CN104915588A - Privacy protection method and device for electronic equipment - Google Patents

Privacy protection method and device for electronic equipment Download PDF

Info

Publication number
CN104915588A
CN104915588A CN201510319959.6A CN201510319959A CN104915588A CN 104915588 A CN104915588 A CN 104915588A CN 201510319959 A CN201510319959 A CN 201510319959A CN 104915588 A CN104915588 A CN 104915588A
Authority
CN
China
Prior art keywords
application software
fingerprint
fingerprint template
electronic equipment
enter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510319959.6A
Other languages
Chinese (zh)
Other versions
CN104915588B (en
Inventor
刘志仓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sanet Electronics Co Ltd
Original Assignee
Shenzhen Sanet Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sanet Electronics Co Ltd filed Critical Shenzhen Sanet Electronics Co Ltd
Priority to CN201510319959.6A priority Critical patent/CN104915588B/en
Publication of CN104915588A publication Critical patent/CN104915588A/en
Application granted granted Critical
Publication of CN104915588B publication Critical patent/CN104915588B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Abstract

The invention is applicable to the technical field of electronic equipment and provides a privacy protection method and device for electronic equipment. The method includes: on receiving a request to start first application software, acquiring information of application software related to the first application software; when the application software related to the first application software includes second application software, acquiring a first fingerprint template related to the second application software; allowing a requesting user to enter a fingerprint; if the fingerprint entered by the user matches with the first fingerprint template, entering the second application software. The privacy protection method and device has the advantages that the second application software needing privacy protection is hidden in the first application software, displaying an icon of the second application software on the desktop of the electronic equipment is avoided, the application software requiring privacy protection is related to the other piece of application software, other operators are avoided checking on the private application software, and the privacy protection of the electronic equipment is better.

