CN107229846A - Information protecting method, device, mobile terminal and read/write memory medium - Google Patents
Information protecting method, device, mobile terminal and read/write memory medium Download PDFInfo
- Publication number
- CN107229846A CN107229846A CN201710402230.4A CN201710402230A CN107229846A CN 107229846 A CN107229846 A CN 107229846A CN 201710402230 A CN201710402230 A CN 201710402230A CN 107229846 A CN107229846 A CN 107229846A
- Authority
- CN
- China
- Prior art keywords
- application program
- web
- user authentication
- authentication information
- network environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 76
- 230000007613 environmental effect Effects 0.000 claims abstract description 101
- 230000008569 process Effects 0.000 claims abstract description 23
- 238000001514 detection method Methods 0.000 claims description 22
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 5
- 230000006870 function Effects 0.000 description 21
- 230000006854 communication Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000004590 computer program Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000033001 locomotion Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 241000196324 Embryophyta Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
The invention discloses a kind of information protecting method, device, mobile terminal and read/write memory medium; when this method detects application program launching including mobile terminal; web-based history environmental labelses are obtained, the web-based history environmental labelses are to be prestored when prestoring the user authentication information of the application program binding;Current network environment mark is compared with the web-based history environmental labelses, controls the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result.This method is before application program verifies that login starts based on the user authentication information prestored automatically; it can detect whether network environment current is consistent with network environment when storing user authentication information before; to provide protection to the information in the corresponding user authentication information of application program and application program, the security of the information in application program is improved.
Description
Technical field
It is whole more particularly, to a kind of information protecting method, device, movement the present invention relates to technical field of mobile terminals
End and read/write memory medium.
Background technology
When usual user uses the application program in mobile terminal, the username and password that can be first beneficial to registration is applying journey
Authentication is carried out in sequence, after being proved to be successful, username and password can be stored in locally, so as to subsequent applications by application program
Program is automatic using being stored in local username and password progress login authentication when starting.
But, existing application program is being opened after a username and password is crossed in good authentication in a very long time
All without again requiring that user is manually entered username and password when dynamic, but can be directly from the local user name for reading and storing
Login authentication is carried out with password so that the information in application program is easily revealed, and causes the security of information in application program not
It is high.
The content of the invention
In view of the above problems, the present invention proposes a kind of information protecting method, device, mobile terminal and storage Jie can be read
Matter, to lift the Information Security in application program.
In a first aspect, the embodiments of the invention provide a kind of information protecting method, this method includes:Mobile terminal is detected
During application program launching, go to obtain web-based history environmental labelses, the web-based history environmental labelses are to prestore described answer
Prestored during with the user authentication information of programmatic binding;Then by current network environment mark and the web-based history environment
Mark is compared, and controls the application program to carry out the mistake that automatic checking is logged in based on the user authentication information according to comparison result
Journey, so that play a part of protection to the information in application program, the security of the information in lifting application program.
With reference in a first aspect, the embodiments of the invention provide the first of first aspect embodiment, the web-based history ring
Border, which is designated, believes the user's checking that the web-based history environmental labelses encrypt storage application program binding as key in advance
Stored during breath.
With reference to the first embodiment of first aspect, the embodiments of the invention provide second of embodiment party of first aspect
Formula, current network environment mark is compared with the web-based history environmental labelses for this, and the application is controlled according to comparison result
The step of program carries out the process that automatic checking is logged in based on the user authentication information, including:Set when detecting in mobile terminal
When being equipped with SIM card, identified the card number of the SIM card as the current network environment, judge the card number and the history of the SIM card
Network environment mark is made whether unanimously, if the card number of the SIM card is consistent with the web-based history environmental labelses, to control the application
Program is based on the user authentication information and carries out automatic checking login.
With reference to second of embodiment of first aspect, the embodiments of the invention provide the third of first aspect embodiment party
Formula, current network environment mark is compared with the web-based history environmental labelses for this, and the application is controlled according to comparison result
The step of program carries out the process that automatic checking is logged in based on the user authentication information, in addition to:If the card number of the SIM card is with being somebody's turn to do
Web-based history environmental labelses are inconsistent, then detect whether mobile terminal is currently connected with WLAN, if so, then ought
The network identity of the WLAN of preceding connection is identified as the current network environment, judges network environment mark with being somebody's turn to do
Whether web-based history environmental labelses are consistent;
If network environment mark is consistent with the web-based history environmental labelses, the application program is controlled to be tested based on the user
Demonstrate,prove information and carry out automatic checking login, if network environment mark is inconsistent with the web-based history environmental labelses, display unblock
Data Enter interface, so that unlocking information and the web-based history environmental labelses for inputting user have been compared, if the unblock is believed
Breath is consistent with the web-based history environmental labelses, then controls the application program to be based on the automatic checking of user authentication information progress and step on
Record, if the unlocking information and the web-based history environmental labelses are inconsistent, forbids the application program to be based on the user authentication information
Carry out automatic checking to log in, and control the application program to show user authentication information inputting interface, to believe in the user's checking
Cease the new user authentication information of inputting interface typing.
