CN106611112A - Application program safe processing method, device and equipment - Google Patents

Application program safe processing method, device and equipment Download PDF

Info

Publication number
CN106611112A
CN106611112A CN201611153398.8A CN201611153398A CN106611112A CN 106611112 A CN106611112 A CN 106611112A CN 201611153398 A CN201611153398 A CN 201611153398A CN 106611112 A CN106611112 A CN 106611112A
Authority
CN
China
Prior art keywords
password
application program
application
interface
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611153398.8A
Other languages
Chinese (zh)
Inventor
伍亮雄
刘海涛
张亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201611153398.8A priority Critical patent/CN106611112A/en
Publication of CN106611112A publication Critical patent/CN106611112A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to an application program safe processing method, device and equipment. The method comprises steps of displaying a code setting interface of an application program when detecting an application lock switch of the application program is opened, acquiring codes input for the application program on the code setting interface, and storing the codes with feature information of the application program as an identification key word. Different codes can be independently arranged for each application program opening the application lock switch by the use of the application program safe processing method, and user personalized needs can be met.

Description

Application security processing method, device and equipment
Technical field
It relates to software application technology field, more particularly to application security processing method, device and equipment.
Background technology
Mobile terminal can install various application programs at present, if some application programs are not intended to other users arbitrarily beaten Open, application lock can be set, for example can slide in the application list on the right side of application lock-switch can be selection should Locked with program or unlocked.But in presently relevant technology, when being locked by application program that application lock is selection, only support to The application program of all lockings arranges a unified password.
The content of the invention
To overcome problem present in correlation technique, present disclose provides application security processing method, device and setting It is standby.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of application security processing method, including:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the feature of the application program is believed Breath stores the password as identification key.
Optionally, the characteristic information using the application program stores the password as identification key, including:Will The bag name of the application program stores the password as identification key.
Optionally, described acquisition arranges the password that interface is the application program input in the password, including:
Obtain and the graphical passwords or numerical ciphers that interface is the application program input are set in the password, wherein described Graphical passwords are the graphical passwords or the graphical passwords selected from candidate's figure drawn.
Optionally, storage is encrypted using setting AES during the storage password.
Optionally, methods described also includes:
It is retrieved as the user account bound during the application program input password.
Optionally, methods described also includes:
After Modify password instruction is received, the password modification interface of the application program is shown;
Obtain and be the password of the application modification and store at password modification interface.
Optionally, methods described also includes:
After receiving and resetting cipher instruction, if it is judged that the application program user bound account and the use Family account is proved to be successful, and shows that the password of the application program resets interface;
Obtain the password that interface is the application program replacement is reset in the password and store.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of application security processing method, including:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as the application program and set The independent password put.
Optionally, methods described also includes:
When the application program being inquired according to the characteristic information and being not provided with password, be verified as the application program and set The unified password put.
Optionally, the characteristic information for obtaining the application program includes:Obtain the bag name information of the application program.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of application security processing meanss, including:
First display module, after the application lock-switch for detecting application program is unlocked, shows the application program Password arrange interface;
Password setup module, is the application journey for obtain the password shown in first display module to arrange interface The password of sequence input, stores the password using the characteristic information of the application program as identification key.
Optionally, the bag name of the application program is stored described close as identification key by the password setup module Code.
Optionally, described device also includes:
Binding module, for the user bound account when password is input into for the application program.
Optionally, described device also includes:
Second display module, for after Modify password instruction is received, showing the password modification circle of the application program Face;
Password modified module, is the application journey for obtain the password shown in second display module to change interface The password of sequence modification is simultaneously stored.
Optionally, described device also includes:
3rd display module, for after replacement cipher instruction is received, if it is judged that the application program has been tied up The user account and the user account of the fixed binding module binding is proved to be successful, and shows that the password of the application program resets Interface;
Password resets module, is the application journey for obtain the password shown in the 3rd display module to reset interface The password of sequence replacement is simultaneously stored.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of application security processing meanss, including:
Feature acquisition module, when being unlocked for the application program to having been switched on using lock-switch, obtains described answering With the characteristic information of program;
Correction verification module, sets for inquiring the application program in the characteristic information obtained according to the feature acquisition module When having put password, the independent password that the application program is arranged is verified as.
Optionally, described device also includes:
Second correction verification module, for inquiring the application journey in the characteristic information obtained according to the feature acquisition module When sequence is not provided with password, the unified password that the application program is arranged is verified as.