Description

The method for secret protection of electronic equipment and device
Technical field
The invention belongs to technical field of electronic equipment, particularly relate to method for secret protection and the device of electronic equipment.
Background technology
Use in the process of electronic equipment user, usually can run into the situation that friend or household need to check the electronic equipment of user.But, often record the privacy information of many users in electronic equipment, such as, the communications records under instant messaging application, notepad, or the application software etc. of privacy.User is unwilling these privacy informations in electronic equipment to show friend or household usually.
In prior art, for needing the application software of carrying out secret protection, usually when user clicks this application software, request user inputs the identity that password carrys out authentication of users.But the friend of user or household, after this application software of click sees password authentification window, may produce strong curiosity, require that user inputs password, cause the privacy leakage of user.
Summary of the invention
Given this, embodiments provide a kind of method for secret protection and device of electronic equipment, with the problem that the secret protection effect solving existing electronic equipment is poor.
On the one hand, embodiments provide a kind of method for secret protection of electronic equipment, comprising:
When receiving the request of startup first application software, obtain the information of the application software associated with described first application software;
When the application software associated with described first application software comprises the second application software, obtain the first fingerprint template associated with described second application software;
Request user inputs fingerprint;
When the fingerprint that described user inputs and described first fingerprint template match, enter described second application software.
Second aspect, embodiments provides a kind of privacy protection device of electronic equipment, comprising:
Associated application software obtaining unit, for when receiving the request of startup first application software, obtains the information of the application software associated with described first application software;
First fingerprint template acquiring unit, during for comprising the second application software when the application software associated with described first application software, obtains the first fingerprint template associated with described second application software;
Request unit, inputs fingerprint for asking user;
Second application software enters unit, for when the fingerprint that described user inputs and described first fingerprint template match, enters described second application software.
The beneficial effect that the embodiment of the present invention compared with prior art exists is: the embodiment of the present invention is by by under needing second application software of carrying out secret protection to be hidden in the first application software, and the icon of the second application software is not shown at the desktop of electronic equipment, after the request receiving startup first application software, if fingerprint and first fingerprint template of user's input match, then enter the second application software, shield the conventional mouth needing the application software of carrying out secret protection thus, and will the application software of carrying out secret protection be needed to be associated with Another Application software, thus the operator avoided beyond user checks the application software of privacy, improve the secret protection effect of electronic equipment.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the realization flow figure of the method for secret protection of the electronic equipment that the embodiment of the present invention provides;
Fig. 2 is the realization flow figure of the method for secret protection of the electronic equipment that another embodiment of the present invention provides;
Fig. 3 is the realization flow figure of the method for secret protection of the electronic equipment that another embodiment of the present invention provides;
Fig. 4 is the structured flowchart of the privacy protection device of the electronic equipment that the embodiment of the present invention provides.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 shows the realization flow figure of the method for secret protection of the electronic equipment that the embodiment of the present invention provides, and details are as follows:
In step S101, when receiving the request of startup first application software, obtain the information of the application software associated with the first application software.
It should be noted that, the electronic equipment in the embodiment of the present invention can be mobile terminal or computing machine etc., in this no limit.Wherein, mobile terminal can comprise mobile phone (or being called " honeycomb " phone) and have the computing machine of mobile terminal, such as, can be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device, they and wireless access network exchange language and/or data.Such as, Personal Communications Services (Personal Communication Service, PCS) phone, wireless phone, Session initiation Protocol (Session Initiation Protocol, SIP) phone, wireless local loop (Wireless Local Loop, WLL) stand, personal digital assistant (Personal Digital Assistant, the equipment such as PDA), in this no limit.
Alternatively, in the embodiment of the present invention, electronic equipment comprises fingerprint sensor, or the external finger print input device of electronic equipment.
As one embodiment of the present of invention, the first application software refers to a certain application software not needing to hide its icon at the desktop of electronic equipment.
When receiving the request of startup first application software, obtain the information of the application software associated with the first application software.It should be noted that there is one or more application software associated with the first application software, also may not there is the application software associated with the first application software.
In step s 102, when the application software associated with the first application software comprises the second application software, obtain the first fingerprint template associated with the second application software.
In embodiments of the present invention, the second application software refers to the application software be hidden under the first application software.The icon of the second application software or information are not presented at the desktop of electronic equipment and the conventional mouth such as arrange.
Such as, the first application software is calendar, and the second application software is the application of a certain instant messaging, and the first fingerprint template associated with the second application software is the finger print information of the right hand forefinger of user.
It should be noted that, when there is multiple application software associated with the first application software, obtaining the fingerprint template associated with these application software respectively.Such as, first application software is calendar, the application software associated with the first application software comprises the second application software and the 3rd application software, second application software is the application of a certain instant messaging, 3rd application software is a certain game application, the first fingerprint template associated with the second application software is the finger print information of the right hand forefinger of user, and the 3rd fingerprint template associated with the 3rd application software is the finger print information of the left index finger of user.
It should be noted that, the first fingerprint template associated with the second application software can comprise at least one group of finger print information.Such as, the first fingerprint template associated with the second application software comprises the finger print information of the finger print information of the right hand forefinger of user and the right hand middle finger of user.
In step s 103, user is asked to input fingerprint.
In step S104, when the fingerprint that user inputs and the first fingerprint template match, enter the second application software.
Fig. 2 shows the realization flow figure of the method for secret protection of the electronic equipment that another embodiment of the present invention provides, with reference to Fig. 2:
In step s 201, when receiving the request of startup first application software, obtain the information of the application software associated with the first application software;
In step S202, when the application software associated with the first application software comprises the second application software, obtain the first fingerprint template associated with the second application software, and obtain the second fingerprint template associated with the first application software;
In step S203, request user inputs fingerprint;
In step S204, when the fingerprint that user inputs and the first fingerprint template match, enter the second application software;
In step S205, when the fingerprint that user inputs and the second fingerprint template match, enter the first application software.