With reference in a first aspect, the embodiments of the invention provide the 4th of first aspect kind embodiment, this is by current net
Network environmental labelses are compared with web-based history environmental labelses, control the application program to be based on the user's checking according to comparison result
The step of information carries out the process that automatic checking is logged in, including:SIM card is not provided with mobile terminal when detecting, and currently
When being connected with WLAN, the network identity of the WLAN currently connected is regard as the current network environment mark
Know, judge whether network environment mark is consistent with the web-based history environmental labelses, if unanimously, controlling the application program to be based on
The user authentication information carries out automatic checking and logged in, if inconsistent, forbids the application program to enter based on the user authentication information
The automatic checking of row is logged in, and controls the application program to show user authentication information inputting interface, so as in the user authentication information
The new user authentication information of inputting interface typing.
With reference in a first aspect, the embodiments of the invention provide the 5th of first aspect kind embodiment, mobile terminal detection
During to application program launching, before the step of obtaining the web-based history environmental labelses prestored, in addition to:The mobile terminal is examined
Survey whether application program defencive function is opened, when detecting the unlatching of application program defencive function, perform mobile terminal and detect
During application program launching, the web-based history environmental labelses prestored are obtained.
Second aspect, the embodiments of the invention provide a kind of information protection device, the information protection device, which has, to be realized
State the function of information protecting method behavior in first aspect.The function can be realized by hardware, can also be held by hardware
The corresponding software of row is realized.The hardware or software include one or more modules corresponding with above-mentioned functions.
In a possible design, the structure of information protection device includes processor and memory, the memory
The program for supporting R-T unit to perform the above method for storing, the processor is configurable for performing in the memory
The program of storage.Described information protection device can also include communication interface, for information protection device and other equipment or logical
Communication network communicates.
The third aspect, the embodiments of the invention provide a kind of read/write memory medium, for saving as above- mentioned information protection
Computer software instructions used in device, it, which is included, is used to perform program of the above-mentioned aspect designed by information protection device.
Relative to prior art, information protecting method that the present invention is provided, device, mobile terminal and storage can be read it is situated between
Matter, can remove to obtain the web-based history environmental labelses prestored, the history when mobile terminal detects application program launching
Network environment is designated to be stored when prestoring the user authentication information of application program binding, then by current network rings
Border mark is compared with the web-based history environmental labelses, controls the application program to be based on the user according to comparison result
Checking information carries out the process that automatic checking is logged in, so as to be tested automatically based on the user authentication information prestored in application program
Card log in start before, can detect network environment current whether and before store user authentication information when network environment one
Cause, to provide protection to the information in the corresponding user authentication information of application program and application program, improve application
The security of information in program.
The aspects of the invention or other aspects can more straightforwards in the following description.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those skilled in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached
Figure.
Fig. 1 shows the information protecting method flow chart of one embodiment;
Fig. 2 shows the information protecting method flow chart of another embodiment;
Fig. 3 shows the information protecting method flow chart of further embodiment;
Fig. 4 shows the structured flowchart of the information protection device of one embodiment;
Fig. 5 shows the structured flowchart of the information protection device of another embodiment;
Fig. 6 shows the structured flowchart of the information protection device of further embodiment;
A kind of structured flowchart for mobile terminal that Fig. 7 provides for the embodiment of the present application;
Fig. 8 is the computing device for being used to perform information protecting method according to embodiments of the present invention of the embodiment of the present application
Block diagram;
Fig. 9 be the embodiment of the present application be used for keep or carry and realize information protecting method according to embodiments of the present invention
Program code memory cell.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described.
In some flows of description in description and claims of this specification and above-mentioned accompanying drawing, contain according to
Particular order occur multiple operations, but it should be clearly understood that these operation can not herein occur according to it is suitable
Sequence is performed or performed parallel, and the sequence number such as 101,102 etc. of operation is only used for distinguishing each different operation, sequence number
Any execution sequence is not represented for itself.In addition, these flows can include more or less operations, and these operations can
To perform or perform parallel in order.It should be noted that the description such as " first ", " second " herein, is to be used to distinguish not
Same message, equipment, module etc., does not represent sequencing, it is different types also not limit " first " and " second ".
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, the every other implementation that those skilled in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Referring to Fig. 1, the embodiments of the invention provide a kind of information protecting method, this method runs on mobile terminal, should
Method includes:
Step S110:When mobile terminal detects application program launching, the web-based history environmental labelses prestored are obtained,
The web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
It should be noted that user after Successful login, is answered by user authentication information registered in advance in application program
With program for the ease of subsequently can direct automated log on, it will usually by the user authentication information of binding, i.e. good authentication
The user authentication information crossed is stored in locally.And in storing process, user authentication information can be encrypted.In encryption
During can with network environment mark as key, wherein, the network environment mark can be SIM card card number or IMSI
(International Mobile Subscriber Identification Number, international mobile subscriber identity), or
Person links password as the key of encryption when mobile terminal has WLAN in link with WLAN.For example
The SSID (Service Set Identifier, service set) of wlan network.And when storing user authentication information, in order to
It is easy to follow-up verification process, network environment mark correspondence when storing user authentication information can be stored.Wherein, the user
Checking information includes account and password.