In terms of the 5th of the embodiment of the present disclosure, there is provided a kind of mobile terminal device, including:
Processor and the memorizer for storing processor executable;
Wherein, the processor is configured to:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the feature of the application program is believed Breath stores the password as identification key.
In terms of the 6th of the embodiment of the present disclosure, there is provided a kind of mobile terminal device, including:
Processor and the memorizer for storing processor executable;
Wherein, the processor is configured to:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as the application program and set The independent password put.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:
The disclosure can display to the user that the application program after the application lock-switch for detecting application program is unlocked Password arranges interface, and it is that the application program arranges password that can arrange interface in the password by user, is then answered described The password of the input is stored as identification key with the characteristic information of program, being so achieved that can be to open application lock Each application program of switch is separately provided different passwords, and is no longer to unify password, meets the individual demand of user, and And characteristic information with unique mark application program, therefore can store the password of the input using characteristic information as identification key The corresponding relation of password and application program can also more preferably be distinguished.
The disclosure can be to allow user's user bound account when password is input into as the application program.
The disclosure can also provide password modification function, after Modify password instruction is received, show the application program Password modification interface, then obtain the password modification interface be the password of the application modification and store.
The disclosure also provides password function of reset when forgetting Password, after replacement cipher instruction is received, if it is determined that Go out the application program user bound account and user account is proved to be successful, show the password weight of the application program Interface is put, and then to be obtained and the password that interface is the application program replacement is reset in the password and store.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
During accompanying drawing herein is merged in description and the part of this specification is constituted, show the enforcement for meeting the disclosure Example, and be used for explaining the principle of the disclosure together with description.
Fig. 1 is a kind of flow chart of application security processing method of the disclosure according to an exemplary embodiment.
Fig. 2 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment Figure.
Fig. 3 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment Figure.
Fig. 4 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment Figure.
Fig. 5 is a kind of block diagram of application security processing meanss of the disclosure according to an exemplary embodiment.
Fig. 6 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment Figure.
Fig. 7 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment Figure.
Fig. 8 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment Figure.
Fig. 9 is an a kind of structured flowchart of mobile terminal device of the disclosure according to an exemplary embodiment.
Figure 10 is an a kind of structured flowchart of equipment of the disclosure according to an exemplary embodiment.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by The example of consistent apparatus and method in terms of some described in detail in claims, the disclosure.
The disclosure using term be purpose only merely for description specific embodiment, and be not intended to be limiting the disclosure. " one kind ", " described " and " being somebody's turn to do " of singulative used in disclosure and the accompanying claims book is also intended to include majority Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein is referred to and is wrapped Containing one or more associated any or all possible combinations for listing project.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure A little information should not necessarily be limited by these terms.These terms are only for same type of information is distinguished from each other out.For example, without departing from In the case of disclosure scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
Present disclose provides a kind of application security processing method, can be to open to apply journey using each of lock-switch Sequence is separately provided different passwords, meets the individual demand of user.
Fig. 1 is a kind of flow chart of application security processing method of the disclosure according to an exemplary embodiment.
As shown in figure 1, the method can apply to, in mobile terminal, comprise the following steps:
In a step 101, detect application program application lock-switch be unlocked after, show the password of the application program Interface is set.
In a step 102, obtain and the password that interface is the application program input is set in the password, by the application The characteristic information of program stores the password as identification key.
The characteristic information of the application program can for example be the bag name of application program but be not limited to this.Application program Bag name can be used for unique mark application program.
The password for application program input, for example, can be graphical passwords or numerical ciphers, wherein the figure Shape password can be the graphical passwords or the graphical passwords selected from candidate's figure drawn.
From the embodiment, the disclosure, can be aobvious to user after the application lock-switch for detecting application program is unlocked Show that the password of the application program arranges interface, it is that application program setting is close that can arrange interface in the password by user Code, then the characteristic information of the application program is stored as identification key the password of the input, is so achieved that Different passwords can be separately provided using each application program of lock-switch to open, and no longer be to unify password, be met and use The individual demand at family, and characteristic information can be with unique mark application program, therefore using characteristic information as identification key The password for storing the input can also more preferably distinguish the corresponding relation of password and application program.
Fig. 2 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment Figure.
As shown in Fig. 2 the method can apply to, in mobile terminal, comprise the following steps:
In step 201, detect the state of the application lock-switch of application program.
In step 202., detect application program application lock-switch be unlocked after, show the password of the application program Interface is set.
