CN106656756B - The operation method and device of instant message applications - Google Patents
The operation method and device of instant message applications Download PDFInfo
- Publication number
- CN106656756B CN106656756B CN201611162707.8A CN201611162707A CN106656756B CN 106656756 B CN106656756 B CN 106656756B CN 201611162707 A CN201611162707 A CN 201611162707A CN 106656756 B CN106656756 B CN 106656756B
- Authority
- CN
- China
- Prior art keywords
- instant message
- security
- message applications
- level
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a kind of operation method of instant message applications and devices, are related to field of communication technology, can be avoided the case where divulging a secret by instant message applications.The method comprise the steps that determining the security level of current network when detecting instant message applications operation;Obtain the corresponding operating mode of the security level;The instant message applications is run according to the operating mode.The present invention is suitable for maintaining secrecy to the chat content instant message applications.
Description
Technical field
The present invention relates to field of communication technology more particularly to the operation methods and device of a kind of instant message applications.
Background technique
With the sharp increase of Internet user, the use of chat tool tends to universalness, and easy communication while also occurs
The event that company's important core data are leaked by instant messenger, network security become the head that puzzlement internet develops in a healthy way
One of problem is wanted, the safety that enterprise's confidential information has been increasingly becoming the problem of actively divulging a secret using chat tool being on the rise is hidden
Suffer from.
Summary of the invention
The embodiment of the present invention provides the operation method and device of a kind of instant message applications, is able to solve and passes through Instant Messenger
The problem of news software is divulged a secret.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, the embodiment of the present invention provides a kind of operation method of instant message applications, comprising:
When detecting instant message applications operation, the security level of current network is determined;
Obtain the corresponding operating mode of the security level;
The instant message applications is run according to the operating mode.
With reference to first aspect, in the first possible implementation of the first aspect, the security level includes advanced
Safety and low-level security;
It is described to run the instant message applications according to the operating mode, comprising:
When the security level is advanced security, the repertoire of the instant message applications is run;Or,
When the security level is low-level security, the partial function of the instant message applications is run.
The possible implementation of with reference to first aspect the first, it is in the second possible implementation, described to work as institute
State security level be low-level security when, run the partial function of the instant message applications, comprising:
When the security level is low-level security, the information input function of the instant message applications is run, forbids transporting
The chat record of the row instant message applications obtains function.
The possible implementation of with reference to first aspect the first, it is in the third possible implementation, described to work as institute
State security level be low-level security when, run the partial function of the instant message applications, comprising:
When the security level is low-level security, the sensitive note in the chat record of the instant message applications is obtained
It records, includes sensitive keys word in the sensitive record;
The information input function of running the instant message applications forbids the acquisition function of running the sensitive record.
Second of possible implementation of the possible implementation of with reference to first aspect the first or first aspect,
Or the third possible implementation of first aspect, it is in the fourth possible implementation, described to work as the security level
When for low-level security, after the partial function for running the instant message applications, further includes:
Show Password Input prompting frame;
Obtain the encrypted message inputted based on the Password Input prompting frame;
The encrypted message is verified;It is described that encrypted message is verified, comprising:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical
When, the time that each character is inputted when further according to input password is analyzed and determined, judges to be judged with failure discriminate, described
Failure discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;For t in history input behavioriAverage value;TC2 characters are inputted most when indicating continuous input for the man-machine crash time
Short time;P is adjustable similarity parameter, and value is between 0 to 1;When all discriminates are not satisfied, verification result is
It is correct for password;
When the verification result of the encrypted message is that password is correct, the repertoire of the instant message applications is run.
With reference to first aspect or second of the first possible implementation of first aspect or first aspect possible
The possible implementation of the third of implementation or first aspect, in a fifth possible implementation, the determination is worked as
The security level of preceding network, comprising:
According to any one in the network type, network identity and Internet protocol address of the current network or arbitrarily
Combination, determines the security level of the current network.
Second aspect, the embodiment of the present invention provide a kind of running gear of instant message applications, comprising:
Determining module, for determining the security level of current network when detecting instant message applications operation;
Module is obtained, the corresponding operating mode of the security level determined for obtaining the determining module;
Module is run, the operating mode for obtaining according to the acquisition module runs the instant message applications.
