CN107563210A - A kind of information processing method, terminal and computer-readable recording medium - Google Patents
A kind of information processing method, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107563210A CN107563210A CN201710766481.0A CN201710766481A CN107563210A CN 107563210 A CN107563210 A CN 107563210A CN 201710766481 A CN201710766481 A CN 201710766481A CN 107563210 A CN107563210 A CN 107563210A
- Authority
- CN
- China
- Prior art keywords
- account
- information
- security
- encrypted message
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The embodiment of the present invention discloses a kind of information processing method, terminal and computer-readable recording medium, in Account Registration, triggers backstage Password Management, display alarm window is described to remind window to carry out classification selection to the password of login account for reminding;If receiving the first operation to the prompting window, the level of security for determining first operation instruction is the level of security of the login account;If not receiving the operation to the prompting window, the level of security of the login account is determined according to the information sensitivity of login account;Verification mode when logging in the login account is set according to the level of security of the login account, so, differentiated control is carried out by the account password used in being lived to user, logged in for the account number cipher of different degrees of risk using different verification modes, the process of memory and input account password information is saved, saves the time.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of information processing method, terminal and computer-readable storage
Medium.
Background technology
With the continuous development of internet and electronic technology, application of the various electronic equipments in people live is got over
Come it is more extensive, meanwhile, the business based on various electronic equipments people live in application it is more and more extensive.In the prior art,
During people are operated, live, learn and entertained by network and electronic equipment, it usually needs register account number information
Or the website of encrypted message or APP, using more and more, some users remember for convenience, and it is close to be usually disposed as same account
Code, so safety are relatively low;And it is arranged to different account number ciphers, user needs classification to remember a large amount of various passwords again,
Easily obscure, easily forget over time, the account that expense was filled in serious even resulting in is looked for return, and is caused very to user
Big inconvenience.
The content of the invention
In order to solve the above technical problems, the embodiment of the present invention provides a kind of information processing method, terminal and computer-readable
Storage medium, the account password used in being lived to user carry out differentiated control, adopted for the account number cipher of different degrees of risk
Logged in different verification modes, save the process of memory and input account password information, save the time.
The technical proposal of the invention is realized in this way:
On the one hand, the embodiment of the present invention provides a kind of information processing method, and methods described includes:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration
The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described
The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account
The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, the triggering backstage Password Management, including:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration
In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification
After mode, in addition to:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, it is described when detecting account logon operation when the level of security is lower security rank, according to
The verification mode carries out verification login account, including:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed
Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message
First account, described second operates for indicating that determination logs in first account.
Further, it is described when detecting account logon operation when the level of security is high safety rank, according to
The verification mode carries out verification login account, including:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to
The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account
And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close
Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information
Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count
Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly
Log in second account.
On the one hand, the embodiment of the present invention also provides a kind of terminal, and the terminal includes:Processor, memory and communication are total
Line;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform the message handling program stored in memory, to realize following steps:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration
The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described
The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account
The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, the processor is used to perform the message handling program stored in memory, to realize following steps:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration
In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification
After mode, the processor is additionally operable to perform the message handling program stored in memory, to realize following steps:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, when the level of security is lower security rank, in the safe level according to the login account
After verification mode when She Zhi not log in the login account, the processor is additionally operable to perform the information stored in memory
Processing routine, to realize following steps:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed
Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message
First account, described second operates for indicating that determination logs in first account.
Further, when the level of security is high safety rank, in the safe level according to the login account
After verification mode when She Zhi not log in the login account, the processor is additionally operable to perform the information stored in memory
Processing routine, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to
The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account
And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close
Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information
Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count
Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly
Log in second account.
On the one hand, the embodiment of the present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium
Matter is stored with one or more program, and one or more of programs can be by one or more computing device, with reality
Existing following steps:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration
The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described
The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account
The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, one or more of programs can be walked by one or more computing device so that realization is following
Suddenly:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration
In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification
After mode, one or more of programs can be by one or more computing device, to realize following steps:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, when the level of security is lower security rank, in the safe level according to the login account
After verification mode when She Zhi not log in the login account, one or more of programs can be by one or more
Manage device to perform, to realize following steps:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed
Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message
First account, described second operates for indicating that determination logs in first account.