The disclosure shows the close of the application program when application lock-switch for opening certain application program is detected Code arranges interface, and independent password settings button is provided in the interface.Such as user is arranged in list in application lock, clicks on wherein one Individual entry jumps to the current password for clicking on application program and arranges interface, and the password arranges interface and provides the button for arranging password.
In step 203, obtain and the password and obtain binding that interface is the application program input is set in the password User account.
The step can be obtained and arrange the graphical passwords that interface is the application program input or digital close in the password Code, wherein the graphical passwords are the graphical passwords or the graphical passwords selected from candidate's figure drawn.
The step obtains the independent password that user is that application program is arranged, and can also bind when independent password is arranged in addition The user account for currently logging in, can be used to use when subsequently resetting currently configured independent password.It should be noted that, except Outside by the way of the user bound account, it would however also be possible to employ the mode of offering question and answer is used for follow-up password and resets.
In step 204, the password is stored using the bag name of the application program as identification key.
When user arranges independent password to certain application program, the disclosure is with the bag name of application program (packagename) password is stored as identification key KEY, the Bao Mingke of application program is with unique mark application program.Separately Outward for safety, password can be encrypted using set algorithm, for example with SHA-1 (Secure Hash Algorithm- 1, the 1st version of SHA) algorithm for encryption storage.
In step 205, the password modification interface of the application program after Modify password instruction is received, is shown, is obtained It is taken at the password modification interface to be the password of the application modification and store.
The disclosure can also provide password modification in the independent password of application program is arranged, and user can change certain should The password modification interface of the application program with the independent password of program, i.e., after Modify password instruction is received, is shown, is obtained It is the password of the application modification and stores at password modification interface.
In step 206, after receiving and resetting cipher instruction, if it is judged that the application program user bound The account and user account is proved to be successful, shows that the password of the application program resets interface, obtains and reset in the password Interface is the password that the application program resets and stores.
The disclosure also provides the function of reset after independent password is forgotten, for user unblock the page provide forget Password by Button, detects user and clicks on when forgetting Password, first judge whether user bound account, if user bound account, The user account checking page is ejected, after user account is proved to be successful, independent password is entered into and is reset interface, obtain described close Code resets the independent password that interface is the application program replacement and stores.If it is judged that unbound user account, points out to use The unbound user account in family can not reset password.
It should be noted that, above-mentioned steps 205 and 206 do not have the ordering relation of certainty.
From the embodiment it is found that the disclosure is except can individually set using each application program of lock-switch to open Different passwords are put, is met outside the individual demand of user, password modification function can also be provided, Modify password is being received After instruction, the password modification interface of the application program is shown, it is the application journey then to obtain at password modification interface The password of sequence modification is simultaneously stored.The disclosure also provides password function of reset when forgetting Password, and is receiving replacement cipher instruction Afterwards, if it is judged that the application program user bound account and user account is proved to be successful, shows the application The password of program resets interface, then to obtain and reset the password that interface is the application program replacement in the password and store.
Fig. 3 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment Figure.
As shown in figure 3, the method can apply to, in mobile terminal, comprise the following steps:
In step 301, when the application program to having been switched on using lock-switch is unlocked, obtain the application program Characteristic information.
The characteristic information of the application program can for example be the bag name of application program but be not limited to this.Application program Bag name can be used for unique mark application program.
In step 302, when the application program being inquired according to the characteristic information and being provided with password, be verified as institute State the independent password of application program setting.
From the embodiment it is found that the disclosure is user realizes being to open each application program using lock-switch After being separately provided the function of different passwords, when the application program to having been switched on using lock-switch is unlocked, can obtain The characteristic information of the application program is taken, then can inquire about whether the application program is provided with close according to the characteristic information Code, if being provided with password, verifies the independent password that the application program is arranged, so as to protect application security.
Fig. 4 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment Figure.
As shown in figure 4, the method can apply to, in mobile terminal, comprise the following steps:
In step 401, when the application program to having been switched on using lock-switch is unlocked, obtain the application program Bag name information.
In step 402, password is provided with to the application program in the bag name information inquiry according to the application program When, it is verified as the independent password that the application program is arranged.
Whether the disclosure first determines whether current application program already provided with independent password when locked application is solved.Can To get bag name information from solution locked application, whether there is to judge according to the password that bag name information can inquire about storage Configured independent password, if finding password presence, represents configured independent password, then just verify individually close Code, otherwise proceeds to the unified password of step 403 verification.
In step 403, when the application program being inquired according to the characteristic information and being not provided with password, be verified as institute State the unified password of application program setting.
It should be noted that, above-mentioned steps 402 and 403 do not have the ordering relation of certainty.
Corresponding with aforementioned applications function realizing method embodiment, the disclosure additionally provides a kind of application security and processes Device and corresponding embodiment.
Fig. 5 is a kind of block diagram of application security processing meanss of the disclosure according to an exemplary embodiment.
The device can be in mobile terminal.With reference to Fig. 5, can wrap in a kind of application security processing meanss Include:First display module 51, password setup module 52.
First display module 51, after the application lock-switch for detecting application program is unlocked, shows the application journey The password of sequence arranges interface.
Password setup module 52, is described answering for obtain the password shown in first display module 51 to arrange interface The password being input into program, stores the password using the characteristic information of the application program as identification key.
Wherein, the characteristic information of the application program can for example be the bag name of application program but be not limited to this.Using The bag name of program can be used for unique mark application program.
From the embodiment, the disclosure, can be aobvious to user after the application lock-switch for detecting application program is unlocked Show that the password of the application program arranges interface, it is that application program setting is close that can arrange interface in the password by user Code, then the characteristic information of the application program is stored as identification key the password of the input, is so achieved that Different passwords can be separately provided using each application program of lock-switch to open, and no longer be to unify password, be met and use The individual demand at family, and characteristic information can be with unique mark application program, therefore using characteristic information as identification key The password for storing the input can also more preferably distinguish the corresponding relation of password and application program.
Fig. 6 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment Figure.
With reference to Fig. 6, can include in a kind of application security processing meanss:First display module 51, password is arranged Module 52, binding module 53, the second display module 54, Password modified module 55, the 3rd display module 56, password reset module 57。
First display module 51, the function of password setup module 52 may refer to Fig. 5 descriptions.
Wherein, can be encrypted using set algorithm during the storage of password setup module 52 password, for example with SHA-1 (Secure Hash Algorithm-1, SHA first version) algorithm for encryption is stored.
Wherein, the bag name of the application program is stored described close as identification key by the password setup module 52 Code.The bag name of application program can be used for unique mark application program.
Binding module 53, for the user bound account when password is input into for the application program, can be used for subsequent cryptographic Verified during replacement.
Second display module 54, for after Modify password instruction is received, showing the password modification of the application program Interface.
Password modified module 55, answers for described for obtaining the password modification interface shown in second display module 54 With the password of modification of program and store.
3rd display module 56, for after replacement cipher instruction is received, if it is judged that the application program is The user account and the user account for binding the binding of the binding module 53 is proved to be successful, and shows the password of the application program Reset interface.
Password replacement module 57, is described answering for obtain the password shown in the 3rd display module 56 to reset interface With program reset password and store.
Fig. 7 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment Figure.
The device can be in mobile terminal.With reference to Fig. 7, can wrap in a kind of application security processing meanss Include:Feature acquisition module 71, the first correction verification module 72.
Feature acquisition module 71, when being unlocked for the application program to having been switched on using lock-switch, obtains described The characteristic information of application program.
First correction verification module 72, for should described in inquiring in the characteristic information obtained according to the feature acquisition module 71 When password is provided with program, be verified as the independent password that the application program is arranged.
The characteristic information of the application program can for example be the bag name of application program but be not limited to this.
From the embodiment it is found that the disclosure is user realizes being to open each application program using lock-switch After being separately provided the function of different passwords, when the application program to having been switched on using lock-switch is unlocked, can obtain The characteristic information of the application program is taken, then can inquire about whether the application program is provided with close according to the characteristic information Code, if being provided with password, verifies the independent password that the application program is arranged, so as to protect application security.
Fig. 8 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment Figure.
The device can be in mobile terminal.With reference to Fig. 8, can wrap in a kind of application security processing meanss Include:Feature acquisition module 71, the first correction verification module 72, the second correction verification module 73.
Feature acquisition module 71, when being unlocked for the application program to having been switched on using lock-switch, obtains described The characteristic information of application program.
First correction verification module 72, for should described in inquiring in the characteristic information obtained according to the feature acquisition module 71 When password is provided with program, be verified as the independent password that the application program is arranged.
Second correction verification module 73, for should described in inquiring in the characteristic information obtained according to the feature acquisition module 71 When password is not provided with program, be verified as the unified password that the application program is arranged.
With regard to the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
For device embodiment, as which corresponds essentially to embodiment of the method, so related part is referring to method reality Apply the part explanation of example.Device embodiment described above is only schematic, wherein illustrating as separating component Module can be or may not be physically separate, as the part that module shows can be or may not be Physical module, you can local to be located at one, or can also be distributed on multiple mixed-media network modules mixed-medias.Can be according to the actual needs Select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying wound In the case that the property made is worked, you can to understand and implement.
Fig. 9 is an a kind of structured flowchart of mobile terminal device of the disclosure according to an exemplary embodiment.
With reference to Fig. 9, can include in mobile terminal device:Processor 901 and processor 901 is executable to be referred to for storing The memorizer 902 of order;
Wherein, processor 901 is configured to:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the feature of the application program is believed Breath stores the password as identification key.
Or, the processor 901 is configured to:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as the application program and set The independent password put.
It should be noted that, other programs of the storage of memorizer 902, referring specifically to the description in previous methods flow process, this Place repeats no more, and processor 901 is additionally operable to other programs for performing the storage of memorizer 902.
Figure 10 is an a kind of structured flowchart of equipment of the disclosure according to an exemplary embodiment.
With reference to Figure 10, for example, equipment 1000 can be the mobile phone with routing function, computer, digital broadcasting end End, messaging devices, game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
Equipment 1000 includes following one or more assemblies:Process assembly 1002, memorizer 1004, power supply module 1006, Multimedia groupware 1008, audio-frequency assembly 1010, the interface 1012 of input/output (I/O), sensor cluster 1014, and communication Component 10110.
The integrated operation of 1002 usual control device 1000 of process assembly, such as with display, call, data communication, The associated operation of camera operation and record operation.Process assembly 1002 can include one or more processors 1020 to perform Instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 1002 can include one or more moulds Block, the interaction being easy between process assembly 1002 and other assemblies.For example, process assembly 1002 can include multi-media module, To facilitate the interaction between multimedia groupware 1008 and process assembly 1002.
Memorizer 1004 is configured to store various types of data to support the operation in equipment 1000.These data Example includes the instruction of any application program or method for operating on the device 1000, contact data, telephone book data, Message, picture, video etc..Memorizer 1004 can by any kind of volatibility or non-volatile memory device or they Combination realizes, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 1006 provides electric power for the various assemblies of equipment 1000.Power supply module 1006 can include power management System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for equipment 1000.
Multimedia groupware 1008 is included in the screen of one output interface of offer between equipment 1000 and user.At some In embodiment, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Touch screen is may be implemented as, to receive the input signal from user.Touch panel includes one or more touch sensors With the gesture on sensing touch, slip and touch panel.Touch sensor can not only sensing touch or sliding action border, But also detect the persistent period related to touch or slide and pressure.In certain embodiments, multimedia groupware 1008 Including a front-facing camera and/or post-positioned pick-up head.When equipment 1000 is in operator scheme, such as screening-mode or video mode When, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and rearmounted shooting Head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 1010 is configured to output and/or input audio signal.For example, audio-frequency assembly 1010 includes a wheat Gram wind (MIC), when equipment 1000 is in operator scheme, such as call model, logging mode and speech recognition mode, mike quilt It is configured to receive external audio signal.The audio signal for being received can be further stored in memorizer 1004 or via communication Component 10110 sends.In certain embodiments, audio-frequency assembly 1010 also includes a speaker, for exports audio signal.
I/O interfaces 1012 are that interface, above-mentioned peripheral interface module are provided between process assembly 1002 and peripheral interface module Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and Locking press button.
Sensor cluster 1014 includes one or more sensors, and the state for various aspects are provided for equipment 1000 is commented Estimate.For example, sensor cluster 1014 can detect the opening/closed mode of equipment 1000, such as relative localization of component, group Display and keypad of the part for equipment 1000, sensor cluster 1014 can be with 1,000 1 groups of testing equipment 1000 or equipment The position change of part, user are presence or absence of with what equipment 1000 was contacted, 1000 orientation of equipment or acceleration/deceleration and equipment 1000 temperature change.Sensor cluster 1014 can include proximity transducer, be configured to do not having any physics to connect The presence of object nearby is detected when tactile.Sensor cluster 1014 can also include optical sensor, such as CMOS or ccd image sensing Device, for used in imaging applications.In certain embodiments, the sensor cluster 1014 can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 1016 is configured to facilitate the communication of wired or wireless way between equipment 1000 and other equipment.If Standby 1000 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.It is exemplary at one In embodiment, communication component 1016 receives the broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, communication component 1016 also includes near-field communication (NFC) module, to promote junction service. For example, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) skill can be based in NFC module Art, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, equipment 1000 can be by one or more application specific integrated circuits (ASIC), numeral Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realizations, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided Such as include the memorizer 1004 of instruction, above-mentioned instruction can be performed to complete said method by the processor 1020 of equipment 1000.Example Such as, non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and Optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is by the computing device of equipment When so that equipment is able to carry out a kind of application security processing method, and method includes:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the feature of the application program is believed Breath stores the password as identification key.
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is by the computing device of equipment When so that equipment is able to carry out a kind of application security processing method, and method includes:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as the application program and set The independent password put.
Those skilled in the art will readily occur to its of the disclosure after considering description and putting into practice invention disclosed herein Its embodiment.The disclosure is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is limited only by appended claim.

Claims (10)

1. a kind of application security processing method, it is characterised in that include:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the characteristic information of the application program is made The password is stored for identification key.
2. method according to claim 1, it is characterised in that the characteristic information using the application program is used as mark Keyword stores the password, including:
The password is stored using the bag name of the application program as identification key.
3. method according to claim 1, it is characterised in that it is the application that the acquisition arranges interface in the password The password of program input, including:
Obtain and the graphical passwords or numerical ciphers that interface is the application program input are set in the password, wherein the figure Password is the graphical passwords or the graphical passwords selected from candidate's figure drawn.
4. method according to claim 1, it is characterised in that methods described also includes:
After Modify password instruction is received, the password modification interface of the application program is shown;
Obtain and be the password of the application modification and store at password modification interface;Or,
After receiving and resetting cipher instruction, if it is judged that the application program user bound account and user's account Number it is proved to be successful, shows that the password of the application program resets interface;
Obtain the password that interface is the application program replacement is reset in the password and store.
5. a kind of application security processing method, it is characterised in that include:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as what the application program was arranged Independent password.
6. method according to claim 5, it is characterised in that methods described also includes:
When the application program being inquired according to the characteristic information and being not provided with password, be verified as what the application program was arranged Unified password.
7. a kind of application security processing meanss, it is characterised in that include:
First display module, after the application lock-switch for detecting application program is unlocked, shows the close of the application program Code arranges interface;
Password setup module, is that the application program is defeated for obtain the password shown in first display module to arrange interface The password for entering, stores the password using the characteristic information of the application program as identification key.
8. device according to claim 7, it is characterised in that described device also includes:
Second display module, for after Modify password instruction is received, showing the password modification interface of the application program;
Password modified module, repaiies for the application program for obtaining the password modification interface shown in second display module The password that changes simultaneously is stored;Or,
Described device also includes:
3rd display module, for after replacement cipher instruction is received, if it is judged that the application program has bound use The family account and user account is proved to be successful, shows that the password of the application program resets interface;
Password resets module, is the application program weight for obtain the password shown in the 3rd display module to reset interface The password put simultaneously is stored.
9. a kind of application security processing meanss, it is characterised in that include:
Feature acquisition module, when being unlocked for the application program to having been switched on using lock-switch, obtains the application journey The characteristic information of sequence;
Correction verification module, is provided with for inquiring the application program in the characteristic information obtained according to the feature acquisition module During password, the independent password that the application program is arranged is verified as.
10. a kind of mobile terminal device, it is characterised in that include:
Processor and the memorizer for storing processor executable;
Wherein, the processor is configured to:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the characteristic information of the application program is made The password is stored for identification key;Or,
The processor is configured to:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as what the application program was arranged Independent password.
CN201611153398.8A 2016-12-14 2016-12-14 Application program safe processing method, device and equipment Pending CN106611112A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611153398.8A CN106611112A (en) 2016-12-14 2016-12-14 Application program safe processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611153398.8A CN106611112A (en) 2016-12-14 2016-12-14 Application program safe processing method, device and equipment

