from memory It deletes, android system is deleted or required the Activity to terminate using two ways or directly terminated its Process.When the Activity is shown to user again, it must start over and reset the state of front.
In the application scenarios based on Android system, window object in operating status is to be in Active/ The activity objects of Runing states.And in the systems such as android, usually grasped with the data structure storage user of window stack The multiple activity objects made and created.Window stack has characteristic first-in last-out, window object in operating status total It is the stack top location in window stack, therefore, in the present embodiment, the step of obtaining window object in operating status is: The window stack of memory window object is obtained, the window object of the stack top in window stack is obtained.
For example, user first start using then show main interface window (the activity objects of corresponding main interface window, and The activity objects are pressed into window stack), then selection starts instant communication function, then the instant communication message window popped up (the activity objects of corresponding instant communication message window) can cover main interface window, and the input focus of user also switches to The instant communication message window, at this time in window stack, the activity objects of corresponding instant communication message window are then pressed into Window stack, and it is in stack top location.And return is clicked when user terminates input, when back switching to main interface window, then this is right It answers the activity objects of instant communication message window to be removed surely by the stack from window stack, and makes corresponding main interface window Activity objects are placed in stack top location, so that main interface window regains input focus.
In the present embodiment, then periodically (compared with short cycle) window stack object can be obtained, obtains the window object of its stack top (only Its reference and pointer are obtained, is not removed from stack top).The handover event that also can detect window object in other embodiments, Window stack object is obtained in the event handling function of handover event, obtains the window object of its stack top.Using timing acquisition or thing The mechanism of part processing obtains window object, it is ensured that is not detected and omits when will not have window object in stack top.
In another embodiment, window in operating status can be also obtained by searching for the state parameter of window object Object.For example, for the system that window object stores not in the form of stack, then the container of memory window object can be polled It searches, finds the window object that state parameter is operating status.
In another embodiment, it also can carry out obtaining window pair in operating status by detecting focus handover event As.For example, detectable focus obtains event, and the source pair of the event is obtained in the event handling function that the focus obtains event As then the source object is window object in operating status or using window object in operating status as container pair As (if for example, focus obtains the switching that event is input frame of the user in the same window object, source object is to be switched to Input frame object, and window object in operating status is still the window object as the container of the input frame object, It does not change)
Certainly, it in the application scenarios using window stack memory window object, is obtained by obtaining the window object of stack top It is preferably scheme to take window object in operating status still, it is only necessary to which adding the weaker code of simple coupling can be real It is existing, so that the autgmentability of program is stronger.In addition, due to the object that window stack is operating system grade, can also facilitate the party Method is implemented in tool-class using upper.
Step S104:Obtain the window ID of window object in operating status.
The window ID of window object is the identification information for identifying window object, the predeterminable category for window object Property is stored.Preferably, suffix can be referred to as with the name of window in the application, using application identities as prefix to distinguish Window object in different applications.Such as A and B application include " setting " function and the function by corresponding window Mouth object shows user, then in A applications, the window ID of the setting window can be predefined as A-config, and be applied in B In can then be predefined as B-config, to be distinguished.And for the application based on URL, then it can be using URL as window mark Know.If for example, A application setting function need access a.com/config address reading window object display data, It can be using the URL as the window ID of window object.
Step S106:Obtain preset secret protection configuration, judge window ID whether with secret protection configurations match, if It is to then follow the steps S108;Otherwise, step S110 is executed.