In embodiments of the present invention, mobile terminal can first go to obtain the application program when detecting application program launching
Corresponding web-based history environmental labelses, the web-based history environmental labelses are tied up to prestore the application program according to preceding method
The network environment mark stored during fixed user authentication information.
As a kind of mode, mobile terminal can first judge before the web-based history environmental labelses prestored are obtained should
Whether opened with programmed protection function, if mobile terminal opens application program defencive function, detecting application program
During startup, then go to perform web-based history environmental labelses and the follow-up step that acquisition is prestored.If detected mobile whole
End is not turned on application program defencive function, then no longer performing follow-up step, i.e. application program can be according to existing mode
In the case where not detecting network environment mark, directly obtain and be stored in local user authentication information progress automated log on.
Step S120:Current network environment mark is compared with the web-based history environmental labelses, according to comparison
Application program described in output control carries out the process that automatic checking is logged in based on the user authentication information.
In order to which whether network environment when verifying current network environment compared to storage user authentication information changes, then obtaining
Get after current network environment mark, the user authentication information pair that the current network environment mark is bound with application program
The web-based history environmental labelses answered are compared, if current network environment mark is consistent with web-based history environmental labelses,
Illustrate that network environment does not change, then the user authentication information for controlling application program normally to obtain storage is stepped on automatically
Record.If current network environment mark is inconsistent with web-based history environmental labelses, illustrate that current network environment has been sent out
Life changes, then needs to protect application program, then forbids application program to go to obtain the user authentication information progress stored certainly
It is dynamic to log in.
The information protecting method that the present invention is provided is verified automatically in application program based on the user authentication information prestored
Log in start before, can detect network environment current whether and before store user authentication information when network environment one
Cause, to provide protection to the information in application program, improve the security of the information in application program.
Referring to Fig. 2, a kind of information protecting method provided in an embodiment of the present invention, this method runs on mobile terminal, should
Method includes:
Step S210:When mobile terminal detects application program launching, the web-based history environmental labelses prestored are obtained,
The web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
Step S220:Whether detection mobile terminal is provided with SIM card.
Step S230:When detect be provided with SIM card in mobile terminal when, using the card number of the SIM card as it is described work as
Preceding network environment mark, the card number and the web-based history environmental labelses for judging the SIM card is made whether unanimously.
Step S240:If consistent, control the application program to be based on the automatic checking of user authentication information progress and step on
Record.
Step S250:If inconsistent, whether detection mobile terminal is currently connected with WLAN.
Step S260:If so, then regarding the network identity of the WLAN currently connected as the current net
Network environmental labelses, judge whether the network environment mark is consistent with the web-based history environmental labelses.
Step S270:If consistent, control the application program to be based on the automatic checking of user authentication information progress and step on
Record.
Step S280:If inconsistent, unlocking information input interface is shown.
Step S290:The unlocking information that user is inputted has been compared with the web-based history environmental labelses.
Step S291:If the unlocking information is consistent with the web-based history environmental labelses, the application program is controlled
Automatic checking is carried out based on the user authentication information to log in.
Step S292:If inconsistent, the application program is forbidden to be verified automatically based on the user authentication information
Log in, and control the application program to show user authentication information inputting interface, to input boundary in the user authentication information
The new user authentication information of face typing.
The information protecting method that the present invention is provided is verified automatically in application program based on the user authentication information prestored
Log in before starting, can based on detecting mobile terminal in the case where being provided with SIM card, by using SIM card card number as working as
Preceding network environment mark, or be used as in the case where being connected with WLAN by the network identity of WLAN and work as
The mode that preceding network environment mark is compared with web-based history environmental labelses, gives application program corresponding user authentication information
And the information in application program provides protection, improves the security of the information in application program.
Referring to Fig. 3, a kind of information protecting method provided in an embodiment of the present invention, this method runs on mobile terminal, should
Method includes:
Step S310:When mobile terminal detects application program launching, the web-based history environmental labelses prestored are obtained,
The web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
Step S320:SIM card is not provided with mobile terminal when detecting.
Step S330:When detect be not provided with SIM card in mobile terminal when, detection currently whether be connected with wireless local
Net, and when detected set SIM card when then can be according to previous embodiment the step of perform.
Step S340:Be connected to it is current when having connection WLAN, by the net of the WLAN currently connected
Network mark is identified as the current network environment.
Step S350:Judge whether the network environment mark is consistent with the web-based history environmental labelses,
Step S360:If consistent, control the application program to be based on the automatic checking of user authentication information progress and step on
Record.
Step S370:If inconsistent, the application program is forbidden to be verified automatically based on the user authentication information
Log in, and control the application program to show user authentication information inputting interface, to input boundary in the user authentication information
The new user authentication information of face typing.