Further, when the level of security is high safety rank, in the safe level according to the login account
After verification mode when She Zhi not log in the login account, one or more of programs can be by one or more
Manage device to perform, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to
The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account
And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close
Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information
Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count
Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly
Log in second account.
The embodiments of the invention provide a kind of information processing method, terminal and computer-readable recording medium, by
The account password used in the life of family carries out differentiated control, and different verification sides is used for the account number cipher of different degrees of risk
Formula is logged in, and is saved the process of memory and input account password information, is saved the time.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for an optional mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is information processing method schematic flow sheet one provided in an embodiment of the present invention;
Fig. 4 is the prompting window display example figure in terminal provided in an embodiment of the present invention;
Fig. 5 is information processing method schematic flow sheet two provided in an embodiment of the present invention;
Fig. 6 is log-in interface exemplary plot one provided in an embodiment of the present invention;
Fig. 7 is information processing method schematic flow sheet three provided in an embodiment of the present invention;
Fig. 8 is log-in interface exemplary plot two provided in an embodiment of the present invention;
Fig. 9 is terminal structure schematic diagram provided in an embodiment of the present invention.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move
Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or
It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving GateWay,
Gateway) 2034, PGW (PDN GateWay, grouped data network gateway) 2035 and PCRF (Policy and Charging
Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and EPC203 between
The control node of signaling, there is provided carrying and connection management.HSS2032 is used to provide some registers to manage such as homing position
The function of register (not shown) etc, and some are preserved about the special letter of the users such as service features, data rate
Breath.All customer data can be transmitted by SGW2034, PGW2035 can provide UE 201 IP address distribute with
And other functions, PCRF2036 are the strategy and charging control policy decision point of business data flow and IP bearing resources, it is plan
Available strategy and charging control decision-making are slightly selected and provided with charge execution function unit (not shown).
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
The embodiment of the present invention provides a kind of information processing method, as shown in figure 3, this method can include:
Step 301, in Account Registration, trigger backstage Password Management, display alarm window.
Wherein, it is described to remind window to carry out classification selection to the password of login account for reminding.
Specifically, in the embodiment of the present invention, in Account Registration, backstage Password Management is triggered, display alarm window can be with
It is to be realized by terminal, be i.e. the Password Management on terminal triggering terminal itself backstage, while show prompting window, reminds user to current
The account of registration carries out password differentiated control.Terminal in the present invention can be mobile terminal, can be preferably to have operation
The mobile intelligent terminal of system.
Mobile terminal refers to the equipment that can be used on the move, and broad sense is said including mobile phone, notebook, tablet personal computer,
Even include vehicle-mounted computer.But refer in most cases mobile phone or with a variety of application functions smart mobile phone and
Tablet personal computer.As network and technology are towards the development in more and more broadband direction, Mobile Communication Industry will move towards real
The mobile message epoch.On the other hand, as the rapid development of integrated circuit technique, the disposal ability of mobile terminal have had
Powerful disposal ability, mobile terminal are changed into an integrated information processing platform from simple call instrument.This is also to shifting
Dynamic terminal adds broader development space.Mobile terminal is existing several with Mobile Communication Development as simple communication equipment
The history of 10 years.Mobile intelligent terminal is almost changed into the crucial entrance of Internet service between a flash and main innovation is put down
Platform, new media, ecommerce and information service platform, Internet resources, mobile network resource and environmental interaction resource are most
The strategy system of important pivot, its operating system and processor chips even as current whole information and communication technology (ICT) industry is high
Point.Mobile intelligent terminal can be referred to as intelligent terminal, and mobile intelligent terminal possesses access the Internet capability, generally carries various
Operating system, various functions can be customized according to user's request.Common intelligent terminal includes mobile intelligent terminal, vehicle-mounted in life
Intelligent terminal, intelligent television, wearable device etc..