Step S108:Screen locking window corresponding with window object is generated, operating status is set to and shows.
Step S110:It does not operate.
Secret protection configuration is the configuration of certain function modules of the preset application for needing to carry out locking operation, It is storable in configuration file.At runtime, secret protection configuration can be read, and cache in memory.Judge window ID Whether it is to judge in secret protection configuration whether to include that the window ID or privacy are protected with secret protection configurations match Whether shield configuration, which is marked with window mark, needs to carry out secret protection (being usually an attribute item), if matching, shows lock Shield window.
In the present embodiment, screen locking window is also a window object, and it is to place it in be set to operating status The stack top of window stack, or set its Window state to active state or operating status.It may include in screen locking window common Proof of identity component removes its own, if verification passes through so that being locked application below window stack positioned at it Window object come back to the stack top of window stack, be able to show and obtain input focus.
It should be noted that due to the interface processing mechanism that window stack is operating system, such as abovementioned steps S102 is logical The stack top for crossing window stack obtains window object in operating status, and by the way that screen locking window is placed in window in step S108 The stack top of mouth stack is shown so that the implementation of this method can be realized by the application of third-party tool-class, and can be not limited to It is realized with independent function module in.
Preferably, the step of generating screen locking window corresponding with window object may also include:Obtain the size of window object And position, screen locking window is generated according to the size and location of window object.
In some operating systems, such as in 5.0 systems of android, the mechanism of split screen is provided, same screen can be opened up Show multiple window objects, then when showing screen locking window, only covers and need capped window object on same screen, without to it He has an impact window.
In the present embodiment, it can also show that secret protection configures the page, secret protection configuration page face includes optionally and window Mouth identifies corresponding options.User can be configured by configuring to carry out operating on the page in secret protection, by choosing Corresponding options inputs secret protection configuration-direct, and terminal then receives the secret protection configuration-direct of input, extracts corresponding choosing In window ID, by window ID storage in secret protection configuration file.
For example, as shown in Fig. 2, in the application scenarios, the operation of this method is based on the application of independently operated tool-class (i.e. Software locks shown in Fig. 2), run the tool-class application after, you can selection application whether it is needed carry out secret protection into Row configuration.In Fig. 2, user can select " wechat " application to configure.After user selects " wechat " application, as shown in figure 3, Can then show multiple configurable function options of " wechat " application, for example, " my bank card " in Fig. 3, " circle of friends ", " message " and " when entering wechat " 4 options.The function modules such as the bank card for me are related to the personal finance number of user According to, therefore degree of privacy is higher, usual recommended user, which opens, locks function.In Fig. 3, user by sliding have selected " I The corresponding window ID of " my bank card " options is then added in secret protection configuration file by bank card " options.
And in this application scene, if user using wechat in application, user checks into its bank card functionality module Remaining sum, then the corresponding window object of bank card functionality module be placed in stack top to after in operating status, by abovementioned steps S102 detections are got, and obtain the object identity of the window object by step S104, then by reading secret protection configuration File obtains secret protection configuration (this step can be previously-completed, and in memory by the secret protection allocating cache of reading), sentences Disconnected wherein whether to have recorded the window ID, middle user has been arranged as in the previous example, then fits through, to show screen locking window.
In the present embodiment, the screen locking window of generation includes cryptographic check component (by inputting word password, PIN code, postal The verification components that are verified of approach such as case verification), sliding trace verify component (by sliding out preset figure in touch screen The component that track is verified), vocal print verification component (carries out voice input by microphone and carries out the verification group of vocal print comparison Part) and/or finger-mark check component (component verified by fingerprint sensor).May be used also after the step of showing screen locking window Password unlock instruction, sliding trace unlock instruction, vocal print unlock instruction and/or the unlocked by fingerprint instruction of input are received, and to it It is verified;After verification passes through, then screen locking window is removed.