Referring to Fig. 4, applying protection device 400 the embodiments of the invention provide one kind, the device 400 is arranged at mobile whole
End, the device 400 includes:
Network identity acquiring unit 410, for detecting during application program launching, obtains the web-based history ring prestored
Border is identified, and the web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
Start control unit 420, for current network environment mark to be compared with the web-based history environmental labelses
It is right, control the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result.
Referring to Fig. 5, a kind of application protection device 500 provided in an embodiment of the present invention, the device 500 is arranged at mobile whole
End, the device 500 includes:
Network identity acquiring unit 510, for detecting during application program launching, obtains the web-based history ring prestored
Border is identified, and the web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
First detection unit 520, for when detect be provided with SIM card in mobile terminal when, by the card number of the SIM card
As the current network environment mark, the card number and the web-based history environmental labelses for judging the SIM card are made whether
Unanimously.
First start unit 530, the card number and the web-based history of SIM card are judged for first detection unit 520
When environmental labelses are consistent, then control the application program to be based on the user authentication information and carry out automatic checking login.
Second detection unit 540, if judging the card number and the history net of SIM card for first detection unit 520
Network environmental labelses are inconsistent, and whether detection mobile terminal is currently connected with WLAN, if so, then will currently connect
The network identity of WLAN is identified as the current network environment, judges that the network environment mark is gone through with described
History network environment is identified whether unanimously.
Second start unit 550, the network environment mark and the history are judged for second detection unit 540
Network environment mark is consistent, then controls the application program to be based on the automatic checking of user authentication information progress and log in.
Authentication unit 560 is unlocked, if judging that the network environment mark is gone through with described for second detection unit 540
History network environment mark is inconsistent, then unlocking information input interface is shown, so that the unlocking information for inputting user is gone through with described
History network environment mark has been compared.
3rd start unit 570, the unlocking information and the web-based history are judged for the unblock authentication unit 560
When environmental labelses are consistent, control the application program to be based on the automatic checking of user authentication information progress and log in.
User authentication unit 580, the unlocking information and the web-based history are judged for the unblock authentication unit 560
When environmental labelses are inconsistent, forbid the application program to be based on the user authentication information and carry out automatic checking login, and control
The application program shows user authentication information inputting interface, so as to the use in the user authentication information inputting interface typing newly
Family checking information.
Referring to Fig. 6, a kind of application protection provided in an embodiment of the present invention fills 600, the device 600 is arranged at mobile whole
End, the device 600 includes:
Network identity acquiring unit 610, for detecting during application program launching, obtains the web-based history ring prestored
Border is identified, and the web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
The startup control unit 620, is not provided with SIM card, and be currently connected with for working as to detect in mobile terminal
During WLAN, identified the network identity of the WLAN currently connected as the current network environment,
Judge whether the network environment mark is consistent with the web-based history environmental labelses, if unanimously, controlling the application program
Automatic checking is carried out based on the user authentication information to log in;If inconsistent, the application program is forbidden to be based on the user
Checking information carries out automatic checking and logged in, and controls the application program to show user authentication information inputting interface, so as in institute
State the new user authentication information of user authentication information inputting interface typing.
In summary, the information protecting method, device, mobile terminal and the read/write memory medium that provide of the present invention, can be with
When mobile terminal detects application program launching, remove to obtain the web-based history environmental labelses prestored, the web-based history ring
Border is designated to be stored when prestoring the user authentication information of the application program binding, then current network environment is identified
It is compared with the web-based history environmental labelses, controls the application program to believe based on the user's checking according to comparison result
Breath carries out the process that automatic checking is logged in, so as to verify login automatically based on the user authentication information prestored in application program
Before startup, it can detect whether network environment current is consistent with network environment when storing user authentication information before, with
Just protection is provided to the information in the corresponding user authentication information of application program and application program, improved in application program
Information security.
The embodiment of the present invention additionally provides mobile terminal, as shown in fig. 7, for convenience of description, illustrate only and the present invention
The related part of embodiment, particular technique details is not disclosed, refer to present invention method part.The terminal can be
Including mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of
Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is mobile phone as an example:
Fig. 7 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng
Fig. 6 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input block 1530, display
Unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, WiFi) module 1570, place
Manage the part such as device 1580 and power supply 1590.It will be understood by those skilled in the art that the handset structure shown in Fig. 7 not structure
The restriction of paired mobile phone, can include than illustrating more or less parts, either combine some parts or different parts
Arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 7:
RF circuits 1510 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information is received, handled to processor 1580;In addition, being sent to base station by up data are designed.Generally, RF circuits
1510 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..In addition, RF circuits 1510 can also be logical by radio communication and network and other equipment
Letter.Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA
(Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution,
LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 1520 can be used for storage software program and module, and processor 1580 is stored in memory by operation
1520 software program and module, so as to perform various function application and the data processing of mobile phone.Memory 1520 can be led
To include storing program area and storage data field, wherein, storing program area can be needed for storage program area, at least one function
Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone
Data (such as voice data, phone directory etc.) of establishment etc..In addition, memory 1520 can include high random access storage
Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are solid
State memory device.