Specifically, user, when carrying out Account Registration operation in terminal, terminal synchronization triggering terminal itself carries out close from the background
Code is managed, while active display alarm window, and alternative secret grade is shown in the prompting window, such as shown in Fig. 4
Window display interface, " secret grade please be set ", including 1-5 level of security are reminded, level of security can be defined from low to high
Corresponding safety verification strategy more and more higher, i.e. it is minimum that 1 level security rank correspond to security strategy, and it is clear can to correspond to general Websites login
Look at, no fund contact, no sensitive personal information;5 grades of corresponding security strategy highests, user privacy information or property peace can be corresponded to
The account and password of full website or application, such as various social security cards, common reserve fund card, or vip card;Optionally, can also determine
It is more and more lower that adopted level of security corresponds to safety verification strategy from low to high, i.e. 1 level security rank corresponds to security strategy highest, 5 grades
It is minimum that level of security corresponds to security strategy.
Wherein, it can be triggering backstage generation encryption file that terminal synchronization triggering terminal itself backstage, which carries out Password Management,
The encryption file is used to synchronously preserve the information during Account Registration, the letter during the Account Registration in Account Registration
Breath comprises at least:Accounts information and encrypted message.
After step 301, can also include:Step 302 and step 303.
If step 302, receive the safe level for first operation for reminding window, determining first operation instruction
Not Wei the login account level of security.
If step 303, not receiving to the operation for reminding window, institute is determined according to the information sensitivity of login account
State the level of security of login account.
Specifically, after terminal display alarm window, user oneself can select the level of security of current login account, when with
After family have selected level of security, the level of security that user selects is arranged to the level of security of current login account by terminal, if
The operation that user selects level of security is not received by preset time, i.e. user does not select level of security, then terminal is current
The information sensitivity of login account determines the level of security of login account, specifically can judge account by the type of login account
Information sensitivity, for example, the information sensitivity of bank account is higher, it is necessary to set the higher safe class of security strategy, commonly
Website information sensitivity it is relatively low, then the relatively low safe class of security strategy can be set.
Step 304, verification mode when logging in the login account set according to the level of security of the login account.
Specifically, terminal determines the level of security of current login account, each level of security corresponds to a kind of safe plan
Omit, i.e. verification mode, after the completion of Account Registration, if user logs on the account, what terminal can be set according to the account
Security strategy income corresponding to level of security verifies login account.
Further, it is described according to the level of security of the login account set log in the login account when verification
After mode, in addition to:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Method provided in an embodiment of the present invention, be related to website in user, APP, bank, using etc. need login account close
During code, terminal system triggering background encryption management, and pop-up window reminds user to carry out classification selection to password;If user is without bright
Really it is intended to, system then selects to recommend cryptographic levels according to information sensing degree.Again during follow-up use, according to detection user's account
Family password login activity, triggering account password set the corresponding verification means of grade, and verification passes through, and password account is adjusted automatically
Go out, automated log on, user saves the energy of many memory account number ciphers, saves the trouble for continually entering long string account number cipher.
The embodiments of the invention provide a kind of information processing method, is carried out by the account password used in being lived to user
Differentiated control, logged in for the account number cipher of different degrees of risk using different verification modes, save memory and input
The process of account password information, saves the time.
The embodiment of the present invention provides a kind of information processing method, as shown in figure 5, this method can include:
Step 401, in Account Registration, triggering backstage generation encryption file, and display alarm window.
Wherein, the encryption file is used to synchronously preserve the information during Account Registration, the account in Account Registration
Information in the registration process of family comprises at least:Accounts information and encrypted message.The prompting window is used to remind to login account
Password carry out classification selection.
The executive agent of information processing method provided in an embodiment of the present invention can be terminal, wherein, the terminal can be with
For mobile terminal, mobile terminal can be implemented in a variety of manners, and the mobile terminal has the function of connection network.For example, hand
Machine, PDA (personal digital assistant), PAD (tablet personal computer) etc..