In conjunction with second aspect, in the first possible implementation of the second aspect, the institute that the determining module determines
Stating security level includes advanced security and low-level security;
The operation module includes: the first operation submodule or the second operation submodule;
The first operation submodule, for it is soft to run the instant messaging when the security level is advanced security
The repertoire of part;
The second operation submodule, for it is soft to run the instant messaging when the security level is low-level security
The partial function of part.
In conjunction with the first possible implementation of second aspect, in the second possible implementation, described second
Running submodule includes: the first running unit;
First running unit, for running the instant message applications when the security level is low-level security
Information input function, the chat record for forbidding running the instant message applications obtains function.
In conjunction with the first possible implementation of second aspect, in the third possible implementation, described second
Running submodule includes: acquiring unit, the second running unit;
The acquiring unit, for obtaining chatting for the instant message applications when the security level is low-level security
Sensitivity in its record records, and includes sensitive keys word in the sensitive record;
Second running unit is forbidden described in operation for running the information input function of the instant message applications
The acquisition function of sensitivity record.
In conjunction with the first possible implementation of second aspect or second of possible implementation of second aspect,
Or the third possible implementation of second aspect, in the fourth possible implementation, described device further include: display
Module obtains module, authentication module;
The display module, for showing Password Input prompting frame;
The acquisition module, for obtaining the encrypted message based on Password Input prompting frame input;
The authentication module, for being verified to the encrypted message;It is described that encrypted message is verified, comprising:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical
When, the time that each character is inputted when further according to input password is analyzed and determined, judges to be judged with failure discriminate, described
Failure discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;For t in history input behavioriAverage value;TC2 characters are inputted most when indicating continuous input for the man-machine crash time
Short time;P is adjustable similarity parameter, and value is between 0 to 1;When all discriminates are not satisfied, verification result is
It is correct for password;
The first operation submodule is also used to run institute when the verification result of the encrypted message is that password is correct
State the repertoire of instant message applications.
Second in conjunction with the possible implementation of the first of second aspect or second aspect or second aspect is possible
The possible implementation of the third of implementation or second aspect, in a fifth possible implementation, the determining mould
Block comprises determining that submodule;
The determining submodule, for the network type, network identity and Internet protocol according to the current network
Any one or any combination in location, determine the security level of the current network.
The operation method and device of instant message applications provided in an embodiment of the present invention detect that instant messaging is soft by working as
When part is run, it is first determined then the security level of current network obtains the corresponding operating mode of the security level, finally presses
The instant message applications is run according to the operating mode.It can be according to current network security situation, according to corresponding work
Mode operation instant message applications runs instant messaging still according to normal mode to avoid under network unsafe condition
Software, and lead to the case where secret is revealed in instant communication software.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow diagram of the operation method of the instant message applications of the embodiment of the present invention;
Fig. 2 is another flow diagram of the operation method of the instant message applications of the embodiment of the present invention;
Fig. 3 is the running gear structural schematic diagram of the instant message applications of the embodiment of the present invention;
Fig. 4 is the structural schematic diagram of the operation module of the embodiment of the present invention;
Fig. 5 is the structural schematic diagram of the second operation submodule of the embodiment of the present invention;
Fig. 6 is another structural schematic diagram of the second operation submodule of the embodiment of the present invention;
Fig. 7 is another structural schematic diagram of the running gear of the instant message applications of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all other
Embodiment shall fall within the protection scope of the present invention.
One embodiment of the invention provides a kind of operation method of instant message applications, is applied to the terminals such as mobile phone, computer,
As shown in Figure 1, which comprises
101, when detecting instant message applications operation, the security level of current network is determined.
Wherein, instant message applications can be the chat softwares such as wechat, QQ, Michat, or the social activities such as microblogging, forum
Software, the embodiment of the present invention is with no restriction.
102, the corresponding operating mode of the security level is obtained.
For the embodiment of the present invention, under different working modes, the function that instant message applications can be run is different.Its
In, the function that can be run respectively under each operating mode, can by enterprise backstage be configured, can also by instant message applications into
The setting of row system.
103, the instant message applications is run according to the operating mode.