And also provide the option of check password setting in the secret protection configuration page.For example, in this application scene, screen locking Window may include that sliding trace verifies component (i.e. graphic lock), as shown in figure 4, can present graphical lock the page is set, user passes through Sliding setting sliding trace, mobile terminal store after the sliding trace is then extracted feature.Enter " my silver in the user When row card " function, then displaying includes the screen locking window of sliding trace verification component as shown in Figure 5, if sliding trace input error, User is then prompted to verify failure (as shown in Figure 6).
Preferably, for each window object for needing to add secret protection, independent check password can be arranged in user.Example Such as, in figure 3, if user, which is " my bank card " and " circle of friends ", adds privacy protection function, the user is in sliding button After unlatching, " my bank card " and " circle of friends " separate password setting interface can be shown respectively, it is single close to prevent Criminal walks entire application after code leakage, improves the safety of secret protection.
In the present embodiment, judge window ID whether with the step of secret protection configurations match after further include:It obtains Association window mark corresponding with window ID, obtains association window and identifies the corresponding verification frequency of failure, judge whether it is big In or be equal to frequency of failure threshold value, if so, judging its matching.
User can also configure the incidence relation of window ID in secret protection configuration.If being configured in secret protection configuration Window ID A needs to carry out secret protection, and window ID B and C need not carry out secret protection, but window ID A association windows B and window ID C is identified, then in the corresponding window objects of impression window mark A, can preferentially show screen locking prompt user Password is inputted, if the number that user inputs password mistake is more than frequency of failure threshold value, which is opening window ID B or window When mouthful mark corresponding window objects of C, window ID B and window ID C also can successful match, therefore mobile terminal can also be shown Screen locking window, after preventing mobile terminal stolen, even if criminal is being unaware of the function of being locked by privacy protection function The unlocking cipher of module but remain to by correlation function obtain password the case where, to improve safety.
For example, in this application scene, if as shown in figure 3, it is to need to be configured with " my bank card " in secret protection configuration Secret protection is carried out, " message " is that need not carry out secret protection, but " my bank card " association " message ", then criminal It needs to input unlocking pin when entering " my bank card " function, if its password attempt number is greater than or equal to threshold number, Then the criminal enter " message " function when, it is also desirable to input unlocking pin, to prevent criminal be unaware of into When entering the unlocking pin of " my bank card " function, the user is pretended to be to send fraud information as other good friends by " message " function Or inquiry password, to further improve safety.
In the present embodiment, further include after the step of verification passes through:Calculate screen locking window school corresponding with window ID It tests and filters out the window ID that its verification is greater than or equal to frequency threshold by frequency by frequency, it is matched in secret protection It centers as mismatch state.
That is, if user's same function of Reusability in a short time, has input more multiple password and is unlocked, And verify and pass through, then it can confirm that the user is the validated user of mobile terminal, in order to improve input efficiency, then to the window pair As not regenerating screen locking window, to save the time.It is to remove or labeled as mismatch to be set as mismatch state.
Preferably, the step of setting the window ID filtered out to mismatch state in secret protection configuration is also wrapped It includes:
The life cycle that window ID is mismatch state is set;When life cycle arrives at, set window ID to Matching status.
For example, unmatched mark, and parameter (example additional time can be added for the window ID in secret protection configuration Such as 1 hour, 30 minutes etc.), then by way of timer or cycle detection when the time parameter expires, by the window mark The unmatched mark known is changed to match.After being expired due to life cycle, there is still a need for input passwords to enter system by the user, Therefore the safety of secret protection is improved.