Input block 1530 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with
And the relevant key signals input of function control.Specifically, input block 1530 may include contact panel 1531 and other inputs
Equipment 1532.Contact panel 1531, also referred to as touch-screen, collect touch operation (such as user of the user on or near it
Use the behaviour of any suitable object such as finger, stylus or annex on contact panel 1531 or near contact panel 1531
Make), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 1531 may include touch detection
Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 1580, and the order sent of reception processing device 1580 and can be performed.In addition,
Contact panel 1531 can be realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except touch surface
Plate 1531, input block 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include
But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
It is one or more.
Display unit 1540 can be used for each of the information that is inputted by user of display or the information for being supplied to user and mobile phone
Plant menu.Display unit 1540 may include display panel 1541, optionally, can use liquid crystal display (Liquid
Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED)
To configure display panel 1541.Further, contact panel 1531 can cover display panel 1541, when contact panel 1531 is detected
To after the touch operation on or near it, processor 1580 is sent to determine the type of touch event, with preprocessor
1580 provide corresponding visual output according to the type of touch event on display panel 1541.Although in figure 6, contact panel
1531 and display panel 1541 are input and the input function that mobile phone is realized as two independent parts, but in some realities
Apply in example, can be by contact panel 1531 and the input that is integrated and realizing mobile phone of display panel 1541 and output function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 1541, proximity transducer can close display panel when mobile phone is moved in one's ear
1541 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) and add
The size of speed, can detect that size and the direction of gravity when static, application (the such as horizontal/vertical screen available for identification mobile phone posture
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also
The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 1560, loudspeaker 1561, microphone 1562 can provide the COBBAIF between user and mobile phone.Audio
Electric signal after the voice data received conversion can be transferred to loudspeaker 1561, is changed by loudspeaker 1561 by circuit 1560
Exported for voice signal;On the other hand, the voice signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560
Voice data is converted to after reception, then after voice data output processor 1580 is handled, through RF circuits 1510 to be sent to ratio
Such as another mobile phone, or voice data is exported to memory 1520 so as to further processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 1570
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 6 is shown
WiFi module 1570, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely
Become in the essential scope of invention and omit.
Processor 1580 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone,
By operation or perform and be stored in software program and/or module in memory 1520, and call and be stored in memory 1520
Interior data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor
1580 may include one or more processing units;It is preferred that, processor 1580 can integrated application processor and modulation /demodulation processing
Device, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is mainly located
Manage radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone also includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply
Management system and processor 1580 are logically contiguous, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiments of the present invention, the processor 1580 included by the terminal also has following functions:
A1. a kind of information protecting method, methods described includes:
When mobile terminal detects application program launching, the web-based history environmental labelses prestored, the history are obtained
Network environment is designated to be stored when prestoring the user authentication information of the application program binding;By current network environment
Mark is compared with the web-based history environmental labelses, controls the application program to be tested based on the user according to comparison result
Demonstrate,prove information and carry out the process that automatic checking is logged in.
A2. the method according to A1, the web-based history environmental labelses are in advance by the web-based history environment mark
Know and stored when the user authentication information for storing the application program binding is encrypted as key.
A3. the method according to A2, described to enter current network environment mark with the web-based history environmental labelses
Row is compared, and controls the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result
The step of, including:When detect be provided with SIM card in mobile terminal when, regard the card number of the SIM card as the current net
Network environmental labelses, the card number and the web-based history environmental labelses for judging the SIM card is made whether unanimously, if unanimously, controlling
Make the application program and be based on the automatic checking login of user authentication information progress.
A4. the method according to A3, described to enter current network environment mark with the web-based history environmental labelses
Row is compared, and controls the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result
The step of, in addition to:If inconsistent, whether detection mobile terminal is currently connected with WLAN, if so, then ought
The network identity of the WLAN of preceding connection is identified as the current network environment, judges the network environment mark
It is whether consistent with the web-based history environmental labelses;If consistent, the application program is controlled to be based on the user authentication information
Carry out automatic checking to log in, if inconsistent, unlocking information input interface is shown, so as to the unlocking information for inputting user and institute
State web-based history environmental labelses to have compared, if the unlocking information is consistent with the web-based history environmental labelses, control institute
State application program and be based on the automatic checking login of user authentication information progress,
If inconsistent, forbid the application program to be based on the user authentication information and carry out automatic checking login, and control
Make the application program and show user authentication information inputting interface, so as to new in the user authentication information inputting interface typing
User authentication information.
A5. the method according to A1, described to enter current network environment mark with the web-based history environmental labelses
Row is compared, and controls the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result
The step of, including:, will be current when SIM card is not provided with mobile terminal when detecting, and being currently connected with WLAN
The network identity of the WLAN of connection is identified as the current network environment, judge the network environment mark and
Whether the web-based history environmental labelses are consistent, if unanimously, controlling the application program to enter based on the user authentication information
The automatic checking of row is logged in;If inconsistent, forbid the application program to be based on the automatic checking of user authentication information progress and step on
Record, and control the application program to show user authentication information inputting interface, so as in the user authentication information inputting interface
The new user authentication information of typing.
A6. the method according to A1, when the mobile terminal detects application program launching, obtains going through of prestoring
Before the step of history network environment is identified, in addition to:
Whether the mobile terminal detection application program defencive function is opened, and is opened when detecting application program defencive function
When, when the execution mobile terminal detects application program launching, obtain the web-based history environmental labelses prestored.
A7. the method according to A1, the user authentication information includes account and password.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, such as multiple units or component
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or
The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces
Close or communicate to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
Can be with one of ordinary skill in the art will appreciate that realizing that all or part of step in above-described embodiment method is
The hardware of correlation is instructed to complete by program, described program can be stored in a kind of computer-readable recording medium, on
It can be read-only storage, disk or CD etc. to state the storage medium mentioned.
Fig. 8 shows the computing device for the processing method that can realize the self-adapting estimation harassing call according to the present invention.
The computing device conventionally comprises processor 810 and can with the computer program product or computer of the form of storage device 820
Read medium.Storage device 820 can be such as flash memory, EEPROM (Electrically Erasable Read Only Memory), EPROM, hard disk
Or ROM etc electronic memory.Storage device 820 has storage for performing any method and step in the above method
The memory space 830 of program code 831.For example, the memory space 830 of store program codes can include being respectively used in realization
Each program code 831 of various steps in the method in face.These program codes can be from one or more computer journey
Read or be written in sequence product in this one or more computer program product.These computer program products include all
Such as the program code carrier of hard disk, compact-disc (CD), storage card or floppy disk etc.Such computer program product is usually
Portable or static memory cell for example shown in Fig. 9.The memory cell can have and the storage in Fig. 8 computing device
Memory paragraph, memory space of the similar arrangement of equipment 820 etc..Program code for example can be compressed in a suitable form.Generally, deposit
Storage unit includes being used to perform the ' of computer-readable code 831 of steps of a method in accordance with the invention, you can with by such as 810 it
The code that the processor of class is read, when these codes are run by computing device, causes the computing device describe above
Method in each step.
A kind of mobile terminal provided by the present invention is described in detail above, for the general technology people of this area
Member, according to the thought of the embodiment of the present invention, will change in specific embodiments and applications, in summary,
This specification content should not be construed as limiting the invention.
Claims (10)
1. a kind of information protecting method, it is characterised in that methods described includes:
When mobile terminal detects application program launching, web-based history environmental labelses are obtained, the web-based history environmental labelses are
Prestored when prestoring the user authentication information of the application program binding;
Current network environment mark is compared with the web-based history environmental labelses, should according to comparison result control
The process that automatic checking is logged in is carried out based on the user authentication information with program.
2. according to the method described in claim 1, it is characterised in that described by current network environment mark and the history net
Network environmental labelses are compared, and control the application program to be tested automatically based on the user authentication information according to comparison result
The step of demonstrate,proving the process logged in, including:
When detect be provided with SIM card in mobile terminal when, regard the card number of the SIM card as the current network environment mark
Know, the card number and the web-based history environmental labelses for judging the SIM card be made whether unanimously, if the card number of the SIM card and
The web-based history environmental labelses are consistent, then control the application program to be based on the automatic checking of user authentication information progress and step on
Record.
3. method according to claim 2, it is characterised in that described by current network environment mark and the history net
Network environmental labelses are compared, and control the application program to be tested automatically based on the user authentication information according to comparison result
The step of demonstrate,proving the process logged in, in addition to:
If the card number of the SIM card and the web-based history environmental labelses are inconsistent, whether detection mobile terminal currently connects
There is WLAN, if so, then regarding the network identity of the WLAN currently connected as the current network
Environmental labelses, judge whether the network environment mark is consistent with the web-based history environmental labelses;
If the network environment mark is consistent with the web-based history environmental labelses, the application program is controlled to be based on described use
Family checking information carries out automatic checking and logged in, if network environment mark is inconsistent with the web-based history environmental labelses,
Unlocking information input interface is shown, so that the unlocking information and the web-based history environmental labelses that input user have been compared,
If the unlocking information is consistent with the web-based history environmental labelses, the application program is controlled to believe based on the user's checking
Breath carries out automatic checking and logged in,
If the unlocking information and the web-based history environmental labelses are inconsistent, the application program is forbidden to be based on the user
Checking information carries out automatic checking and logged in, and controls the application program to show user authentication information inputting interface, so as in institute
State the new user authentication information of user authentication information inputting interface typing.
4. according to the method described in claim 1, it is characterised in that described by current network environment mark and the history net
Network environmental labelses are compared, and control the application program to be tested automatically based on the user authentication information according to comparison result
The step of demonstrate,proving the process logged in, including:
When SIM card is not provided with mobile terminal when detecting, and being currently connected with WLAN, by the nothing currently connected
The network identity of line LAN is identified as the current network environment, judges the network environment mark and the history
Network environment is identified whether unanimously;
If the network environment mark is consistent with the web-based history environmental labelses, the application program is controlled to be based on described use
Family checking information carries out automatic checking and logged in,
If the network environment mark is inconsistent with the web-based history environmental labelses, the application program is forbidden to be based on described
User authentication information carries out automatic checking and logged in, and controls the application program to show user authentication information inputting interface, so as to
In the new user authentication information of the user authentication information inputting interface typing.
5. a kind of information protection device, it is characterised in that described device includes:
Network identity acquiring unit, for detecting during application program launching, obtains web-based history environmental labelses, the history net
Network environmental labelses are to be prestored when prestoring the user authentication information of the application program binding;
Start control unit, for current network environment mark to be compared with the web-based history environmental labelses, according to
Comparison result controls the application program to carry out the process that automatic checking is logged in based on the user authentication information.
6. device according to claim 5, it is characterised in that the startup control unit, including:
First detection unit, for when detect be provided with SIM card in mobile terminal when, regard the card number of the SIM card as institute
Current network environment mark is stated, the card number and the web-based history environmental labelses for judging the SIM card are made whether unanimously;
First start unit, the card number and the web-based history environmental labelses one of SIM card are judged for first detection unit
During cause, then control the application program to be based on the user authentication information and carry out automatic checking login.
7. device according to claim 6, it is characterised in that the startup control unit, in addition to:
Second detection unit, if judging the card number and the web-based history environmental labelses of SIM card for first detection unit
Inconsistent, whether detection mobile terminal is currently connected with WLAN, if so, then by the WLAN currently connected
The network identity of network is identified as the current network environment, judges the network environment mark and the web-based history environment
Identify whether consistent;
Second start unit, the network environment mark and the web-based history environment mark are judged for second detection unit
Know unanimously, then control the application program to be based on the user authentication information and carry out automatic checking login;
Authentication unit is unlocked, if judging the network environment mark and the web-based history environment for second detection unit
Mark is inconsistent, then shows unlocking information input interface, so as to the unlocking information and the web-based history environment that input user
Mark has been compared;
3rd start unit, the unlocking information and the web-based history environmental labelses one are judged for the unblock authentication unit
During cause, control the application program to be based on the automatic checking of user authentication information progress and log in;
User authentication unit, judges the unlocking information with the web-based history environmental labelses not for the unblock authentication unit
When consistent, forbid the application program to be based on the automatic checking of user authentication information progress and log in, and control the application journey
Sequence shows user authentication information inputting interface, so as in the new user's checking letter of the user authentication information inputting interface typing
Breath.
8. device according to claim 1, it is characterised in that the startup control unit, shifting is detected specifically for working as
SIM card is not provided with dynamic terminal, and when being currently connected with WLAN, by the net of the WLAN currently connected
Network mark is identified as the current network environment, judges that the network environment mark is with the web-based history environmental labelses
It is no consistent, if unanimously, controlling the application program to be based on the automatic checking of user authentication information progress and logging in,
If inconsistent, forbid the application program to be based on the user authentication information and carry out automatic checking login, and control institute
State application program and show user authentication information inputting interface, so as in the new user of the user authentication information inputting interface typing
Checking information.
9. a kind of mobile terminal, it is characterised in that one or more processors;
Memory;
One or more application programs, wherein one or more of application programs are stored in the memory and are configured
For by one or more of computing devices, one or more of programs are configured to:
When detecting application program launching, the web-based history environmental labelses prestored, the web-based history environmental labelses are obtained
To be stored when prestoring the user authentication information of the application program binding;
Current network environment mark is compared with the web-based history environmental labelses, should according to comparison result control
The process that automatic checking is logged in is carried out based on the user authentication information with program.
10. a kind of read/write memory medium, it is characterised in that the storage medium includes the program of storage, wherein, in the journey
Following operation is performed during sort run:
When detecting application program launching, the web-based history environmental labelses prestored, the web-based history environmental labelses are obtained
To be stored when prestoring the user authentication information of the application program binding;Current network environment mark is gone through with described
History network environment mark is compared, and controls the application program to be based on the user authentication information according to comparison result and carries out certainly
The process that dynamic checking is logged in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710402230.4A CN107229846A (en) | 2017-05-31 | 2017-05-31 | Information protecting method, device, mobile terminal and read/write memory medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710402230.4A CN107229846A (en) | 2017-05-31 | 2017-05-31 | Information protecting method, device, mobile terminal and read/write memory medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107229846A true CN107229846A (en) | 2017-10-03 |
Family
ID=59933879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710402230.4A Pending CN107229846A (en) | 2017-05-31 | 2017-05-31 | Information protecting method, device, mobile terminal and read/write memory medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107229846A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109067730A (en) * | 2018-07-26 | 2018-12-21 | 北京小米移动软件有限公司 | Manage the method and device of user account number |
CN110135163A (en) * | 2019-03-28 | 2019-08-16 | 江苏通付盾信息安全技术有限公司 | A kind of safety detection method based on target application, apparatus and system |
CN111127125A (en) * | 2019-12-26 | 2020-05-08 | 北京每日优鲜电子商务有限公司 | Virtual bill issuing method, device, server and storage medium |
WO2021129533A1 (en) * | 2019-12-26 | 2021-07-01 | 深圳市万普拉斯科技有限公司 | Spam caller phone number identification method and apparatus, electronic device, and computer readable storage medium |
CN114840118A (en) * | 2022-05-06 | 2022-08-02 | 山西海云启辰科技有限公司 | Multi-channel rapid access method for coal trading platform |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984261A (en) * | 2012-12-04 | 2013-03-20 | 中国联合网络通信集团有限公司 | Network service login method, equipment and system based on mobile telephone terminal |
CN104883341A (en) * | 2014-02-28 | 2015-09-02 | 宇龙计算机通信科技(深圳)有限公司 | Application management device, terminal and application management method |
CN105095744A (en) * | 2014-05-07 | 2015-11-25 | 腾讯科技(深圳)有限公司 | Application access method and device |
CN105656948A (en) * | 2016-03-30 | 2016-06-08 | 北京小米移动软件有限公司 | Account login method and device |
CN105867969A (en) * | 2016-03-25 | 2016-08-17 | 乐视控股(北京)有限公司 | APP starting method and terminal |
CN107070915A (en) * | 2017-04-11 | 2017-08-18 | 奇酷互联网络科技(深圳)有限公司 | The guard method of mobile terminal and its application program and device |
-
2017
- 2017-05-31 CN CN201710402230.4A patent/CN107229846A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984261A (en) * | 2012-12-04 | 2013-03-20 | 中国联合网络通信集团有限公司 | Network service login method, equipment and system based on mobile telephone terminal |
CN104883341A (en) * | 2014-02-28 | 2015-09-02 | 宇龙计算机通信科技(深圳)有限公司 | Application management device, terminal and application management method |
CN105095744A (en) * | 2014-05-07 | 2015-11-25 | 腾讯科技(深圳)有限公司 | Application access method and device |
CN105867969A (en) * | 2016-03-25 | 2016-08-17 | 乐视控股(北京)有限公司 | APP starting method and terminal |
CN105656948A (en) * | 2016-03-30 | 2016-06-08 | 北京小米移动软件有限公司 | Account login method and device |
CN107070915A (en) * | 2017-04-11 | 2017-08-18 | 奇酷互联网络科技(深圳)有限公司 | The guard method of mobile terminal and its application program and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109067730A (en) * | 2018-07-26 | 2018-12-21 | 北京小米移动软件有限公司 | Manage the method and device of user account number |
CN109067730B (en) * | 2018-07-26 | 2021-05-18 | 北京小米移动软件有限公司 | Method and device for managing user account |
CN110135163A (en) * | 2019-03-28 | 2019-08-16 | 江苏通付盾信息安全技术有限公司 | A kind of safety detection method based on target application, apparatus and system |
CN111127125A (en) * | 2019-12-26 | 2020-05-08 | 北京每日优鲜电子商务有限公司 | Virtual bill issuing method, device, server and storage medium |
WO2021129533A1 (en) * | 2019-12-26 | 2021-07-01 | 深圳市万普拉斯科技有限公司 | Spam caller phone number identification method and apparatus, electronic device, and computer readable storage medium |
CN114840118A (en) * | 2022-05-06 | 2022-08-02 | 山西海云启辰科技有限公司 | Multi-channel rapid access method for coal trading platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107229846A (en) | Information protecting method, device, mobile terminal and read/write memory medium | |
CN108574940A (en) | A kind for the treatment of method and apparatus of incoming call | |
CN107729133A (en) | A kind of method, terminal and computer-readable recording medium for running application program | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN109246687A (en) | ESIM test method, mobile terminal, system and readable storage medium storing program for executing | |
CN106331370A (en) | Data transmission method and terminal device | |
CN107483213A (en) | A kind of method of safety certification, relevant apparatus and system | |
CN106412311A (en) | Data transmission method and terminal device | |
CN107343272A (en) | A kind of data traffic sharing method and mobile terminal | |
CN106658623A (en) | Hotspot network switching method and terminal equipment | |
CN108075899A (en) | A kind of auth method, mobile terminal and computer readable storage medium | |
CN107172344A (en) | Shooting file memory method, device and the mobile terminal of a kind of mobile terminal | |
CN108549826A (en) | Method of calibration, terminal, server and the readable storage medium storing program for executing of application program | |
CN108509291A (en) | Application program operation exception restorative procedure and system and mobile terminal | |
CN108307483A (en) | wireless network connecting method and mobile terminal | |
CN107197470A (en) | Wireless network connecting method, mobile terminal and computer-readable recording medium | |
CN106302603A (en) | The method and apparatus remotely deleting information | |
CN104573437A (en) | Information authentication method, device and terminal | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN107770356A (en) | A kind of communication establishing method, equipment and computer-readable recording medium | |
CN107423598A (en) | One kind solution lock control method and mobile terminal | |
CN106817489A (en) | The reminding method and mobile terminal of message | |
CN109544140A (en) | A kind of identification code scan method, terminal and readable storage medium storing program for executing | |
CN108601004A (en) | NFC uses bootstrap technique, mobile terminal and computer readable storage medium | |
CN106331302A (en) | Method and equipment for adding contact |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171003 |
|
RJ01 | Rejection of invention patent application after publication |