Compared with prior art, the embodiment of the present invention can be according to current network security situation, according to corresponding work
Mode operation instant message applications runs instant messaging still according to normal mode to avoid under network unsafe condition
Software, and lead to the case where secret is revealed in instant communication software.
Further embodiment of this invention provides a kind of operation method of instant message applications, as shown in Fig. 2, the method packet
It includes:
201, when detect instant message applications operation when, according to the network type of the current network, network identity and
Any one or any combination in Internet protocol address, determine the security level of the current network.
Wherein, network type may include cable network and wireless network, wireless network can specifically include Wifi, 4G,
3G and 2G etc.;Network identity may include: corporate networks, home network, coffee shop's network etc.;Security level includes advanced security
And low-level security.
For example, corresponding security level is advanced security when current network is corporate networks;Current network is coffee shop's net
When network, corresponding security level is low-level security.
It should be noted that in embodiments of the present invention, the quantity of security level and each security level title can be to appoint
What form.For example, security level may include advanced security and low-level security, it also may include a level security, secondary safety, three
Level security, four level securities, the embodiment of the present invention is with no restriction.
202, the corresponding operating mode of the security level is obtained.
The step 203a that executes after step 202, when the security level is advanced security, run the instant messaging
The repertoire of software.
Wherein, the repertoire of instant message applications may include chat message input function, chat record acquisition function
Deng.In embodiments of the present invention, the repertoire for running instant message applications refers to soft according to normal mode operation instant messaging
Part does not make any restrictions to its function that can be run.
With step 203a step 203b arranged side by side, when the security level be low-level security when, run the instant messaging
The partial function of software.
Wherein, the partial function that instant message applications can be run may include chat message input function, without including chatting
Its record obtains function.In embodiments of the present invention, when security level is low-level security, function that instant message applications can be run
It can be the function of not will cause the information leakages such as chat content.
Optionally, step 203b can be with are as follows: when the security level is low-level security, runs the instant message applications
Information input function, the chat record for forbidding running the instant message applications obtains function.
In embodiments of the present invention, by the security level in network be low-level security when, only run instant message applications
Information input function, and forbid run chat record obtain function, can be improved the safety of information in instant message applications
Property.
Optionally, step 203b can be with are as follows: when the security level is low-level security, it is soft to obtain the instant messaging
Sensitivity in the chat record of part records, and includes sensitive keys word in the sensitive record;Run the instant message applications
Information input function forbids the acquisition function of running the sensitive record.
Wherein, sensitive keys word can be configured by enterprise backstage, can also carry out self study according to chat content.Example
Such as, sensitive keys word may include: product issue date, product function, product parameters, the issue of theses, employee's wages treatment etc..
The step 204 of execution, display Password Input prompting frame after step 203b.
205, the encrypted message inputted based on the Password Input prompting frame is obtained.
Wherein, the password that password can make an appointment for enterprise backstage, or the login password of employee's account may be used also
Think the problem of making an appointment answer etc..
206, the encrypted message is verified.
The step of verifying to encrypted message include:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical
When, the time that each character is inputted when further according to input password is analyzed and determined, judges to be judged with failure discriminate, described
Failure discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;For t in history input behavioriAverage value;TCThe most short of 2 characters is inputted when indicating continuous input for the man-machine crash time
Time;P is adjustable similarity parameter, and value is between 0 to 1;When all discriminates are not satisfied, verification result is
Password is correct;
Wherein, previous discriminate indicates that the time of input password is less than the mankind's conventionally used time, to prevent with calculating
Machine decryption;Latter discriminate indicate this input password when rhythm and in the past input password when rhythm similarity compared with
It is low, it is illegally logged in prevent other people from obtaining password;P is adjustable similarity parameter, which is used by being manually set
To indicate the similarity degree of the rhythm when rhythm and past input password when this input password.
207, when the verification result of the encrypted message is that password is correct, whole function of the instant message applications are run
Energy.
In embodiments of the present invention, by subscriber authentication it is correct after, run the repertoire of instant message applications,
It can guarantee that chat content safety is higher simultaneously, improve the convenience that user uses instant message applications.
Further embodiment of this invention provides a kind of running gear of instant message applications, as shown in figure 3, described device packet
It includes:
Determining module 31, for determining the security level of current network when detecting instant message applications operation.
