CN107229846A - Information protecting method, device, mobile terminal and read/write memory medium - Google Patents

Information protecting method, device, mobile terminal and read/write memory medium Download PDF

Info

Publication number
CN107229846A
CN107229846A CN201710402230.4A CN201710402230A CN107229846A CN 107229846 A CN107229846 A CN 107229846A CN 201710402230 A CN201710402230 A CN 201710402230A CN 107229846 A CN107229846 A CN 107229846A
Authority
CN
China
Prior art keywords
application program
web
user authentication
authentication information
network environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710402230.4A
Other languages
Chinese (zh)
Inventor
李春林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201710402230.4A priority Critical patent/CN107229846A/en
Publication of CN107229846A publication Critical patent/CN107229846A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention discloses a kind of information protecting method, device, mobile terminal and read/write memory medium; when this method detects application program launching including mobile terminal; web-based history environmental labelses are obtained, the web-based history environmental labelses are to be prestored when prestoring the user authentication information of the application program binding;Current network environment mark is compared with the web-based history environmental labelses, controls the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result.This method is before application program verifies that login starts based on the user authentication information prestored automatically; it can detect whether network environment current is consistent with network environment when storing user authentication information before; to provide protection to the information in the corresponding user authentication information of application program and application program, the security of the information in application program is improved.