It should be noted that the implementation of this method is not limited to the above-mentioned embodiment applied based on tool-class (as above State " software locks " application in application scenarios), it can also be integrated in and need to carry out what secret protection locked its window respectively Among, it is equivalent to another independent function module operation (such as being directly integrated in wechat application) of the application.
In one embodiment, as shown in fig. 7, a kind of device of displaying screen locking window, including window object acquisition module 102, window ID acquisition module 104, Window match module 106 and screen locking display module 108, wherein:
Window object acquisition module 102, for obtaining window object in operating status.
Window ID acquisition module 104, the window ID for obtaining window object in operating status.
Window match module 106, for obtaining preset secret protection configuration, judge window ID whether with secret protection Configurations match.
Screen locking display module 108 will for when window ID matches, generating screen locking window corresponding with window object It is set as operating status and shows.
In the present embodiment, window object acquisition module 102 is additionally operable to obtain the window stack of memory window object, at acquisition In the window object of the stack top of window stack.
In the present embodiment, screen locking display module 108 is additionally operable to for screen locking window to be added to the stack top of window stack.
In the present embodiment, screen locking display module 108 is additionally operable to obtain the size and location of window object, according to window pair The size and location of elephant generates screen locking window.
In the present embodiment, as shown in figure 8, the device, which further includes window, locks configuration module 110, for showing that privacy is protected The shield configuration page, secret protection configuration page face include options optionally corresponding with window ID;The privacy for receiving input is protected Configuration-direct is protected, the corresponding window ID chosen of extraction will be in window ID storage to secret protection configuration file.
Window match module 106 is additionally operable to read secret protection configuration file.
In the present embodiment, Window match module 106 is additionally operable to obtain association window mark corresponding with window ID, obtains It takes association window to identify the corresponding verification frequency of failure, judges whether it is greater than or equal to frequency of failure threshold value, if so, judgement It is matched.
In the present embodiment, screen locking window includes cryptographic check component, sliding trace verification component, vocal print verification component And/or finger-mark check component.As shown in figure 8, the device further includes proof of identity module 112, the password solution for receiving input Instruction, sliding trace unlock instruction, vocal print unlock instruction and/or unlocked by fingerprint instruction are locked, and it is verified;Verification passes through Afterwards, then screen locking window is removed.
In the present embodiment, as shown in figure 8, the device further includes verification frequency statistics module 114, for calculating screen locking window Mouth verification corresponding with window ID filters out its window ID of the verification by frequency more than frequency threshold by frequency, will It is set as mismatch state in secret protection configuration.
In the present embodiment, as shown in figure 8, it is to mismatch that verification frequency statistics module 114, which is additionally operable to setting window ID, The life cycle of state;When life cycle arrives at, it sets window ID to matching status.
In conclusion implementing the embodiment of the present invention, will have the advantages that:
For the comprehensive application with multiple function modules, user can be directed to function module relatively independent in the application Secret protection configuration is carried out respectively to lock so that user using should in application, only need when accessing specific function module, Side need to input corresponding check password, without when the application switches in any case, input validation password repeatedly, therefore The checking procedure for reducing redundancy, improves operating efficiency so that the convenience of operation improves.
Further, since releasing process is reduced, mobile terminal will also expend less computing resource for showing locking screen interface With carry out verification calculating so that the power consumption of mobile terminal also reduces, when battery durable to improve mobile terminal Between.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer read/write memory medium In, the program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (12)