Preferably, described second fingerprint template comprises at least one group of finger print information.
As one embodiment of the present of invention, when the application software associated with the first application software comprises the second application software, obtain the first fingerprint template associated with the second application software, and obtain the second fingerprint template associated with the first application software.Such as, first application software is calendar, second application software is the application of a certain instant messaging, the first fingerprint template associated with the second application software is the finger print information of the right hand forefinger of user, and the second fingerprint template associated with the first application software comprises the finger print information of the finger print information of the left hand thumb of user and the right hand thumb of user.Second fingerprint template comprises at least one group of finger print information, and here, one group of finger print information refers to finger print information corresponding to a finger.
Preferably, after the information of the application software associated with described first application software in described acquisition, described method also comprises:
When there is not the application software associated with the first application software, judge to enter the first application software the need of carrying out authentication;
If enter the first application software not need to carry out authentication, then directly enter the first application software;
If enter the first application software to need to carry out authentication, then obtain the second fingerprint template of associate with the first application software, ask user to input fingerprint, and after the fingerprint inputted user and the second fingerprint template match, then enter the first application software.
In embodiments of the present invention, if there is not the application software associated with the first application software, then the first application software can be set to need to carry out authentication, also can be set to not need to carry out authentication.
Fig. 3 shows the realization flow figure of the method for secret protection of the electronic equipment that another embodiment of the present invention provides, with reference to Fig. 3:
In step S301, when receiving the request of startup first application software, judging whether to there is the application software associated with the first application software, if so, then performing step S302; If not, then step S303 is performed;
In step s 302, when the application software associated with the first application software comprises the second application software, obtain the first fingerprint template associated with the second application software;
In step S303, judging to enter the first application software the need of carrying out authentication, if so, then performing step S304; If not, then step S309 is performed;
In step s 304, the second fingerprint template associated with the first application software is obtained;
In step S305, request user inputs fingerprint;
In step S306, judge whether the fingerprint that user inputs matches with the first fingerprint template, if so, perform step S307; If not, step S308 is performed;
In step S307, enter the second application software;
In step S308, judge whether the fingerprint that user inputs matches with the second fingerprint template, if so, perform step S309; If not, execution step S305 is returned;
In step S309, enter the first application software.
It should be noted that, the first application software in the embodiment of the present invention refers to a certain application software, the convenience that " first " is only statement at this and refers to, and does not mean that the first application software necessarily having correspondence with it in specific implementation of the present invention.Similarly, " second " in the second application software is also only used to statement and refers to conveniently, and does not mean that the second application software necessarily having correspondence with it in specific implementation of the present invention.
Should be understood that in embodiments of the present invention, the size of the sequence number of above-mentioned each process does not also mean that the priority of execution sequence, and the execution sequence of each process should be determined with its function and internal logic, and should not form any restriction to the implementation process of the embodiment of the present invention.
The embodiment of the present invention is by by under needing second application software of carrying out secret protection to be hidden in the first application software, and the icon of the second application software is not shown at the desktop of electronic equipment, after the request receiving startup first application software, if fingerprint and first fingerprint template of user's input match, then enter the second application software, shield the conventional mouth needing the application software of carrying out secret protection thus, and will the application software of carrying out secret protection be needed to be associated with Another Application software, thus the operator avoided beyond user checks the application software of privacy, improve the secret protection effect of electronic equipment.
Fig. 4 shows the structured flowchart of the privacy protection device of the electronic equipment that the embodiment of the present invention provides, and this device can be electronic equipment, also can for being built in the device in electronic equipment.This device may be used for the method for secret protection of the electronic equipment shown in service chart 1 to Fig. 3.For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.
With reference to Fig. 4, this device comprises:
Associated application software obtaining unit 41, for when receiving the request of startup first application software, obtains the information of the application software associated with the first application software;
First fingerprint template acquiring unit 42, during for comprising the second application software when the application software associated with the first application software, obtains the first fingerprint template associated with the second application software;
Request unit 43, inputs fingerprint for asking user;
Second application software enters unit 44, for when the fingerprint that user inputs and the first fingerprint template match, enters the second application software.
Preferably, device also comprises:
Second fingerprint template acquiring unit 45, for obtaining the second fingerprint template associated with the first application software;
First application software enters unit 46, for when the fingerprint that user inputs and the second fingerprint template match, enters the first application software.
Preferably, the second fingerprint template comprises at least one group of finger print information.
Preferably, the first application software enters unit 46 and comprises:
Judgment sub-unit 461, for when there is not the application software associated with the first application software, judges to enter the first application software the need of carrying out authentication;
First enters subelement 462, if do not need to carry out authentication for entering the first application software, then directly enters the first application software;
Second enters subelement 463, if need to carry out authentication for entering the first application software, then obtain the second fingerprint template associated with the first application software, request user inputs fingerprint, and at the fingerprint of user's input and after the second fingerprint template matches, then enter the first application software.
The embodiment of the present invention is by by under needing second application software of carrying out secret protection to be hidden in the first application software, and the icon of the second application software is not shown at the desktop of electronic equipment, after the request receiving startup first application software, if fingerprint and first fingerprint template of user's input match, then enter the second application software, shield the conventional mouth needing the application software of carrying out secret protection thus, and will the application software of carrying out secret protection be needed to be associated with Another Application software, thus the operator avoided beyond user checks the application software of privacy, improve the secret protection effect of electronic equipment.
Those of ordinary skill in the art can recognize, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with the combination of electronic hardware or computer software and electronic hardware.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
Those skilled in the art can be well understood to, and for convenience and simplicity of description, the device of foregoing description and the specific works process of unit, with reference to the corresponding process in preceding method embodiment, can not repeat them here.
In several embodiments that the application provides, should be understood that disclosed apparatus and method can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.
If described function using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part of the part that technical scheme of the present invention contributes to prior art in essence in other words or this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection domain of claim.