Description

Information protecting method, device, mobile terminal and read/write memory medium
Technical field
It is whole more particularly, to a kind of information protecting method, device, movement the present invention relates to technical field of mobile terminals End and read/write memory medium.
Background technology
When usual user uses the application program in mobile terminal, the username and password that can be first beneficial to registration is applying journey Authentication is carried out in sequence, after being proved to be successful, username and password can be stored in locally, so as to subsequent applications by application program Program is automatic using being stored in local username and password progress login authentication when starting.
But, existing application program is being opened after a username and password is crossed in good authentication in a very long time All without again requiring that user is manually entered username and password when dynamic, but can be directly from the local user name for reading and storing Login authentication is carried out with password so that the information in application program is easily revealed, and causes the security of information in application program not It is high.
The content of the invention
In view of the above problems, the present invention proposes a kind of information protecting method, device, mobile terminal and storage Jie can be read Matter, to lift the Information Security in application program.
In a first aspect, the embodiments of the invention provide a kind of information protecting method, this method includes:Mobile terminal is detected During application program launching, go to obtain web-based history environmental labelses, the web-based history environmental labelses are to prestore described answer Prestored during with the user authentication information of programmatic binding;Then by current network environment mark and the web-based history environment Mark is compared, and controls the application program to carry out the mistake that automatic checking is logged in based on the user authentication information according to comparison result Journey, so that play a part of protection to the information in application program, the security of the information in lifting application program.
With reference in a first aspect, the embodiments of the invention provide the first of first aspect embodiment, the web-based history ring Border, which is designated, believes the user's checking that the web-based history environmental labelses encrypt storage application program binding as key in advance Stored during breath.
With reference to the first embodiment of first aspect, the embodiments of the invention provide second of embodiment party of first aspect Formula, current network environment mark is compared with the web-based history environmental labelses for this, and the application is controlled according to comparison result The step of program carries out the process that automatic checking is logged in based on the user authentication information, including:Set when detecting in mobile terminal When being equipped with SIM card, identified the card number of the SIM card as the current network environment, judge the card number and the history of the SIM card Network environment mark is made whether unanimously, if the card number of the SIM card is consistent with the web-based history environmental labelses, to control the application Program is based on the user authentication information and carries out automatic checking login.
With reference to second of embodiment of first aspect, the embodiments of the invention provide the third of first aspect embodiment party Formula, current network environment mark is compared with the web-based history environmental labelses for this, and the application is controlled according to comparison result The step of program carries out the process that automatic checking is logged in based on the user authentication information, in addition to:If the card number of the SIM card is with being somebody's turn to do Web-based history environmental labelses are inconsistent, then detect whether mobile terminal is currently connected with WLAN, if so, then ought The network identity of the WLAN of preceding connection is identified as the current network environment, judges network environment mark with being somebody's turn to do Whether web-based history environmental labelses are consistent;
If network environment mark is consistent with the web-based history environmental labelses, the application program is controlled to be tested based on the user Demonstrate,prove information and carry out automatic checking login, if network environment mark is inconsistent with the web-based history environmental labelses, display unblock Data Enter interface, so that unlocking information and the web-based history environmental labelses for inputting user have been compared, if the unblock is believed Breath is consistent with the web-based history environmental labelses, then controls the application program to be based on the automatic checking of user authentication information progress and step on Record, if the unlocking information and the web-based history environmental labelses are inconsistent, forbids the application program to be based on the user authentication information Carry out automatic checking to log in, and control the application program to show user authentication information inputting interface, to believe in the user's checking Cease the new user authentication information of inputting interface typing.
With reference in a first aspect, the embodiments of the invention provide the 4th of first aspect kind embodiment, this is by current net Network environmental labelses are compared with web-based history environmental labelses, control the application program to be based on the user's checking according to comparison result The step of information carries out the process that automatic checking is logged in, including:SIM card is not provided with mobile terminal when detecting, and currently When being connected with WLAN, the network identity of the WLAN currently connected is regard as the current network environment mark Know, judge whether network environment mark is consistent with the web-based history environmental labelses, if unanimously, controlling the application program to be based on The user authentication information carries out automatic checking and logged in, if inconsistent, forbids the application program to enter based on the user authentication information The automatic checking of row is logged in, and controls the application program to show user authentication information inputting interface, so as in the user authentication information The new user authentication information of inputting interface typing.
With reference in a first aspect, the embodiments of the invention provide the 5th of first aspect kind embodiment, mobile terminal detection During to application program launching, before the step of obtaining the web-based history environmental labelses prestored, in addition to:The mobile terminal is examined Survey whether application program defencive function is opened, when detecting the unlatching of application program defencive function, perform mobile terminal and detect During application program launching, the web-based history environmental labelses prestored are obtained.
Second aspect, the embodiments of the invention provide a kind of information protection device, the information protection device, which has, to be realized State the function of information protecting method behavior in first aspect.The function can be realized by hardware, can also be held by hardware The corresponding software of row is realized.The hardware or software include one or more modules corresponding with above-mentioned functions.