Publications (1)

Publication Number Publication Date
CN106611112A true CN106611112A (en) 2017-05-03

Family

ID=58636423

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611153398.8A Pending CN106611112A (en) 2016-12-14 2016-12-14 Application program safe processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN106611112A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763888A (en) * 2018-05-31 2018-11-06 平安医疗科技有限公司 Files on each of customers processing method, device, computer equipment and storage medium
CN108846272A (en) * 2018-07-13 2018-11-20 厦门美图移动科技有限公司 Application security management method and device and electronic equipment
CN110910533A (en) * 2018-08-27 2020-03-24 深圳市艾维普思科技有限公司 Password setting method and system of electronic cigarette, storage medium and electronic cigarette
CN113163049A (en) * 2021-05-07 2021-07-23 唐彦 Tool for realizing any application icon lock based on iOS platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101087334A (en) * 2006-06-08 2007-12-12 北京恒基伟业投资发展有限公司 Multi-user management method of mobile phone information
CN102346831A (en) * 2011-10-31 2012-02-08 广东欧珀移动通信有限公司 Handheld device privacy encryption protection method of Android operating system
CN104268453A (en) * 2014-09-24 2015-01-07 可牛网络技术(北京)有限公司 Method and device for application program safety management for terminal equipment, and terminal
EP3016013A1 (en) * 2013-06-25 2016-05-04 Fujitsu Limited Information processing device, terminal device, information processing program, and information processing method
CN106156561A (en) * 2016-06-28 2016-11-23 北京小米移动软件有限公司 Application locking method, application unlocking method and a device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101087334A (en) * 2006-06-08 2007-12-12 北京恒基伟业投资发展有限公司 Multi-user management method of mobile phone information
CN102346831A (en) * 2011-10-31 2012-02-08 广东欧珀移动通信有限公司 Handheld device privacy encryption protection method of Android operating system
EP3016013A1 (en) * 2013-06-25 2016-05-04 Fujitsu Limited Information processing device, terminal device, information processing program, and information processing method
CN104268453A (en) * 2014-09-24 2015-01-07 可牛网络技术(北京)有限公司 Method and device for application program safety management for terminal equipment, and terminal
CN106156561A (en) * 2016-06-28 2016-11-23 北京小米移动软件有限公司 Application locking method, application unlocking method and a device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763888A (en) * 2018-05-31 2018-11-06 平安医疗科技有限公司 Files on each of customers processing method, device, computer equipment and storage medium
CN108763888B (en) * 2018-05-31 2022-06-07 平安医疗科技有限公司 User profile processing method and device, computer equipment and storage medium
CN108846272A (en) * 2018-07-13 2018-11-20 厦门美图移动科技有限公司 Application security management method and device and electronic equipment
CN110910533A (en) * 2018-08-27 2020-03-24 深圳市艾维普思科技有限公司 Password setting method and system of electronic cigarette, storage medium and electronic cigarette
CN113163049A (en) * 2021-05-07 2021-07-23 唐彦 Tool for realizing any application icon lock based on iOS platform

Similar Documents

Publication Publication Date Title
CN104640234A (en) Method and device for accessing to wireless network
CN104965732B (en) Desktop starts method and device
CN106547663A (en) Button management method and device
CN106611112A (en) Application program safe processing method, device and equipment
CN107798231A (en) Display methods, device, terminal and the storage medium of operation interface
CN104391870A (en) Method and device for acquiring logistics information
CN106201310A (en) The display packing of notification message, device and terminal
CN106534876A (en) Target user determining method and target user determining device
CN106056010A (en) Method and apparatus for processing messages by terminal, and terminal
CN106446653A (en) Application authority management method and device and electronic equipment
CN106528273A (en) Application management method and device
CN107733872A (en) Information Method of printing and device
CN105893854B (en) Encryption and decryption method and device
CN106535191A (en) Network connection establishing method and device
CN105282162A (en) Processing method and device for account management business
CN107197107A (en) Enabled instruction processing method and processing device
CN106789070A (en) The decryption method of data, device and terminal
CN107423378A (en) Image display method and device
CN106250743A (en) Account changing method and device
CN106548050A (en) Using startup method and device
CN106658467A (en) Virtual SIM card management method and device
CN106372943A (en) Message processing method and device
CN106502406A (en) Application program deployment method, device and terminal unit
CN106062762B (en) Using encryption method and device
CN105069344A (en) Mobile terminal locking method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170503

RJ01 Rejection of invention patent application after publication