Claims (8)

1. a method for secret protection for electronic equipment, is characterized in that, comprising:
When receiving the request of startup first application software, obtain the information of the application software associated with described first application software;
When the application software associated with described first application software comprises the second application software, obtain the first fingerprint template associated with described second application software;
Request user inputs fingerprint;
When the fingerprint that described user inputs and described first fingerprint template match, enter described second application software.
2. the method for claim 1, is characterized in that, after the first fingerprint template that described acquisition associates with described second application software, before described request user inputs fingerprint, described method also comprises:
Obtain the second fingerprint template associated with described first application software;
After described request user inputs fingerprint, described method also comprises:
When the fingerprint that described user inputs and described second fingerprint template match, enter described first application software.
3. method as claimed in claim 2, it is characterized in that, described second fingerprint template comprises at least one group of finger print information.
4. method as claimed in claim 2, is characterized in that, after the information of the application software associated with described first application software in described acquisition, described method also comprises:
When there is not the application software associated with described first application software, judge to enter described first application software the need of carrying out authentication;
If enter described first application software not need to carry out authentication, then directly enter described first application software;
If enter described first application software to need to carry out authentication, then obtain the second fingerprint template associated with described first application software, described user is asked to input fingerprint, and after the fingerprint inputted described user and described second fingerprint template match, then enter described first application software.
5. a privacy protection device for electronic equipment, is characterized in that, comprising:
Associated application software obtaining unit, for when receiving the request of startup first application software, obtains the information of the application software associated with described first application software;
First fingerprint template acquiring unit, during for comprising the second application software when the application software associated with described first application software, obtains the first fingerprint template associated with described second application software;
Request unit, inputs fingerprint for asking user;
Second application software enters unit, for when the fingerprint that described user inputs and described first fingerprint template match, enters described second application software.
6. device as claimed in claim 5, it is characterized in that, described device also comprises:
Second fingerprint template acquiring unit, for obtaining the second fingerprint template associated with described first application software;
First application software enters unit, for when the fingerprint that described user inputs and described second fingerprint template match, enters described first application software.
7. device as claimed in claim 6, it is characterized in that, described second fingerprint template comprises at least one group of finger print information.
8. device as claimed in claim 6, it is characterized in that, described first application software enters unit and comprises:
Judgment sub-unit, for when there is not the application software associated with described first application software, judges to enter described first application software the need of carrying out authentication;
First enters subelement, if do not need to carry out authentication for entering described first application software, then directly enters described first application software;
Second enters subelement, if need to carry out authentication for entering described first application software, then obtain the second fingerprint template associated with described first application software, described user is asked to input fingerprint, and after the fingerprint inputted described user and described second fingerprint template match, then enter described first application software.
CN201510319959.6A 2015-06-11 2015-06-11 The method for secret protection and device of electronic equipment Expired - Fee Related CN104915588B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510319959.6A CN104915588B (en) 2015-06-11 2015-06-11 The method for secret protection and device of electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510319959.6A CN104915588B (en) 2015-06-11 2015-06-11 The method for secret protection and device of electronic equipment