In a possible design, the structure of information protection device includes processor and memory, the memory The program for supporting R-T unit to perform the above method for storing, the processor is configurable for performing in the memory The program of storage.Described information protection device can also include communication interface, for information protection device and other equipment or logical Communication network communicates.
The third aspect, the embodiments of the invention provide a kind of read/write memory medium, for saving as above- mentioned information protection Computer software instructions used in device, it, which is included, is used to perform program of the above-mentioned aspect designed by information protection device.
Relative to prior art, information protecting method that the present invention is provided, device, mobile terminal and storage can be read it is situated between Matter, can remove to obtain the web-based history environmental labelses prestored, the history when mobile terminal detects application program launching Network environment is designated to be stored when prestoring the user authentication information of application program binding, then by current network rings Border mark is compared with the web-based history environmental labelses, controls the application program to be based on the user according to comparison result Checking information carries out the process that automatic checking is logged in, so as to be tested automatically based on the user authentication information prestored in application program Card log in start before, can detect network environment current whether and before store user authentication information when network environment one Cause, to provide protection to the information in the corresponding user authentication information of application program and application program, improve application The security of information in program.
The aspects of the invention or other aspects can more straightforwards in the following description.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those skilled in the art, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 shows the information protecting method flow chart of one embodiment;
Fig. 2 shows the information protecting method flow chart of another embodiment;
Fig. 3 shows the information protecting method flow chart of further embodiment;
Fig. 4 shows the structured flowchart of the information protection device of one embodiment;
Fig. 5 shows the structured flowchart of the information protection device of another embodiment;
Fig. 6 shows the structured flowchart of the information protection device of further embodiment;
A kind of structured flowchart for mobile terminal that Fig. 7 provides for the embodiment of the present application;
Fig. 8 is the computing device for being used to perform information protecting method according to embodiments of the present invention of the embodiment of the present application Block diagram;
Fig. 9 be the embodiment of the present application be used for keep or carry and realize information protecting method according to embodiments of the present invention Program code memory cell.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described.
In some flows of description in description and claims of this specification and above-mentioned accompanying drawing, contain according to Particular order occur multiple operations, but it should be clearly understood that these operation can not herein occur according to it is suitable Sequence is performed or performed parallel, and the sequence number such as 101,102 etc. of operation is only used for distinguishing each different operation, sequence number Any execution sequence is not represented for itself.In addition, these flows can include more or less operations, and these operations can To perform or perform parallel in order.It should be noted that the description such as " first ", " second " herein, is to be used to distinguish not Same message, equipment, module etc., does not represent sequencing, it is different types also not limit " first " and " second ".
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, the every other implementation that those skilled in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Referring to Fig. 1, the embodiments of the invention provide a kind of information protecting method, this method runs on mobile terminal, should Method includes:
Step S110:When mobile terminal detects application program launching, the web-based history environmental labelses prestored are obtained, The web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
It should be noted that user after Successful login, is answered by user authentication information registered in advance in application program With program for the ease of subsequently can direct automated log on, it will usually by the user authentication information of binding, i.e. good authentication The user authentication information crossed is stored in locally.And in storing process, user authentication information can be encrypted.In encryption During can with network environment mark as key, wherein, the network environment mark can be SIM card card number or IMSI (International Mobile Subscriber Identification Number, international mobile subscriber identity), or Person links password as the key of encryption when mobile terminal has WLAN in link with WLAN.For example The SSID (Service Set Identifier, service set) of wlan network.And when storing user authentication information, in order to It is easy to follow-up verification process, network environment mark correspondence when storing user authentication information can be stored.Wherein, the user Checking information includes account and password.
In embodiments of the present invention, mobile terminal can first go to obtain the application program when detecting application program launching Corresponding web-based history environmental labelses, the web-based history environmental labelses are tied up to prestore the application program according to preceding method The network environment mark stored during fixed user authentication information.
As a kind of mode, mobile terminal can first judge before the web-based history environmental labelses prestored are obtained should Whether opened with programmed protection function, if mobile terminal opens application program defencive function, detecting application program During startup, then go to perform web-based history environmental labelses and the follow-up step that acquisition is prestored.If detected mobile whole End is not turned on application program defencive function, then no longer performing follow-up step, i.e. application program can be according to existing mode In the case where not detecting network environment mark, directly obtain and be stored in local user authentication information progress automated log on.
Step S120:Current network environment mark is compared with the web-based history environmental labelses, according to comparison Application program described in output control carries out the process that automatic checking is logged in based on the user authentication information.
In order to which whether network environment when verifying current network environment compared to storage user authentication information changes, then obtaining Get after current network environment mark, the user authentication information pair that the current network environment mark is bound with application program The web-based history environmental labelses answered are compared, if current network environment mark is consistent with web-based history environmental labelses, Illustrate that network environment does not change, then the user authentication information for controlling application program normally to obtain storage is stepped on automatically Record.If current network environment mark is inconsistent with web-based history environmental labelses, illustrate that current network environment has been sent out Life changes, then needs to protect application program, then forbids application program to go to obtain the user authentication information progress stored certainly It is dynamic to log in.