1. a kind of method of displaying screen locking window, including:
The window stack of memory window object is obtained, the window object of the stack top in the window stack is obtained;
Obtain the window ID of the window object of the stack top in the window stack;
Obtain preset secret protection configuration, judge the window ID whether with the secret protection configurations match, if so, Then:
The size and location for obtaining the window object generates screen locking window according to the size and location of the window object, will The screen locking window is added to stack top and the displaying of the window stack, includes proof of identity component in the screen locking window, in institute The verification of proof of identity component is stated when passing through, the screen locking window is removed, so that positioned at the screen locking window below window stack The corresponding window object of the window ID come back to the stack top of window stack, be able to show and obtain input focus.
2. the method for displaying screen locking window according to claim 1, which is characterized in that the method further includes:
Show that secret protection configures the page, secret protection configuration page face includes selection optionally corresponding with window ID ;
The secret protection configuration-direct of input is received, the corresponding window ID chosen of extraction stores the window ID to hidden In private relaying configuration file;
Described the step of obtaining preset secret protection configuration is:
Read the secret protection configuration file.
3. the method for displaying screen locking window according to claim 1, which is characterized in that described to judge that the window ID is It is no to further include with the step of secret protection configurations match:
Association window mark corresponding with the window ID is obtained, the association window is obtained and identifies corresponding verification failure time Number, judges whether it is greater than or equal to frequency of failure threshold value, if so, judging its matching.
4. the method for displaying screen locking window according to claim 1, which is characterized in that the identity school in the screen locking window It includes cryptographic check component, sliding trace verification component, vocal print verification component and/or finger-mark check component to test component;
Further include after the step of stack top and displaying that the screen locking window is added to the window stack:
Receive the password unlock instruction, sliding trace unlock instruction, sound inputted in the proof of identity component in the screen locking window Line unlock instruction and/or unlocked by fingerprint instruction, and it is verified by the proof of identity component;
After verification passes through, then the screen locking window is removed.
5. the method for displaying screen locking window according to claim 4, which is characterized in that after the step of verification passes through Further include:
Screen locking window verification corresponding with the window ID is calculated by frequency, its verification is filtered out and is more than by frequency The window ID of frequency threshold sets the window ID filtered out to mismatch state in secret protection configuration.
6. the method for displaying screen locking window according to claim 5, which is characterized in that the window ID that will be filtered out Further include in the step of being set as mismatch state during the secret protection configures:
The life cycle that the window ID is mismatch state is set;
When the life cycle arrives at, it sets the window ID to matching status.
7. a kind of device of displaying screen locking window, which is characterized in that including:
Window object acquisition module obtains the stack in the window stack for obtaining the window stack for storing the window object The window object on top;
Window ID acquisition module, the window ID of the window object for obtaining the stack top in the window stack;
Window match module judges whether the window ID protects with the privacy for obtaining preset secret protection configuration Protect configurations match;
Screen locking display module, for when the window ID matches, the size and location of the window object being obtained, according to institute The size and location for stating window object generates screen locking window, and the screen locking window is added to stack top and the exhibition of the window stack Show, includes proof of identity component in the screen locking window, when proof of identity component verification passes through, the screen locking window quilt It removes, so as to come back to window positioned at the window ID corresponding window object of the screen locking window below window stack The stack top of stack is able to show and obtains input focus.
8. the device of displaying screen locking window according to claim 7, which is characterized in that described device further includes that window locks Configuration module, for show secret protection configure the page, secret protection configuration page face include optionally with window ID pair The options answered;The secret protection configuration-direct of input is received, the corresponding window ID chosen of extraction deposits the window ID It stores up in secret protection configuration file;
The Window match module is additionally operable to read the secret protection configuration file.
9. the device of displaying screen locking window according to claim 7, which is characterized in that the Window match module is additionally operable to Association window mark corresponding with the window ID is obtained, the association window is obtained and identifies the corresponding verification frequency of failure, Judge whether it is greater than or equal to frequency of failure threshold value, if so, judging its matching.
10. the device of displaying screen locking window according to claim 7, which is characterized in that the identity in the screen locking window Verification component includes cryptographic check component, sliding trace verification component, vocal print verification component and/or finger-mark check component;
Described device further includes proof of identity module, for receive inputted in the proof of identity component in the screen locking window it is close Code unlock instruction, sliding trace unlock instruction, vocal print unlock instruction and/or unlocked by fingerprint instruction, and it is verified;Pass through After the proof of identity component verification passes through, then the screen locking window is removed.
11. the device of displaying screen locking window according to claim 10, which is characterized in that described device further includes verification frequency Rate statistical module filters out its verification for calculating screen locking window verification corresponding with the window ID by frequency It is more than the window ID of frequency threshold by frequency, sets it to mismatch state in secret protection configuration.
12. the device of displaying screen locking window according to claim 11, which is characterized in that the verification frequency statistics module It is additionally operable to that the life cycle that the window ID is mismatch state is arranged;When the life cycle arrives at, by the window Mark is set as matching status.
CN201410665515.3A 2014-11-19 2014-11-19 A kind of method and device of displaying screen locking window Active CN104375836B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410665515.3A CN104375836B (en) 2014-11-19 2014-11-19 A kind of method and device of displaying screen locking window