Wherein it is determined that the security level that module 31 determines may include advanced security and low-level security.
Module 32 is obtained, the corresponding operating mode of the security level determined for obtaining determining module 31.
Module 33 is run, the operating mode operation instant message applications for obtaining according to module 32 is obtained.
Compared with prior art, the embodiment of the present invention can be according to current network security situation, according to corresponding work
Mode operation instant message applications runs instant messaging still according to normal mode to avoid under network unsafe condition
Software, and lead to the case where secret is revealed in instant communication software.
Further, as shown in figure 4, the operation module 33 includes: the first operation submodule 331 or the second operation
Module 332.
First operation submodule 331, for running the instant message applications when the security level is advanced security
Repertoire.
Second operation submodule 332, for running the instant message applications when the security level is low-level security
Partial function.
Further, as shown in figure 5, the second operation submodule 332 includes: the first running unit 3321.
First running unit 3321, for running the instant message applications when the security level is low-level security
Information input function, the chat record for forbidding running the instant message applications obtains function.
Further, as shown in fig. 6, the second operation submodule 332 includes: acquiring unit 3322, the second running unit
3323。
Acquiring unit 3322, for obtaining chatting for the instant message applications when the security level is low-level security
Sensitivity in its record records, and includes sensitive keys word in the sensitive record.
Second running unit 3323 is forbidden described in operation for running the information input function of the instant message applications
The acquisition function of sensitivity record.
Further, as shown in fig. 7, described device further include: display module 34 obtains module 35, authentication module 36.
Display module 34, for showing Password Input prompting frame.
Module 35 is obtained, for obtaining the encrypted message based on Password Input prompting frame input.
Authentication module 36, for being verified to the encrypted message.The step of verifying to encrypted message include:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical
When, the time that each character is inputted when further according to input password is analyzed and determined, judges to be judged with failure discriminate, described
Failure discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;For t in history input behavioriAverage value;TCThe most short of 2 characters is inputted when indicating continuous input for the man-machine crash time
Time;P is adjustable similarity parameter, and value is between 0 to 1;When all discriminates are not satisfied, verification result is
Password is correct.
Wherein, previous discriminate indicates that the time of input password is less than the mankind's conventionally used time, to prevent with calculating
Machine decryption;Latter discriminate indicate this input password when rhythm and in the past input password when rhythm similarity compared with
It is low, it is illegally logged in prevent other people from obtaining password;P is adjustable similarity parameter, which is used by being manually set
To indicate the similarity degree of the rhythm when rhythm and past input password when this input password.
First operation submodule 331 is also used to run described instant when the verification result of encrypted message is that password is correct
The repertoire of communication software.
Further, determining module 31 comprises determining that submodule.
Submodule 311 is determined, for the network type, network identity and Internet protocol address according to the current network
In any one or any combination, determine the security level of the current network.
In embodiments of the present invention, by the security level in network be low-level security when, only run instant message applications
Information input function, and forbid run chat record obtain function, can be improved the safety of information in instant message applications
Property;By to subscriber authentication it is correct after, run the repertoire of instant message applications, can guarantee chat content safety
Property it is higher simultaneously, improve user use instant message applications convenience.
The embodiment of the method for above-mentioned offer may be implemented in the running gear of instant message applications provided in an embodiment of the present invention,
Concrete function realizes the explanation referred in embodiment of the method, and details are not described herein.Instant messaging provided in an embodiment of the present invention
The operation method and device of software can be adapted for maintaining secrecy to the chat content in instant message applications, but be not limited only to
This.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for equipment reality
For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method
Part explanation.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by those familiar with the art, all answers
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (6)
1. a kind of operation method of instant message applications characterized by comprising
When detecting instant message applications operation, the security level of current network is determined;
Obtain the corresponding operating mode of the security level;
The instant message applications is run according to the operating mode;
The security level includes advanced security and low-level security;
It is described to run the instant message applications according to the operating mode, comprising:
When the security level is advanced security, the repertoire of the instant message applications is run;Or,
When the security level is low-level security, the partial function of the instant message applications is run;
It is described when the security level is low-level security, after the partial function for running the instant message applications, further includes:
Show Password Input prompting frame;
Obtain the encrypted message inputted based on the Password Input prompting frame;
The encrypted message is verified;It is described that encrypted message is verified, comprising:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical, then
The time that each character is inputted when according to input password is analyzed and determined, judges to be judged with failure discriminate, the failure
Discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;To go through
T in history input behavioriAverage value;TCThe shortest time of 2 characters is inputted when indicating continuous input for the man-machine crash time;P
For adjustable similarity parameter, value is between 0 to 1;When all discriminates are not satisfied, verification result be password just
Really;
When the verification result of the encrypted message is that password is correct, the repertoire of the instant message applications is run.