The information protecting method that the present invention is provided is verified automatically in application program based on the user authentication information prestored Log in start before, can detect network environment current whether and before store user authentication information when network environment one Cause, to provide protection to the information in application program, improve the security of the information in application program.
Referring to Fig. 2, a kind of information protecting method provided in an embodiment of the present invention, this method runs on mobile terminal, should Method includes:
Step S210:When mobile terminal detects application program launching, the web-based history environmental labelses prestored are obtained, The web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
Step S220:Whether detection mobile terminal is provided with SIM card.
Step S230:When detect be provided with SIM card in mobile terminal when, using the card number of the SIM card as it is described work as Preceding network environment mark, the card number and the web-based history environmental labelses for judging the SIM card is made whether unanimously.
Step S240:If consistent, control the application program to be based on the automatic checking of user authentication information progress and step on Record.
Step S250:If inconsistent, whether detection mobile terminal is currently connected with WLAN.
Step S260:If so, then regarding the network identity of the WLAN currently connected as the current net Network environmental labelses, judge whether the network environment mark is consistent with the web-based history environmental labelses.
Step S270:If consistent, control the application program to be based on the automatic checking of user authentication information progress and step on Record.
Step S280:If inconsistent, unlocking information input interface is shown.
Step S290:The unlocking information that user is inputted has been compared with the web-based history environmental labelses.
Step S291:If the unlocking information is consistent with the web-based history environmental labelses, the application program is controlled Automatic checking is carried out based on the user authentication information to log in.
Step S292:If inconsistent, the application program is forbidden to be verified automatically based on the user authentication information Log in, and control the application program to show user authentication information inputting interface, to input boundary in the user authentication information The new user authentication information of face typing.
The information protecting method that the present invention is provided is verified automatically in application program based on the user authentication information prestored Log in before starting, can based on detecting mobile terminal in the case where being provided with SIM card, by using SIM card card number as working as Preceding network environment mark, or be used as in the case where being connected with WLAN by the network identity of WLAN and work as The mode that preceding network environment mark is compared with web-based history environmental labelses, gives application program corresponding user authentication information And the information in application program provides protection, improves the security of the information in application program.
Referring to Fig. 3, a kind of information protecting method provided in an embodiment of the present invention, this method runs on mobile terminal, should Method includes:
Step S310:When mobile terminal detects application program launching, the web-based history environmental labelses prestored are obtained, The web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
Step S320:SIM card is not provided with mobile terminal when detecting.
Step S330:When detect be not provided with SIM card in mobile terminal when, detection currently whether be connected with wireless local Net, and when detected set SIM card when then can be according to previous embodiment the step of perform.
Step S340:Be connected to it is current when having connection WLAN, by the net of the WLAN currently connected Network mark is identified as the current network environment.
Step S350:Judge whether the network environment mark is consistent with the web-based history environmental labelses,
Step S360:If consistent, control the application program to be based on the automatic checking of user authentication information progress and step on Record.
Step S370:If inconsistent, the application program is forbidden to be verified automatically based on the user authentication information Log in, and control the application program to show user authentication information inputting interface, to input boundary in the user authentication information The new user authentication information of face typing.
Referring to Fig. 4, applying protection device 400 the embodiments of the invention provide one kind, the device 400 is arranged at mobile whole End, the device 400 includes:
Network identity acquiring unit 410, for detecting during application program launching, obtains the web-based history ring prestored Border is identified, and the web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
Start control unit 420, for current network environment mark to be compared with the web-based history environmental labelses It is right, control the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result.
Referring to Fig. 5, a kind of application protection device 500 provided in an embodiment of the present invention, the device 500 is arranged at mobile whole End, the device 500 includes:
Network identity acquiring unit 510, for detecting during application program launching, obtains the web-based history ring prestored Border is identified, and the web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
First detection unit 520, for when detect be provided with SIM card in mobile terminal when, by the card number of the SIM card As the current network environment mark, the card number and the web-based history environmental labelses for judging the SIM card are made whether Unanimously.
First start unit 530, the card number and the web-based history of SIM card are judged for first detection unit 520 When environmental labelses are consistent, then control the application program to be based on the user authentication information and carry out automatic checking login.
Second detection unit 540, if judging the card number and the history net of SIM card for first detection unit 520 Network environmental labelses are inconsistent, and whether detection mobile terminal is currently connected with WLAN, if so, then will currently connect The network identity of WLAN is identified as the current network environment, judges that the network environment mark is gone through with described History network environment is identified whether unanimously.
Second start unit 550, the network environment mark and the history are judged for second detection unit 540 Network environment mark is consistent, then controls the application program to be based on the automatic checking of user authentication information progress and log in.
Authentication unit 560 is unlocked, if judging that the network environment mark is gone through with described for second detection unit 540 History network environment mark is inconsistent, then unlocking information input interface is shown, so that the unlocking information for inputting user is gone through with described History network environment mark has been compared.
3rd start unit 570, the unlocking information and the web-based history are judged for the unblock authentication unit 560 When environmental labelses are consistent, control the application program to be based on the automatic checking of user authentication information progress and log in.