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410665515.3A CN104375836B (en) 2014-11-19 2014-11-19 A kind of method and device of displaying screen locking window

Publications (2)

Publication Number Publication Date
CN104375836A CN104375836A (en) 2015-02-25
CN104375836B true CN104375836B (en) 2018-08-17

Family

ID=52554779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410665515.3A Active CN104375836B (en) 2014-11-19 2014-11-19 A kind of method and device of displaying screen locking window

Country Status (1)

Country Link
CN (1) CN104375836B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780209A (en) * 2015-04-07 2015-07-15 北京奇点机智信息技术有限公司 Portable equipment and server for realizing sharing interface scenario
CN105260658A (en) * 2015-09-17 2016-01-20 广东欧珀移动通信有限公司 Method and system for setting privacy interface
CN105354030A (en) * 2015-11-06 2016-02-24 天脉聚源(北京)教育科技有限公司 Method and apparatus for controlling minimization of window
CN105426717A (en) * 2015-11-11 2016-03-23 广东欧珀移动通信有限公司 Interface display method and apparatus
CN105956434A (en) * 2016-05-25 2016-09-21 乐视控股(北京)有限公司 Screen locking/unlocking method and device of intelligent terminal
US10146560B2 (en) 2016-09-30 2018-12-04 Xiaoyun Wu Method and apparatus for automatic processing of service requests on an electronic device
CN106325889A (en) 2016-09-30 2017-01-11 北京奇点机智信息技术有限公司 Data processing method and device
CN107608726A (en) * 2017-08-10 2018-01-19 珠海市君天电子科技有限公司 Monitoring method, device, electronic equipment and storage medium
CN107659490B (en) * 2017-09-27 2021-01-12 Oppo广东移动通信有限公司 File sending method, terminal and storage medium
CN107679377A (en) * 2017-09-30 2018-02-09 广东欧珀移动通信有限公司 Application interface switching method, device, storage medium and electronic equipment
CN109101289B (en) * 2018-06-21 2021-09-10 海信视像科技股份有限公司 Data processing method and device for terminal equipment
CN109583228B (en) * 2018-10-30 2021-05-07 中国科学院信息工程研究所 Privacy information management method, device and system
CN110764844A (en) * 2019-10-25 2020-02-07 芜湖盟博科技有限公司 Multi-application window custom layout method on vehicle-mounted system
CN111274564A (en) * 2020-01-14 2020-06-12 青岛海信移动通信技术股份有限公司 Communication terminal and application unlocking method in split screen mode
CN112051954A (en) * 2020-10-12 2020-12-08 展讯通信(天津)有限公司 Page fixing display method and device, electronic equipment and storage medium
CN114611118A (en) * 2022-05-12 2022-06-10 麒麟软件有限公司 Android multi-window application screen locking method based on Linux system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727281A (en) * 2009-09-04 2010-06-09 丁贵 System and method for one-key locking of computer monitor
CN103064585A (en) * 2012-12-24 2013-04-24 东莞宇龙通信科技有限公司 Terminal unlocking method and terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063602B (en) * 2010-12-28 2014-06-11 中兴通讯股份有限公司 Method and terminal for locking and unlocking terminal screen based on RFID (Radio Frequency Identification)

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727281A (en) * 2009-09-04 2010-06-09 丁贵 System and method for one-key locking of computer monitor
CN103064585A (en) * 2012-12-24 2013-04-24 东莞宇龙通信科技有限公司 Terminal unlocking method and terminal

Also Published As

Publication number Publication date
CN104375836A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
CN104375836B (en) A kind of method and device of displaying screen locking window
US20180247483A1 (en) Security systems for protecting an asset
CN106453061B (en) A kind of method and system identifying network fraudulent act
CN106952096A (en) Security certification system, method and the credible identifying device of client of client device
US9756028B2 (en) Methods, systems and computer program products for secure access to information
CN106341313A (en) Method and apparatus for obtaining billing information
CN103745148A (en) Information protection method based on fingerprint recognition and mobile terminal
CN108229956A (en) Network bank business method, apparatus, system and mobile terminal
CN104853030B (en) The method and mobile terminal of a kind of information processing
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN103312519A (en) Dynamic password device and working method thereof
CN105138887B (en) A kind of input method of log-on message, device and terminal device
CN105897708A (en) Information protection method and mobile terminal
CN103873442B (en) The treating method and apparatus of log-on message
CN109088872A (en) Application method, device, electronic equipment and the medium of cloud platform with service life
CN107153994A (en) A kind of method for authenticating user identity, fiscard and financial terminal
CN107977841A (en) The method and its terminal of two-dimension code safe payment are realized based on driving layer
CN107609362A (en) A kind of smart card logs in the method for Windows systems and privately owned authority provides device
CN107274179A (en) A kind of bank card identity identifying method, system and Cloud Server
Abi Din et al. Boxer: preventing fraud by scanning credit cards
Jones et al. Digital forensics and the issues of identity
CN111882425A (en) Service data processing method and device and server
Reno Multifactor authentication: Its time has come
CN107094079A (en) A kind of method for opening termination function, device and equipment
GB2511279A (en) Automated multi-factor identity and transaction authentication by telephone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant