CN106611112A - Application program safe processing method, device and equipment - Google Patents
Application program safe processing method, device and equipment Download PDFInfo
- Publication number
- CN106611112A CN106611112A CN201611153398.8A CN201611153398A CN106611112A CN 106611112 A CN106611112 A CN 106611112A CN 201611153398 A CN201611153398 A CN 201611153398A CN 106611112 A CN106611112 A CN 106611112A
- Authority
- CN
- China
- Prior art keywords
- password
- application program
- application
- interface
- characteristic information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to an application program safe processing method, device and equipment. The method comprises steps of displaying a code setting interface of an application program when detecting an application lock switch of the application program is opened, acquiring codes input for the application program on the code setting interface, and storing the codes with feature information of the application program as an identification key word. Different codes can be independently arranged for each application program opening the application lock switch by the use of the application program safe processing method, and user personalized needs can be met.
Description
Technical field
It relates to software application technology field, more particularly to application security processing method, device and equipment.
Background technology
Mobile terminal can install various application programs at present, if some application programs are not intended to other users arbitrarily beaten
Open, application lock can be set, for example can slide in the application list on the right side of application lock-switch can be selection should
Locked with program or unlocked.But in presently relevant technology, when being locked by application program that application lock is selection, only support to
The application program of all lockings arranges a unified password.
The content of the invention
To overcome problem present in correlation technique, present disclose provides application security processing method, device and setting
It is standby.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of application security processing method, including:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the feature of the application program is believed
Breath stores the password as identification key.
Optionally, the characteristic information using the application program stores the password as identification key, including:Will
The bag name of the application program stores the password as identification key.
Optionally, described acquisition arranges the password that interface is the application program input in the password, including:
Obtain and the graphical passwords or numerical ciphers that interface is the application program input are set in the password, wherein described
Graphical passwords are the graphical passwords or the graphical passwords selected from candidate's figure drawn.
Optionally, storage is encrypted using setting AES during the storage password.
Optionally, methods described also includes:
It is retrieved as the user account bound during the application program input password.
Optionally, methods described also includes:
After Modify password instruction is received, the password modification interface of the application program is shown;
Obtain and be the password of the application modification and store at password modification interface.
Optionally, methods described also includes:
After receiving and resetting cipher instruction, if it is judged that the application program user bound account and the use
Family account is proved to be successful, and shows that the password of the application program resets interface;
Obtain the password that interface is the application program replacement is reset in the password and store.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of application security processing method, including:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as the application program and set
The independent password put.
Optionally, methods described also includes:
When the application program being inquired according to the characteristic information and being not provided with password, be verified as the application program and set
The unified password put.
Optionally, the characteristic information for obtaining the application program includes:Obtain the bag name information of the application program.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of application security processing meanss, including:
First display module, after the application lock-switch for detecting application program is unlocked, shows the application program
Password arrange interface;
Password setup module, is the application journey for obtain the password shown in first display module to arrange interface
The password of sequence input, stores the password using the characteristic information of the application program as identification key.
Optionally, the bag name of the application program is stored described close as identification key by the password setup module
Code.
Optionally, described device also includes:
Binding module, for the user bound account when password is input into for the application program.
Optionally, described device also includes:
Second display module, for after Modify password instruction is received, showing the password modification circle of the application program
Face;
Password modified module, is the application journey for obtain the password shown in second display module to change interface
The password of sequence modification is simultaneously stored.
Optionally, described device also includes:
3rd display module, for after replacement cipher instruction is received, if it is judged that the application program has been tied up
The user account and the user account of the fixed binding module binding is proved to be successful, and shows that the password of the application program resets
Interface;
Password resets module, is the application journey for obtain the password shown in the 3rd display module to reset interface
The password of sequence replacement is simultaneously stored.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of application security processing meanss, including:
Feature acquisition module, when being unlocked for the application program to having been switched on using lock-switch, obtains described answering
With the characteristic information of program;
Correction verification module, sets for inquiring the application program in the characteristic information obtained according to the feature acquisition module
When having put password, the independent password that the application program is arranged is verified as.
Optionally, described device also includes:
Second correction verification module, for inquiring the application journey in the characteristic information obtained according to the feature acquisition module
When sequence is not provided with password, the unified password that the application program is arranged is verified as.
In terms of the 5th of the embodiment of the present disclosure, there is provided a kind of mobile terminal device, including:
Processor and the memorizer for storing processor executable;
Wherein, the processor is configured to:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the feature of the application program is believed
Breath stores the password as identification key.
In terms of the 6th of the embodiment of the present disclosure, there is provided a kind of mobile terminal device, including:
Processor and the memorizer for storing processor executable;
Wherein, the processor is configured to:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as the application program and set
The independent password put.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:
The disclosure can display to the user that the application program after the application lock-switch for detecting application program is unlocked
Password arranges interface, and it is that the application program arranges password that can arrange interface in the password by user, is then answered described
The password of the input is stored as identification key with the characteristic information of program, being so achieved that can be to open application lock
Each application program of switch is separately provided different passwords, and is no longer to unify password, meets the individual demand of user, and
And characteristic information with unique mark application program, therefore can store the password of the input using characteristic information as identification key
The corresponding relation of password and application program can also more preferably be distinguished.
The disclosure can be to allow user's user bound account when password is input into as the application program.
The disclosure can also provide password modification function, after Modify password instruction is received, show the application program
Password modification interface, then obtain the password modification interface be the password of the application modification and store.
The disclosure also provides password function of reset when forgetting Password, after replacement cipher instruction is received, if it is determined that
Go out the application program user bound account and user account is proved to be successful, show the password weight of the application program
Interface is put, and then to be obtained and the password that interface is the application program replacement is reset in the password and store.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
During accompanying drawing herein is merged in description and the part of this specification is constituted, show the enforcement for meeting the disclosure
Example, and be used for explaining the principle of the disclosure together with description.
Fig. 1 is a kind of flow chart of application security processing method of the disclosure according to an exemplary embodiment.
Fig. 2 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment
Figure.
Fig. 3 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment
Figure.
Fig. 4 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment
Figure.
Fig. 5 is a kind of block diagram of application security processing meanss of the disclosure according to an exemplary embodiment.
Fig. 6 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment
Figure.
Fig. 7 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment
Figure.
Fig. 8 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment
Figure.
Fig. 9 is an a kind of structured flowchart of mobile terminal device of the disclosure according to an exemplary embodiment.
Figure 10 is an a kind of structured flowchart of equipment of the disclosure according to an exemplary embodiment.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by
The example of consistent apparatus and method in terms of some described in detail in claims, the disclosure.
The disclosure using term be purpose only merely for description specific embodiment, and be not intended to be limiting the disclosure.
" one kind ", " described " and " being somebody's turn to do " of singulative used in disclosure and the accompanying claims book is also intended to include majority
Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein is referred to and is wrapped
Containing one or more associated any or all possible combinations for listing project.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure
A little information should not necessarily be limited by these terms.These terms are only for same type of information is distinguished from each other out.For example, without departing from
In the case of disclosure scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
Present disclose provides a kind of application security processing method, can be to open to apply journey using each of lock-switch
Sequence is separately provided different passwords, meets the individual demand of user.
Fig. 1 is a kind of flow chart of application security processing method of the disclosure according to an exemplary embodiment.
As shown in figure 1, the method can apply to, in mobile terminal, comprise the following steps:
In a step 101, detect application program application lock-switch be unlocked after, show the password of the application program
Interface is set.
In a step 102, obtain and the password that interface is the application program input is set in the password, by the application
The characteristic information of program stores the password as identification key.
The characteristic information of the application program can for example be the bag name of application program but be not limited to this.Application program
Bag name can be used for unique mark application program.
The password for application program input, for example, can be graphical passwords or numerical ciphers, wherein the figure
Shape password can be the graphical passwords or the graphical passwords selected from candidate's figure drawn.
From the embodiment, the disclosure, can be aobvious to user after the application lock-switch for detecting application program is unlocked
Show that the password of the application program arranges interface, it is that application program setting is close that can arrange interface in the password by user
Code, then the characteristic information of the application program is stored as identification key the password of the input, is so achieved that
Different passwords can be separately provided using each application program of lock-switch to open, and no longer be to unify password, be met and use
The individual demand at family, and characteristic information can be with unique mark application program, therefore using characteristic information as identification key
The password for storing the input can also more preferably distinguish the corresponding relation of password and application program.
Fig. 2 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment
Figure.
As shown in Fig. 2 the method can apply to, in mobile terminal, comprise the following steps:
In step 201, detect the state of the application lock-switch of application program.
In step 202., detect application program application lock-switch be unlocked after, show the password of the application program
Interface is set.
The disclosure shows the close of the application program when application lock-switch for opening certain application program is detected
Code arranges interface, and independent password settings button is provided in the interface.Such as user is arranged in list in application lock, clicks on wherein one
Individual entry jumps to the current password for clicking on application program and arranges interface, and the password arranges interface and provides the button for arranging password.
In step 203, obtain and the password and obtain binding that interface is the application program input is set in the password
User account.
The step can be obtained and arrange the graphical passwords that interface is the application program input or digital close in the password
Code, wherein the graphical passwords are the graphical passwords or the graphical passwords selected from candidate's figure drawn.
The step obtains the independent password that user is that application program is arranged, and can also bind when independent password is arranged in addition
The user account for currently logging in, can be used to use when subsequently resetting currently configured independent password.It should be noted that, except
Outside by the way of the user bound account, it would however also be possible to employ the mode of offering question and answer is used for follow-up password and resets.
In step 204, the password is stored using the bag name of the application program as identification key.
When user arranges independent password to certain application program, the disclosure is with the bag name of application program
(packagename) password is stored as identification key KEY, the Bao Mingke of application program is with unique mark application program.Separately
Outward for safety, password can be encrypted using set algorithm, for example with SHA-1 (Secure Hash Algorithm-
1, the 1st version of SHA) algorithm for encryption storage.
In step 205, the password modification interface of the application program after Modify password instruction is received, is shown, is obtained
It is taken at the password modification interface to be the password of the application modification and store.
The disclosure can also provide password modification in the independent password of application program is arranged, and user can change certain should
The password modification interface of the application program with the independent password of program, i.e., after Modify password instruction is received, is shown, is obtained
It is the password of the application modification and stores at password modification interface.
In step 206, after receiving and resetting cipher instruction, if it is judged that the application program user bound
The account and user account is proved to be successful, shows that the password of the application program resets interface, obtains and reset in the password
Interface is the password that the application program resets and stores.
The disclosure also provides the function of reset after independent password is forgotten, for user unblock the page provide forget Password by
Button, detects user and clicks on when forgetting Password, first judge whether user bound account, if user bound account,
The user account checking page is ejected, after user account is proved to be successful, independent password is entered into and is reset interface, obtain described close
Code resets the independent password that interface is the application program replacement and stores.If it is judged that unbound user account, points out to use
The unbound user account in family can not reset password.
It should be noted that, above-mentioned steps 205 and 206 do not have the ordering relation of certainty.
From the embodiment it is found that the disclosure is except can individually set using each application program of lock-switch to open
Different passwords are put, is met outside the individual demand of user, password modification function can also be provided, Modify password is being received
After instruction, the password modification interface of the application program is shown, it is the application journey then to obtain at password modification interface
The password of sequence modification is simultaneously stored.The disclosure also provides password function of reset when forgetting Password, and is receiving replacement cipher instruction
Afterwards, if it is judged that the application program user bound account and user account is proved to be successful, shows the application
The password of program resets interface, then to obtain and reset the password that interface is the application program replacement in the password and store.
Fig. 3 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment
Figure.
As shown in figure 3, the method can apply to, in mobile terminal, comprise the following steps:
In step 301, when the application program to having been switched on using lock-switch is unlocked, obtain the application program
Characteristic information.
The characteristic information of the application program can for example be the bag name of application program but be not limited to this.Application program
Bag name can be used for unique mark application program.
In step 302, when the application program being inquired according to the characteristic information and being provided with password, be verified as institute
State the independent password of application program setting.
From the embodiment it is found that the disclosure is user realizes being to open each application program using lock-switch
After being separately provided the function of different passwords, when the application program to having been switched on using lock-switch is unlocked, can obtain
The characteristic information of the application program is taken, then can inquire about whether the application program is provided with close according to the characteristic information
Code, if being provided with password, verifies the independent password that the application program is arranged, so as to protect application security.
Fig. 4 is a kind of another flow process of application security processing method of the disclosure according to an exemplary embodiment
Figure.
As shown in figure 4, the method can apply to, in mobile terminal, comprise the following steps:
In step 401, when the application program to having been switched on using lock-switch is unlocked, obtain the application program
Bag name information.
In step 402, password is provided with to the application program in the bag name information inquiry according to the application program
When, it is verified as the independent password that the application program is arranged.
Whether the disclosure first determines whether current application program already provided with independent password when locked application is solved.Can
To get bag name information from solution locked application, whether there is to judge according to the password that bag name information can inquire about storage
Configured independent password, if finding password presence, represents configured independent password, then just verify individually close
Code, otherwise proceeds to the unified password of step 403 verification.
In step 403, when the application program being inquired according to the characteristic information and being not provided with password, be verified as institute
State the unified password of application program setting.
It should be noted that, above-mentioned steps 402 and 403 do not have the ordering relation of certainty.
Corresponding with aforementioned applications function realizing method embodiment, the disclosure additionally provides a kind of application security and processes
Device and corresponding embodiment.
Fig. 5 is a kind of block diagram of application security processing meanss of the disclosure according to an exemplary embodiment.
The device can be in mobile terminal.With reference to Fig. 5, can wrap in a kind of application security processing meanss
Include:First display module 51, password setup module 52.
First display module 51, after the application lock-switch for detecting application program is unlocked, shows the application journey
The password of sequence arranges interface.
Password setup module 52, is described answering for obtain the password shown in first display module 51 to arrange interface
The password being input into program, stores the password using the characteristic information of the application program as identification key.
Wherein, the characteristic information of the application program can for example be the bag name of application program but be not limited to this.Using
The bag name of program can be used for unique mark application program.
From the embodiment, the disclosure, can be aobvious to user after the application lock-switch for detecting application program is unlocked
Show that the password of the application program arranges interface, it is that application program setting is close that can arrange interface in the password by user
Code, then the characteristic information of the application program is stored as identification key the password of the input, is so achieved that
Different passwords can be separately provided using each application program of lock-switch to open, and no longer be to unify password, be met and use
The individual demand at family, and characteristic information can be with unique mark application program, therefore using characteristic information as identification key
The password for storing the input can also more preferably distinguish the corresponding relation of password and application program.
Fig. 6 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment
Figure.
With reference to Fig. 6, can include in a kind of application security processing meanss:First display module 51, password is arranged
Module 52, binding module 53, the second display module 54, Password modified module 55, the 3rd display module 56, password reset module
57。
First display module 51, the function of password setup module 52 may refer to Fig. 5 descriptions.
Wherein, can be encrypted using set algorithm during the storage of password setup module 52 password, for example with SHA-1
(Secure Hash Algorithm-1, SHA first version) algorithm for encryption is stored.
Wherein, the bag name of the application program is stored described close as identification key by the password setup module 52
Code.The bag name of application program can be used for unique mark application program.
Binding module 53, for the user bound account when password is input into for the application program, can be used for subsequent cryptographic
Verified during replacement.
Second display module 54, for after Modify password instruction is received, showing the password modification of the application program
Interface.
Password modified module 55, answers for described for obtaining the password modification interface shown in second display module 54
With the password of modification of program and store.
3rd display module 56, for after replacement cipher instruction is received, if it is judged that the application program is
The user account and the user account for binding the binding of the binding module 53 is proved to be successful, and shows the password of the application program
Reset interface.
Password replacement module 57, is described answering for obtain the password shown in the 3rd display module 56 to reset interface
With program reset password and store.
Fig. 7 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment
Figure.
The device can be in mobile terminal.With reference to Fig. 7, can wrap in a kind of application security processing meanss
Include:Feature acquisition module 71, the first correction verification module 72.
Feature acquisition module 71, when being unlocked for the application program to having been switched on using lock-switch, obtains described
The characteristic information of application program.
First correction verification module 72, for should described in inquiring in the characteristic information obtained according to the feature acquisition module 71
When password is provided with program, be verified as the independent password that the application program is arranged.
The characteristic information of the application program can for example be the bag name of application program but be not limited to this.
From the embodiment it is found that the disclosure is user realizes being to open each application program using lock-switch
After being separately provided the function of different passwords, when the application program to having been switched on using lock-switch is unlocked, can obtain
The characteristic information of the application program is taken, then can inquire about whether the application program is provided with close according to the characteristic information
Code, if being provided with password, verifies the independent password that the application program is arranged, so as to protect application security.
Fig. 8 is a kind of another frame of application security processing meanss of the disclosure according to an exemplary embodiment
Figure.
The device can be in mobile terminal.With reference to Fig. 8, can wrap in a kind of application security processing meanss
Include:Feature acquisition module 71, the first correction verification module 72, the second correction verification module 73.
Feature acquisition module 71, when being unlocked for the application program to having been switched on using lock-switch, obtains described
The characteristic information of application program.
First correction verification module 72, for should described in inquiring in the characteristic information obtained according to the feature acquisition module 71
When password is provided with program, be verified as the independent password that the application program is arranged.
Second correction verification module 73, for should described in inquiring in the characteristic information obtained according to the feature acquisition module 71
When password is not provided with program, be verified as the unified password that the application program is arranged.
With regard to the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
For device embodiment, as which corresponds essentially to embodiment of the method, so related part is referring to method reality
Apply the part explanation of example.Device embodiment described above is only schematic, wherein illustrating as separating component
Module can be or may not be physically separate, as the part that module shows can be or may not be
Physical module, you can local to be located at one, or can also be distributed on multiple mixed-media network modules mixed-medias.Can be according to the actual needs
Select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying wound
In the case that the property made is worked, you can to understand and implement.
Fig. 9 is an a kind of structured flowchart of mobile terminal device of the disclosure according to an exemplary embodiment.
With reference to Fig. 9, can include in mobile terminal device:Processor 901 and processor 901 is executable to be referred to for storing
The memorizer 902 of order;
Wherein, processor 901 is configured to:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the feature of the application program is believed
Breath stores the password as identification key.
Or, the processor 901 is configured to:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as the application program and set
The independent password put.
It should be noted that, other programs of the storage of memorizer 902, referring specifically to the description in previous methods flow process, this
Place repeats no more, and processor 901 is additionally operable to other programs for performing the storage of memorizer 902.
Figure 10 is an a kind of structured flowchart of equipment of the disclosure according to an exemplary embodiment.
With reference to Figure 10, for example, equipment 1000 can be the mobile phone with routing function, computer, digital broadcasting end
End, messaging devices, game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
Equipment 1000 includes following one or more assemblies:Process assembly 1002, memorizer 1004, power supply module 1006,
Multimedia groupware 1008, audio-frequency assembly 1010, the interface 1012 of input/output (I/O), sensor cluster 1014, and communication
Component 10110.
The integrated operation of 1002 usual control device 1000 of process assembly, such as with display, call, data communication,
The associated operation of camera operation and record operation.Process assembly 1002 can include one or more processors 1020 to perform
Instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 1002 can include one or more moulds
Block, the interaction being easy between process assembly 1002 and other assemblies.For example, process assembly 1002 can include multi-media module,
To facilitate the interaction between multimedia groupware 1008 and process assembly 1002.
Memorizer 1004 is configured to store various types of data to support the operation in equipment 1000.These data
Example includes the instruction of any application program or method for operating on the device 1000, contact data, telephone book data,
Message, picture, video etc..Memorizer 1004 can by any kind of volatibility or non-volatile memory device or they
Combination realizes, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Power supply module 1006 provides electric power for the various assemblies of equipment 1000.Power supply module 1006 can include power management
System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for equipment 1000.
Multimedia groupware 1008 is included in the screen of one output interface of offer between equipment 1000 and user.At some
In embodiment, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Touch screen is may be implemented as, to receive the input signal from user.Touch panel includes one or more touch sensors
With the gesture on sensing touch, slip and touch panel.Touch sensor can not only sensing touch or sliding action border,
But also detect the persistent period related to touch or slide and pressure.In certain embodiments, multimedia groupware 1008
Including a front-facing camera and/or post-positioned pick-up head.When equipment 1000 is in operator scheme, such as screening-mode or video mode
When, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and rearmounted shooting
Head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 1010 is configured to output and/or input audio signal.For example, audio-frequency assembly 1010 includes a wheat
Gram wind (MIC), when equipment 1000 is in operator scheme, such as call model, logging mode and speech recognition mode, mike quilt
It is configured to receive external audio signal.The audio signal for being received can be further stored in memorizer 1004 or via communication
Component 10110 sends.In certain embodiments, audio-frequency assembly 1010 also includes a speaker, for exports audio signal.
I/O interfaces 1012 are that interface, above-mentioned peripheral interface module are provided between process assembly 1002 and peripheral interface module
Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and
Locking press button.
Sensor cluster 1014 includes one or more sensors, and the state for various aspects are provided for equipment 1000 is commented
Estimate.For example, sensor cluster 1014 can detect the opening/closed mode of equipment 1000, such as relative localization of component, group
Display and keypad of the part for equipment 1000, sensor cluster 1014 can be with 1,000 1 groups of testing equipment 1000 or equipment
The position change of part, user are presence or absence of with what equipment 1000 was contacted, 1000 orientation of equipment or acceleration/deceleration and equipment
1000 temperature change.Sensor cluster 1014 can include proximity transducer, be configured to do not having any physics to connect
The presence of object nearby is detected when tactile.Sensor cluster 1014 can also include optical sensor, such as CMOS or ccd image sensing
Device, for used in imaging applications.In certain embodiments, the sensor cluster 1014 can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 1016 is configured to facilitate the communication of wired or wireless way between equipment 1000 and other equipment.If
Standby 1000 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.It is exemplary at one
In embodiment, communication component 1016 receives the broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, communication component 1016 also includes near-field communication (NFC) module, to promote junction service.
For example, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) skill can be based in NFC module
Art, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, equipment 1000 can be by one or more application specific integrated circuits (ASIC), numeral
Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realizations, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
Such as include the memorizer 1004 of instruction, above-mentioned instruction can be performed to complete said method by the processor 1020 of equipment 1000.Example
Such as, non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and
Optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is by the computing device of equipment
When so that equipment is able to carry out a kind of application security processing method, and method includes:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the feature of the application program is believed
Breath stores the password as identification key.
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is by the computing device of equipment
When so that equipment is able to carry out a kind of application security processing method, and method includes:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as the application program and set
The independent password put.
Those skilled in the art will readily occur to its of the disclosure after considering description and putting into practice invention disclosed herein
Its embodiment.The disclosure is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is limited only by appended claim.
Claims (10)
1. a kind of application security processing method, it is characterised in that include:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the characteristic information of the application program is made
The password is stored for identification key.
2. method according to claim 1, it is characterised in that the characteristic information using the application program is used as mark
Keyword stores the password, including:
The password is stored using the bag name of the application program as identification key.
3. method according to claim 1, it is characterised in that it is the application that the acquisition arranges interface in the password
The password of program input, including:
Obtain and the graphical passwords or numerical ciphers that interface is the application program input are set in the password, wherein the figure
Password is the graphical passwords or the graphical passwords selected from candidate's figure drawn.
4. method according to claim 1, it is characterised in that methods described also includes:
After Modify password instruction is received, the password modification interface of the application program is shown;
Obtain and be the password of the application modification and store at password modification interface;Or,
After receiving and resetting cipher instruction, if it is judged that the application program user bound account and user's account
Number it is proved to be successful, shows that the password of the application program resets interface;
Obtain the password that interface is the application program replacement is reset in the password and store.
5. a kind of application security processing method, it is characterised in that include:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as what the application program was arranged
Independent password.
6. method according to claim 5, it is characterised in that methods described also includes:
When the application program being inquired according to the characteristic information and being not provided with password, be verified as what the application program was arranged
Unified password.
7. a kind of application security processing meanss, it is characterised in that include:
First display module, after the application lock-switch for detecting application program is unlocked, shows the close of the application program
Code arranges interface;
Password setup module, is that the application program is defeated for obtain the password shown in first display module to arrange interface
The password for entering, stores the password using the characteristic information of the application program as identification key.
8. device according to claim 7, it is characterised in that described device also includes:
Second display module, for after Modify password instruction is received, showing the password modification interface of the application program;
Password modified module, repaiies for the application program for obtaining the password modification interface shown in second display module
The password that changes simultaneously is stored;Or,
Described device also includes:
3rd display module, for after replacement cipher instruction is received, if it is judged that the application program has bound use
The family account and user account is proved to be successful, shows that the password of the application program resets interface;
Password resets module, is the application program weight for obtain the password shown in the 3rd display module to reset interface
The password put simultaneously is stored.
9. a kind of application security processing meanss, it is characterised in that include:
Feature acquisition module, when being unlocked for the application program to having been switched on using lock-switch, obtains the application journey
The characteristic information of sequence;
Correction verification module, is provided with for inquiring the application program in the characteristic information obtained according to the feature acquisition module
During password, the independent password that the application program is arranged is verified as.
10. a kind of mobile terminal device, it is characterised in that include:
Processor and the memorizer for storing processor executable;
Wherein, the processor is configured to:
Detect application program application lock-switch be unlocked after, show that the password of the application program arranges interface;
Obtain and the password that interface is the application program input is set in the password, the characteristic information of the application program is made
The password is stored for identification key;Or,
The processor is configured to:
When application program to having been switched on using lock-switch is unlocked, the characteristic information of the application program is obtained;
When the application program being inquired according to the characteristic information and being provided with password, be verified as what the application program was arranged
Independent password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611153398.8A CN106611112A (en) | 2016-12-14 | 2016-12-14 | Application program safe processing method, device and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611153398.8A CN106611112A (en) | 2016-12-14 | 2016-12-14 | Application program safe processing method, device and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106611112A true CN106611112A (en) | 2017-05-03 |
Family
ID=58636423
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611153398.8A Pending CN106611112A (en) | 2016-12-14 | 2016-12-14 | Application program safe processing method, device and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106611112A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763888A (en) * | 2018-05-31 | 2018-11-06 | 平安医疗科技有限公司 | Files on each of customers processing method, device, computer equipment and storage medium |
CN108846272A (en) * | 2018-07-13 | 2018-11-20 | 厦门美图移动科技有限公司 | Application security management method and device and electronic equipment |
CN110910533A (en) * | 2018-08-27 | 2020-03-24 | 深圳市艾维普思科技有限公司 | Password setting method and system of electronic cigarette, storage medium and electronic cigarette |
CN113163049A (en) * | 2021-05-07 | 2021-07-23 | 唐彦 | Tool for realizing any application icon lock based on iOS platform |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101087334A (en) * | 2006-06-08 | 2007-12-12 | 北京恒基伟业投资发展有限公司 | Multi-user management method of mobile phone information |
CN102346831A (en) * | 2011-10-31 | 2012-02-08 | 广东欧珀移动通信有限公司 | Handheld device privacy encryption protection method of Android operating system |
CN104268453A (en) * | 2014-09-24 | 2015-01-07 | 可牛网络技术(北京)有限公司 | Method and device for application program safety management for terminal equipment, and terminal |
EP3016013A1 (en) * | 2013-06-25 | 2016-05-04 | Fujitsu Limited | Information processing device, terminal device, information processing program, and information processing method |
CN106156561A (en) * | 2016-06-28 | 2016-11-23 | 北京小米移动软件有限公司 | Application locking method, application unlocking method and a device |
-
2016
- 2016-12-14 CN CN201611153398.8A patent/CN106611112A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101087334A (en) * | 2006-06-08 | 2007-12-12 | 北京恒基伟业投资发展有限公司 | Multi-user management method of mobile phone information |
CN102346831A (en) * | 2011-10-31 | 2012-02-08 | 广东欧珀移动通信有限公司 | Handheld device privacy encryption protection method of Android operating system |
EP3016013A1 (en) * | 2013-06-25 | 2016-05-04 | Fujitsu Limited | Information processing device, terminal device, information processing program, and information processing method |
CN104268453A (en) * | 2014-09-24 | 2015-01-07 | 可牛网络技术(北京)有限公司 | Method and device for application program safety management for terminal equipment, and terminal |
CN106156561A (en) * | 2016-06-28 | 2016-11-23 | 北京小米移动软件有限公司 | Application locking method, application unlocking method and a device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108763888A (en) * | 2018-05-31 | 2018-11-06 | 平安医疗科技有限公司 | Files on each of customers processing method, device, computer equipment and storage medium |
CN108763888B (en) * | 2018-05-31 | 2022-06-07 | 平安医疗科技有限公司 | User profile processing method and device, computer equipment and storage medium |
CN108846272A (en) * | 2018-07-13 | 2018-11-20 | 厦门美图移动科技有限公司 | Application security management method and device and electronic equipment |
CN110910533A (en) * | 2018-08-27 | 2020-03-24 | 深圳市艾维普思科技有限公司 | Password setting method and system of electronic cigarette, storage medium and electronic cigarette |
CN113163049A (en) * | 2021-05-07 | 2021-07-23 | 唐彦 | Tool for realizing any application icon lock based on iOS platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104640234A (en) | Method and device for accessing to wireless network | |
CN104965732B (en) | Desktop starts method and device | |
CN106547663A (en) | Button management method and device | |
CN106611112A (en) | Application program safe processing method, device and equipment | |
CN107798231A (en) | Display methods, device, terminal and the storage medium of operation interface | |
CN104391870A (en) | Method and device for acquiring logistics information | |
CN106201310A (en) | The display packing of notification message, device and terminal | |
CN106534876A (en) | Target user determining method and target user determining device | |
CN106056010A (en) | Method and apparatus for processing messages by terminal, and terminal | |
CN106446653A (en) | Application authority management method and device and electronic equipment | |
CN106528273A (en) | Application management method and device | |
CN107733872A (en) | Information Method of printing and device | |
CN105893854B (en) | Encryption and decryption method and device | |
CN106535191A (en) | Network connection establishing method and device | |
CN105282162A (en) | Processing method and device for account management business | |
CN107197107A (en) | Enabled instruction processing method and processing device | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN107423378A (en) | Image display method and device | |
CN106250743A (en) | Account changing method and device | |
CN106548050A (en) | Using startup method and device | |
CN106658467A (en) | Virtual SIM card management method and device | |
CN106372943A (en) | Message processing method and device | |
CN106502406A (en) | Application program deployment method, device and terminal unit | |
CN106062762B (en) | Using encryption method and device | |
CN105069344A (en) | Mobile terminal locking method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170503 |
|
RJ01 | Rejection of invention patent application after publication |