User authentication unit 580, the unlocking information and the web-based history are judged for the unblock authentication unit 560 When environmental labelses are inconsistent, forbid the application program to be based on the user authentication information and carry out automatic checking login, and control The application program shows user authentication information inputting interface, so as to the use in the user authentication information inputting interface typing newly Family checking information.
Referring to Fig. 6, a kind of application protection provided in an embodiment of the present invention fills 600, the device 600 is arranged at mobile whole End, the device 600 includes:
Network identity acquiring unit 610, for detecting during application program launching, obtains the web-based history ring prestored Border is identified, and the web-based history environmental labelses are to be stored when prestoring the user authentication information of the application program binding.
The startup control unit 620, is not provided with SIM card, and be currently connected with for working as to detect in mobile terminal During WLAN, identified the network identity of the WLAN currently connected as the current network environment, Judge whether the network environment mark is consistent with the web-based history environmental labelses, if unanimously, controlling the application program Automatic checking is carried out based on the user authentication information to log in;If inconsistent, the application program is forbidden to be based on the user Checking information carries out automatic checking and logged in, and controls the application program to show user authentication information inputting interface, so as in institute State the new user authentication information of user authentication information inputting interface typing.
In summary, the information protecting method, device, mobile terminal and the read/write memory medium that provide of the present invention, can be with When mobile terminal detects application program launching, remove to obtain the web-based history environmental labelses prestored, the web-based history ring Border is designated to be stored when prestoring the user authentication information of the application program binding, then current network environment is identified It is compared with the web-based history environmental labelses, controls the application program to believe based on the user's checking according to comparison result Breath carries out the process that automatic checking is logged in, so as to verify login automatically based on the user authentication information prestored in application program Before startup, it can detect whether network environment current is consistent with network environment when storing user authentication information before, with Just protection is provided to the information in the corresponding user authentication information of application program and application program, improved in application program Information security.
The embodiment of the present invention additionally provides mobile terminal, as shown in fig. 7, for convenience of description, illustrate only and the present invention The related part of embodiment, particular technique details is not disclosed, refer to present invention method part.The terminal can be Including mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is mobile phone as an example:
Fig. 7 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng Fig. 6 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input block 1530, display Unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, WiFi) module 1570, place Manage the part such as device 1580 and power supply 1590.It will be understood by those skilled in the art that the handset structure shown in Fig. 7 not structure The restriction of paired mobile phone, can include than illustrating more or less parts, either combine some parts or different parts Arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 7:
RF circuits 1510 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, handled to processor 1580;In addition, being sent to base station by up data are designed.Generally, RF circuits 1510 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 1510 can also be logical by radio communication and network and other equipment Letter.Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 1520 can be used for storage software program and module, and processor 1580 is stored in memory by operation 1520 software program and module, so as to perform various function application and the data processing of mobile phone.Memory 1520 can be led To include storing program area and storage data field, wherein, storing program area can be needed for storage program area, at least one function Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone Data (such as voice data, phone directory etc.) of establishment etc..In addition, memory 1520 can include high random access storage Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are solid State memory device.
Input block 1530 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 1530 may include contact panel 1531 and other inputs Equipment 1532.Contact panel 1531, also referred to as touch-screen, collect touch operation (such as user of the user on or near it Use the behaviour of any suitable object such as finger, stylus or annex on contact panel 1531 or near contact panel 1531 Make), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 1531 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 1580, and the order sent of reception processing device 1580 and can be performed.In addition, Contact panel 1531 can be realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except touch surface Plate 1531, input block 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. It is one or more.
Display unit 1540 can be used for each of the information that is inputted by user of display or the information for being supplied to user and mobile phone Plant menu.Display unit 1540 may include display panel 1541, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 1541.Further, contact panel 1531 can cover display panel 1541, when contact panel 1531 is detected To after the touch operation on or near it, processor 1580 is sent to determine the type of touch event, with preprocessor 1580 provide corresponding visual output according to the type of touch event on display panel 1541.Although in figure 6, contact panel 1531 and display panel 1541 are input and the input function that mobile phone is realized as two independent parts, but in some realities Apply in example, can be by contact panel 1531 and the input that is integrated and realizing mobile phone of display panel 1541 and output function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 1541, proximity transducer can close display panel when mobile phone is moved in one's ear 1541 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) and add The size of speed, can detect that size and the direction of gravity when static, application (the such as horizontal/vertical screen available for identification mobile phone posture Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 1560, loudspeaker 1561, microphone 1562 can provide the COBBAIF between user and mobile phone.Audio Electric signal after the voice data received conversion can be transferred to loudspeaker 1561, is changed by loudspeaker 1561 by circuit 1560 Exported for voice signal;On the other hand, the voice signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560 Voice data is converted to after reception, then after voice data output processor 1580 is handled, through RF circuits 1510 to be sent to ratio Such as another mobile phone, or voice data is exported to memory 1520 so as to further processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 1570 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 6 is shown WiFi module 1570, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 1580 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, By operation or perform and be stored in software program and/or module in memory 1520, and call and be stored in memory 1520 Interior data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 1580 may include one or more processing units;It is preferred that, processor 1580 can integrated application processor and modulation /demodulation processing Device, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is mainly located Manage radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone also includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply Management system and processor 1580 are logically contiguous, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiments of the present invention, the processor 1580 included by the terminal also has following functions:
A1. a kind of information protecting method, methods described includes:
When mobile terminal detects application program launching, the web-based history environmental labelses prestored, the history are obtained Network environment is designated to be stored when prestoring the user authentication information of the application program binding;By current network environment Mark is compared with the web-based history environmental labelses, controls the application program to be tested based on the user according to comparison result Demonstrate,prove information and carry out the process that automatic checking is logged in.
A2. the method according to A1, the web-based history environmental labelses are in advance by the web-based history environment mark Know and stored when the user authentication information for storing the application program binding is encrypted as key.
A3. the method according to A2, described to enter current network environment mark with the web-based history environmental labelses Row is compared, and controls the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result The step of, including:When detect be provided with SIM card in mobile terminal when, regard the card number of the SIM card as the current net Network environmental labelses, the card number and the web-based history environmental labelses for judging the SIM card is made whether unanimously, if unanimously, controlling Make the application program and be based on the automatic checking login of user authentication information progress.
A4. the method according to A3, described to enter current network environment mark with the web-based history environmental labelses Row is compared, and controls the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result The step of, in addition to:If inconsistent, whether detection mobile terminal is currently connected with WLAN, if so, then ought The network identity of the WLAN of preceding connection is identified as the current network environment, judges the network environment mark It is whether consistent with the web-based history environmental labelses;If consistent, the application program is controlled to be based on the user authentication information Carry out automatic checking to log in, if inconsistent, unlocking information input interface is shown, so as to the unlocking information for inputting user and institute State web-based history environmental labelses to have compared, if the unlocking information is consistent with the web-based history environmental labelses, control institute State application program and be based on the automatic checking login of user authentication information progress,
If inconsistent, forbid the application program to be based on the user authentication information and carry out automatic checking login, and control Make the application program and show user authentication information inputting interface, so as to new in the user authentication information inputting interface typing User authentication information.
A5. the method according to A1, described to enter current network environment mark with the web-based history environmental labelses Row is compared, and controls the application program to carry out the process that automatic checking is logged in based on the user authentication information according to comparison result The step of, including:, will be current when SIM card is not provided with mobile terminal when detecting, and being currently connected with WLAN The network identity of the WLAN of connection is identified as the current network environment, judge the network environment mark and Whether the web-based history environmental labelses are consistent, if unanimously, controlling the application program to enter based on the user authentication information The automatic checking of row is logged in;If inconsistent, forbid the application program to be based on the automatic checking of user authentication information progress and step on Record, and control the application program to show user authentication information inputting interface, so as in the user authentication information inputting interface The new user authentication information of typing.
A6. the method according to A1, when the mobile terminal detects application program launching, obtains going through of prestoring Before the step of history network environment is identified, in addition to:
Whether the mobile terminal detection application program defencive function is opened, and is opened when detecting application program defencive function When, when the execution mobile terminal detects application program launching, obtain the web-based history environmental labelses prestored.
A7. the method according to A1, the user authentication information includes account and password.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, such as multiple units or component Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces Close or communicate to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
Can be with one of ordinary skill in the art will appreciate that realizing that all or part of step in above-described embodiment method is The hardware of correlation is instructed to complete by program, described program can be stored in a kind of computer-readable recording medium, on It can be read-only storage, disk or CD etc. to state the storage medium mentioned.
Fig. 8 shows the computing device for the processing method that can realize the self-adapting estimation harassing call according to the present invention. The computing device conventionally comprises processor 810 and can with the computer program product or computer of the form of storage device 820 Read medium.Storage device 820 can be such as flash memory, EEPROM (Electrically Erasable Read Only Memory), EPROM, hard disk Or ROM etc electronic memory.Storage device 820 has storage for performing any method and step in the above method The memory space 830 of program code 831.For example, the memory space 830 of store program codes can include being respectively used in realization Each program code 831 of various steps in the method in face.These program codes can be from one or more computer journey Read or be written in sequence product in this one or more computer program product.These computer program products include all Such as the program code carrier of hard disk, compact-disc (CD), storage card or floppy disk etc.Such computer program product is usually Portable or static memory cell for example shown in Fig. 9.The memory cell can have and the storage in Fig. 8 computing device Memory paragraph, memory space of the similar arrangement of equipment 820 etc..Program code for example can be compressed in a suitable form.Generally, deposit Storage unit includes being used to perform the ' of computer-readable code 831 of steps of a method in accordance with the invention, you can with by such as 810 it The code that the processor of class is read, when these codes are run by computing device, causes the computing device describe above Method in each step.
A kind of mobile terminal provided by the present invention is described in detail above, for the general technology people of this area Member, according to the thought of the embodiment of the present invention, will change in specific embodiments and applications, in summary, This specification content should not be construed as limiting the invention.

Claims (10)

1. a kind of information protecting method, it is characterised in that methods described includes:
When mobile terminal detects application program launching, web-based history environmental labelses are obtained, the web-based history environmental labelses are Prestored when prestoring the user authentication information of the application program binding;
Current network environment mark is compared with the web-based history environmental labelses, should according to comparison result control The process that automatic checking is logged in is carried out based on the user authentication information with program.
2. according to the method described in claim 1, it is characterised in that described by current network environment mark and the history net Network environmental labelses are compared, and control the application program to be tested automatically based on the user authentication information according to comparison result The step of demonstrate,proving the process logged in, including:
When detect be provided with SIM card in mobile terminal when, regard the card number of the SIM card as the current network environment mark Know, the card number and the web-based history environmental labelses for judging the SIM card be made whether unanimously, if the card number of the SIM card and The web-based history environmental labelses are consistent, then control the application program to be based on the automatic checking of user authentication information progress and step on Record.
3. method according to claim 2, it is characterised in that described by current network environment mark and the history net Network environmental labelses are compared, and control the application program to be tested automatically based on the user authentication information according to comparison result The step of demonstrate,proving the process logged in, in addition to:
If the card number of the SIM card and the web-based history environmental labelses are inconsistent, whether detection mobile terminal currently connects There is WLAN, if so, then regarding the network identity of the WLAN currently connected as the current network Environmental labelses, judge whether the network environment mark is consistent with the web-based history environmental labelses;
If the network environment mark is consistent with the web-based history environmental labelses, the application program is controlled to be based on described use Family checking information carries out automatic checking and logged in, if network environment mark is inconsistent with the web-based history environmental labelses, Unlocking information input interface is shown, so that the unlocking information and the web-based history environmental labelses that input user have been compared, If the unlocking information is consistent with the web-based history environmental labelses, the application program is controlled to believe based on the user's checking Breath carries out automatic checking and logged in,
If the unlocking information and the web-based history environmental labelses are inconsistent, the application program is forbidden to be based on the user Checking information carries out automatic checking and logged in, and controls the application program to show user authentication information inputting interface, so as in institute State the new user authentication information of user authentication information inputting interface typing.
4. according to the method described in claim 1, it is characterised in that described by current network environment mark and the history net Network environmental labelses are compared, and control the application program to be tested automatically based on the user authentication information according to comparison result The step of demonstrate,proving the process logged in, including:
When SIM card is not provided with mobile terminal when detecting, and being currently connected with WLAN, by the nothing currently connected The network identity of line LAN is identified as the current network environment, judges the network environment mark and the history Network environment is identified whether unanimously;
If the network environment mark is consistent with the web-based history environmental labelses, the application program is controlled to be based on described use Family checking information carries out automatic checking and logged in,
If the network environment mark is inconsistent with the web-based history environmental labelses, the application program is forbidden to be based on described User authentication information carries out automatic checking and logged in, and controls the application program to show user authentication information inputting interface, so as to In the new user authentication information of the user authentication information inputting interface typing.
5. a kind of information protection device, it is characterised in that described device includes:
Network identity acquiring unit, for detecting during application program launching, obtains web-based history environmental labelses, the history net Network environmental labelses are to be prestored when prestoring the user authentication information of the application program binding;
Start control unit, for current network environment mark to be compared with the web-based history environmental labelses, according to Comparison result controls the application program to carry out the process that automatic checking is logged in based on the user authentication information.
6. device according to claim 5, it is characterised in that the startup control unit, including:
First detection unit, for when detect be provided with SIM card in mobile terminal when, regard the card number of the SIM card as institute Current network environment mark is stated, the card number and the web-based history environmental labelses for judging the SIM card are made whether unanimously;
First start unit, the card number and the web-based history environmental labelses one of SIM card are judged for first detection unit During cause, then control the application program to be based on the user authentication information and carry out automatic checking login.
7. device according to claim 6, it is characterised in that the startup control unit, in addition to:
Second detection unit, if judging the card number and the web-based history environmental labelses of SIM card for first detection unit Inconsistent, whether detection mobile terminal is currently connected with WLAN, if so, then by the WLAN currently connected The network identity of network is identified as the current network environment, judges the network environment mark and the web-based history environment Identify whether consistent;
Second start unit, the network environment mark and the web-based history environment mark are judged for second detection unit Know unanimously, then control the application program to be based on the user authentication information and carry out automatic checking login;
Authentication unit is unlocked, if judging the network environment mark and the web-based history environment for second detection unit Mark is inconsistent, then shows unlocking information input interface, so as to the unlocking information and the web-based history environment that input user Mark has been compared;
3rd start unit, the unlocking information and the web-based history environmental labelses one are judged for the unblock authentication unit During cause, control the application program to be based on the automatic checking of user authentication information progress and log in;
User authentication unit, judges the unlocking information with the web-based history environmental labelses not for the unblock authentication unit When consistent, forbid the application program to be based on the automatic checking of user authentication information progress and log in, and control the application journey Sequence shows user authentication information inputting interface, so as in the new user's checking letter of the user authentication information inputting interface typing Breath.
8. device according to claim 1, it is characterised in that the startup control unit, shifting is detected specifically for working as SIM card is not provided with dynamic terminal, and when being currently connected with WLAN, by the net of the WLAN currently connected Network mark is identified as the current network environment, judges that the network environment mark is with the web-based history environmental labelses It is no consistent, if unanimously, controlling the application program to be based on the automatic checking of user authentication information progress and logging in,
If inconsistent, forbid the application program to be based on the user authentication information and carry out automatic checking login, and control institute State application program and show user authentication information inputting interface, so as in the new user of the user authentication information inputting interface typing Checking information.
9. a kind of mobile terminal, it is characterised in that one or more processors;
Memory;
One or more application programs, wherein one or more of application programs are stored in the memory and are configured For by one or more of computing devices, one or more of programs are configured to:
When detecting application program launching, the web-based history environmental labelses prestored, the web-based history environmental labelses are obtained To be stored when prestoring the user authentication information of the application program binding;
Current network environment mark is compared with the web-based history environmental labelses, should according to comparison result control The process that automatic checking is logged in is carried out based on the user authentication information with program.
10. a kind of read/write memory medium, it is characterised in that the storage medium includes the program of storage, wherein, in the journey Following operation is performed during sort run:
When detecting application program launching, the web-based history environmental labelses prestored, the web-based history environmental labelses are obtained To be stored when prestoring the user authentication information of the application program binding;Current network environment mark is gone through with described History network environment mark is compared, and controls the application program to be based on the user authentication information according to comparison result and carries out certainly The process that dynamic checking is logged in.
CN201710402230.4A 2017-05-31 2017-05-31 Information protecting method, device, mobile terminal and read/write memory medium Pending CN107229846A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710402230.4A CN107229846A (en) 2017-05-31 2017-05-31 Information protecting method, device, mobile terminal and read/write memory medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710402230.4A CN107229846A (en) 2017-05-31 2017-05-31 Information protecting method, device, mobile terminal and read/write memory medium

Publications (1)

Publication Number Publication Date
CN107229846A true CN107229846A (en) 2017-10-03

Family

ID=59933879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710402230.4A Pending CN107229846A (en) 2017-05-31 2017-05-31 Information protecting method, device, mobile terminal and read/write memory medium

Country Status (1)

Country Link
CN (1) CN107229846A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067730A (en) * 2018-07-26 2018-12-21 北京小米移动软件有限公司 Manage the method and device of user account number
CN110135163A (en) * 2019-03-28 2019-08-16 江苏通付盾信息安全技术有限公司 A kind of safety detection method based on target application, apparatus and system
CN111127125A (en) * 2019-12-26 2020-05-08 北京每日优鲜电子商务有限公司 Virtual bill issuing method, device, server and storage medium
WO2021129533A1 (en) * 2019-12-26 2021-07-01 深圳市万普拉斯科技有限公司 Spam caller phone number identification method and apparatus, electronic device, and computer readable storage medium
CN114840118A (en) * 2022-05-06 2022-08-02 山西海云启辰科技有限公司 Multi-channel rapid access method for coal trading platform

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984261A (en) * 2012-12-04 2013-03-20 中国联合网络通信集团有限公司 Network service login method, equipment and system based on mobile telephone terminal
CN104883341A (en) * 2014-02-28 2015-09-02 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN105095744A (en) * 2014-05-07 2015-11-25 腾讯科技(深圳)有限公司 Application access method and device
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device
CN105867969A (en) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 APP starting method and terminal
CN107070915A (en) * 2017-04-11 2017-08-18 奇酷互联网络科技(深圳)有限公司 The guard method of mobile terminal and its application program and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984261A (en) * 2012-12-04 2013-03-20 中国联合网络通信集团有限公司 Network service login method, equipment and system based on mobile telephone terminal
CN104883341A (en) * 2014-02-28 2015-09-02 宇龙计算机通信科技(深圳)有限公司 Application management device, terminal and application management method
CN105095744A (en) * 2014-05-07 2015-11-25 腾讯科技(深圳)有限公司 Application access method and device
CN105867969A (en) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 APP starting method and terminal
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device
CN107070915A (en) * 2017-04-11 2017-08-18 奇酷互联网络科技(深圳)有限公司 The guard method of mobile terminal and its application program and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067730A (en) * 2018-07-26 2018-12-21 北京小米移动软件有限公司 Manage the method and device of user account number
CN109067730B (en) * 2018-07-26 2021-05-18 北京小米移动软件有限公司 Method and device for managing user account
CN110135163A (en) * 2019-03-28 2019-08-16 江苏通付盾信息安全技术有限公司 A kind of safety detection method based on target application, apparatus and system
CN111127125A (en) * 2019-12-26 2020-05-08 北京每日优鲜电子商务有限公司 Virtual bill issuing method, device, server and storage medium
WO2021129533A1 (en) * 2019-12-26 2021-07-01 深圳市万普拉斯科技有限公司 Spam caller phone number identification method and apparatus, electronic device, and computer readable storage medium
CN114840118A (en) * 2022-05-06 2022-08-02 山西海云启辰科技有限公司 Multi-channel rapid access method for coal trading platform

Similar Documents

Publication Publication Date Title
CN107229846A (en) Information protecting method, device, mobile terminal and read/write memory medium
CN108574940A (en) A kind for the treatment of method and apparatus of incoming call
CN107729133A (en) A kind of method, terminal and computer-readable recording medium for running application program
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN109246687A (en) ESIM test method, mobile terminal, system and readable storage medium storing program for executing
CN106331370A (en) Data transmission method and terminal device
CN107483213A (en) A kind of method of safety certification, relevant apparatus and system
CN106412311A (en) Data transmission method and terminal device
CN107343272A (en) A kind of data traffic sharing method and mobile terminal
CN106658623A (en) Hotspot network switching method and terminal equipment
CN108075899A (en) A kind of auth method, mobile terminal and computer readable storage medium
CN107172344A (en) Shooting file memory method, device and the mobile terminal of a kind of mobile terminal
CN108549826A (en) Method of calibration, terminal, server and the readable storage medium storing program for executing of application program
CN108509291A (en) Application program operation exception restorative procedure and system and mobile terminal
CN108307483A (en) wireless network connecting method and mobile terminal
CN107197470A (en) Wireless network connecting method, mobile terminal and computer-readable recording medium
CN106302603A (en) The method and apparatus remotely deleting information
CN104573437A (en) Information authentication method, device and terminal
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN107770356A (en) A kind of communication establishing method, equipment and computer-readable recording medium
CN107423598A (en) One kind solution lock control method and mobile terminal
CN106817489A (en) The reminding method and mobile terminal of message
CN109544140A (en) A kind of identification code scan method, terminal and readable storage medium storing program for executing
CN108601004A (en) NFC uses bootstrap technique, mobile terminal and computer readable storage medium
CN106331302A (en) Method and equipment for adding contact

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171003

RJ01 Rejection of invention patent application after publication