2. the operation method of instant message applications according to claim 1, which is characterized in that described to work as the security level
When for low-level security, the partial function of the instant message applications is run, comprising:
When the security level is low-level security, the information input function of the instant message applications is run, forbids running institute
The chat record for stating instant message applications obtains function.
3. the operation method of instant message applications according to claim 1, which is characterized in that described to work as the security level
When for low-level security, the partial function of the instant message applications is run, comprising:
When the security level is low-level security, the sensitive record in the chat record of the instant message applications, institute are obtained
It states in sensitive record comprising sensitive keys word;
The information input function of running the instant message applications forbids the acquisition function of running the sensitive record.
4. the operation method of instant message applications according to claim 1-3, which is characterized in that the determination is worked as
The security level of preceding network, comprising:
According in the network type, network identity and Internet protocol address of the current network any one or any group
It closes, determines the security level of the current network.
5. a kind of running gear of instant message applications characterized by comprising
Determining module, for determining the security level of current network when detecting instant message applications operation;
Module is obtained, the corresponding operating mode of the security level determined for obtaining the determining module;
Module is run, the operating mode for obtaining according to the acquisition module runs the instant message applications;
The security level that the determining module determines includes advanced security and low-level security;
The operation module includes: the first operation submodule or the second operation submodule;
The first operation submodule, for running the instant message applications when the security level is advanced security
Repertoire;
The second operation submodule, for running the instant message applications when the security level is low-level security
Partial function;
Described device further include: display module obtains module, authentication module;
The display module, for showing Password Input prompting frame;
The acquisition module, for obtaining the encrypted message based on Password Input prompting frame input;
The authentication module, for being verified to the encrypted message;It is described that encrypted message is verified, comprising:
It is compared after the encrypted message of input is encrypted with encrypted encrypted message, when comparing result is identical, then
The time that each character is inputted when according to input password is analyzed and determined, judges to be judged with failure discriminate, the failure
Discriminate are as follows:
Wherein, tiIt indicates (i-1)-th character of input and inputs the time difference between i-th of character;N is code characters number;To go through
T in history input behavioriAverage value;TCThe shortest time of 2 characters is inputted when indicating continuous input for the man-machine crash time;P
For adjustable similarity parameter, value is between 0 to 1;When all discriminates are not satisfied, verification result be password just
Really;
The first operation submodule is also used to when the verification result of the encrypted message is that password is correct, and operation is described i.e.
When communication software repertoire.