Publications (2)

Publication Number Publication Date
CN104915588A true CN104915588A (en) 2015-09-16
CN104915588B CN104915588B (en) 2018-08-28

Family

ID=54084650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510319959.6A Expired - Fee Related CN104915588B (en) 2015-06-11 2015-06-11 The method for secret protection and device of electronic equipment

Country Status (1)

Country Link
CN (1) CN104915588B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal
CN105893826A (en) * 2016-04-25 2016-08-24 北京奇虎科技有限公司 Message display method and intelligent terminal based on fingerprint information
CN105912911A (en) * 2016-04-29 2016-08-31 乐视控股(北京)有限公司 Method and system for managing application programs of mobile equipment
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
CN114675897A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Application program starting method and related device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
CN103176727A (en) * 2011-12-23 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Application program starting method and communication terminal
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN103514394A (en) * 2012-12-10 2014-01-15 Tcl集团股份有限公司 Icon unlocking method of touch screen equipment and touch screen equipment
CN103955393A (en) * 2014-05-23 2014-07-30 深圳市中兴移动通信有限公司 Method and device for starting application program
US20150106765A1 (en) * 2013-10-10 2015-04-16 Lg Electronics Inc. Mobile terminal and method of controlling therefor

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
CN103176727A (en) * 2011-12-23 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Application program starting method and communication terminal
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN103514394A (en) * 2012-12-10 2014-01-15 Tcl集团股份有限公司 Icon unlocking method of touch screen equipment and touch screen equipment
US20150106765A1 (en) * 2013-10-10 2015-04-16 Lg Electronics Inc. Mobile terminal and method of controlling therefor
CN103955393A (en) * 2014-05-23 2014-07-30 深圳市中兴移动通信有限公司 Method and device for starting application program

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
CN105893826A (en) * 2016-04-25 2016-08-24 北京奇虎科技有限公司 Message display method and intelligent terminal based on fingerprint information
CN105893826B (en) * 2016-04-25 2018-10-23 北京奇虎科技有限公司 Message display method based on finger print information and intelligent terminal
CN105912911A (en) * 2016-04-29 2016-08-31 乐视控股(北京)有限公司 Method and system for managing application programs of mobile equipment
CN114675897A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Application program starting method and related device

Also Published As

Publication number Publication date
CN104915588B (en) 2018-08-28

Similar Documents

Publication Publication Date Title
CN103118031B (en) Log in method and the electronic equipment of application account
CN104915588A (en) Privacy protection method and device for electronic equipment
CN110659512B (en) Picture management method, device, terminal and storage medium
CN104834449A (en) Mobile terminal icon managing method and device
CN101296457A (en) Screen operation method and device
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
US10409972B2 (en) Fingerprint recognition method and mobile terminal
CN105898054A (en) Verification-based message display method and communication terminal
WO2018149138A1 (en) Wireless fidelity (wi-fi) connection method and related product
CN105337739B (en) Safe login method, device, server and terminal
CN103218555A (en) Logging-in method and device for application program
CN105550627A (en) Fingerprint verification method and apparatus
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
CN105827582A (en) Communication encryption method, device and system
CN112685493A (en) Report processing method and device, electronic equipment and storage medium
CN104537301A (en) Method and device for logging in to application and mobile terminal
CN106203141A (en) The data processing method of a kind of application and device
CN102118503B (en) Data protection method, device and terminal
CN108647510A (en) Application program access method and device
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN107622208A (en) Note encryption and decryption method and related product
CN107066864B (en) Application icon display method and device
CN111641554B (en) Message processing method and device and computer readable storage medium
CN105590044A (en) Information authentication method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180828

Termination date: 20200611