6. the running gear of instant message applications according to claim 5, which is characterized in that the second operation submodule
It include: the first running unit;
First running unit, for running the letter of the instant message applications when the security level is low-level security
Input function is ceased, the chat record for running the instant message applications is forbidden to obtain function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611162707.8A CN106656756B (en) | 2016-12-15 | 2016-12-15 | The operation method and device of instant message applications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611162707.8A CN106656756B (en) | 2016-12-15 | 2016-12-15 | The operation method and device of instant message applications |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106656756A CN106656756A (en) | 2017-05-10 |
CN106656756B true CN106656756B (en) | 2019-09-13 |
Family
ID=58822796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611162707.8A Active CN106656756B (en) | 2016-12-15 | 2016-12-15 | The operation method and device of instant message applications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106656756B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2608602A1 (en) * | 2011-12-21 | 2013-06-26 | Nuance Communications, Inc. | Situation-aware message presentation for automotive messaging |
CN104267994A (en) * | 2014-09-30 | 2015-01-07 | 北京奇虎科技有限公司 | Application running device and terminal device |
CN104301117A (en) * | 2014-10-22 | 2015-01-21 | 中国联合网络通信集团有限公司 | Identity verification method and device |
CN105205388A (en) * | 2014-06-05 | 2015-12-30 | 腾讯科技(深圳)有限公司 | Authority management method and system for application |
CN105550591A (en) * | 2015-12-10 | 2016-05-04 | 厦门美图移动科技有限公司 | Security protection device and method for user data in mobile terminal |
CN105847216A (en) * | 2015-01-12 | 2016-08-10 | 阿里巴巴集团控股有限公司 | Identity authentication method and device |
CN105873062A (en) * | 2016-06-27 | 2016-08-17 | 联想(北京)有限公司 | Method and device to be networked with wireless communication network, and terminal equipment |
CN105991626A (en) * | 2015-03-06 | 2016-10-05 | 小米科技有限责任公司 | Network access method and network access device |
-
2016
- 2016-12-15 CN CN201611162707.8A patent/CN106656756B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2608602A1 (en) * | 2011-12-21 | 2013-06-26 | Nuance Communications, Inc. | Situation-aware message presentation for automotive messaging |
CN105205388A (en) * | 2014-06-05 | 2015-12-30 | 腾讯科技(深圳)有限公司 | Authority management method and system for application |
CN104267994A (en) * | 2014-09-30 | 2015-01-07 | 北京奇虎科技有限公司 | Application running device and terminal device |
CN104301117A (en) * | 2014-10-22 | 2015-01-21 | 中国联合网络通信集团有限公司 | Identity verification method and device |
CN105847216A (en) * | 2015-01-12 | 2016-08-10 | 阿里巴巴集团控股有限公司 | Identity authentication method and device |
CN105991626A (en) * | 2015-03-06 | 2016-10-05 | 小米科技有限责任公司 | Network access method and network access device |
CN105550591A (en) * | 2015-12-10 | 2016-05-04 | 厦门美图移动科技有限公司 | Security protection device and method for user data in mobile terminal |
CN105873062A (en) * | 2016-06-27 | 2016-08-17 | 联想(北京)有限公司 | Method and device to be networked with wireless communication network, and terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106656756A (en) | 2017-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9794228B2 (en) | Security challenge assisted password proxy | |
CN106797371B (en) | Method and system for user authentication | |
CN105681328B (en) | The method, apparatus and electronic equipment of controlling electronic devices | |
CN104065621B (en) | A kind of auth method of third party's service, client and system | |
Abbott et al. | How mandatory second factor affects the authentication user experience | |
US20220207164A1 (en) | Method for accessing application and apparatus, electronic device, and storage medium | |
US20150058972A1 (en) | Method And Apparatus For Accessing An Application Program | |
US20130139238A1 (en) | Method and System For Authenticating User Access To A Restricted Resource Across A Computer Network | |
Li et al. | Behaviour profiling on mobile devices | |
CA3066837A1 (en) | Auto-user registration and unlocking of a computing device | |
CN104468611A (en) | Data security processing method and device based on dual-system switching | |
CN103813334A (en) | Right control method and right control device | |
WO2013043534A1 (en) | Mobile computing device authentication using scannable images | |
CN104660589A (en) | Method and system for controlling encryption of information and analyzing information as well as terminal | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN104967597A (en) | Third-party application message authentication method and system based on secure channel | |
CN107733838A (en) | A kind of mobile terminal client terminal identity identifying method, device and system | |
CN105429943B (en) | Information processing method and terminal thereof | |
CN109698809A (en) | A kind of recognition methods of account abnormal login and device | |
CN107846406A (en) | A kind of account logon method and device | |
Jubur et al. | Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications | |
Consolvo et al. | " Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns | |
CN106559386A (en) | A kind of authentication method and device | |
CN104883341A (en) | Application management device, terminal and application management method | |
Gerlitz et al. | Adventures in recovery land: Testing the account recovery of popular websites when the second factor is lost |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220128 Address after: Room 1601, unit 1, 13th floor, building 1, No.33, Guangshun North Street, Chaoyang District, Beijing Patentee after: BEIJING RONGLIAN YITONG INFORMATION TECHNOLOGY CO.,LTD. Address before: 100000 room b253, floor 2, building 3, yard 29, Dongbeiwang South Road, Haidian District, Beijing Patentee before: BEIJING RONGLIAN GUANGHUI TECHNOLOGY CO.,LTD. |