Exemplary, such as the prompting window display interface shown in Fig. 4, " secret grade please be set ", including 1-5 safety
Rank, level of security can be defined and correspond to safety verification strategy more and more higher from low to high, be i.e. 1 level security rank corresponds to safe plan
It is slightly minimum, general Websites login can be corresponded to and browsed, no fund contact, no sensitive personal information;5 grades of corresponding security strategies are most
Height, website or the application of user privacy information or property safety, such as various social security cards, common reserve fund card, or VIP can be corresponded to
The account and password of card.
If step 402, receive the safe level for first operation for reminding window, determining first operation instruction
Not Wei the login account level of security.
Optionally, after step 401, can also include:If the operation to the prompting window is not received, according to note
The information sensitivity of volume account determines the level of security of the login account.
Step 403, verification mode when logging in the login account set according to the level of security of the login account.
Specifically, terminal according to the level of security of login account set log in the login account when verification mode it
Afterwards, if user logs on the account, verification can be carried out according to the verification mode of setting and logged in, particularly for different peaces
Full rank uses different verification modes.
Here, the process of the login account of above-mentioned steps 401 to 403 can be understood as the registration process of the first account, when
The verification mode set when can be according to registration when logging in the first account again carries out verification and logged in.
When level of security is lower security rank, when detecting account logon operation, verified according to verification mode
Login account includes step 404 to step 405.
Step 404, when detecting the first account logon operation, first account is obtained according to the Password Management on backstage
Accounts information and encrypted message, show the accounts information and encrypted message of first account automatically.
If step 405, when receiving the second operation, according to the accounts information and password of first account shown automatically
First account described in log.
Wherein, described second operate for indicating that determination logs in first account.
Specifically, as shown in fig. 6, user logs in the first account, after terminal detects the logon operation of user, according to backstage
The accounts information and encrypted message of encryption file acquisition first account prestored, then automatically by account information and close
Code information is input to log-in interface, after user, which clicks on confirmation, to be logged in, logs in automatically.
Exemplary, certain user have registered the account of A forums in March, and after a period of time, June logs on A
Forum, the account number cipher of A forums is can not remember, is also not provided with close guarantor's problem when registering originally or can not think close guarantor's problem,
It is again pretty troublesome to give password for change.Using method provided in an embodiment of the present invention, mobile phone can worked as by back-end data Intelligent Measurement
When first user applies for this A forums account number cipher, an encryption TXT file is generated with regard to synchronous recording, and actively eject and remind small window
Mouthful, " secret grade please be set "【Addition has 1-5 security leveldefinition】It is the safe level of A forums that if user, which selects " 1 grade ",
Not, wherein, " 1 grade " corresponding security strategy includes:This account is only that general Websites login browses, no fund contact, no sensitive
People's information, it is automatic to show account and encrypted message;So, when user logs on A forums window, detect that login is lived from the background
It is dynamic, account and encrypted message are jumped out automatically, and password may be selected to add asterisk or directly display, and user only needs a determination can be direct
Login is entered.So, user need not just remember substantial amounts of forum of Baidu account or each forum used once in a while.
The embodiments of the invention provide a kind of information processing method, is carried out by the account password used in being lived to user
Differentiated control, logged in for the account number cipher of different degrees of risk using different verification modes, save memory and input
The process of account password information, saves the time.
The embodiment of the present invention provides a kind of information processing method, as shown in fig. 7, this method can include:
Step 501, in Account Registration, triggering backstage generation encryption file, and display alarm window.
Wherein, the encryption file is used to synchronously preserve the information during Account Registration, the account in Account Registration
Information in the registration process of family comprises at least:Accounts information and encrypted message.The prompting window is used to remind to login account
Password carry out classification selection.
The executive agent of information processing method provided in an embodiment of the present invention can be terminal, wherein, the terminal can be with
For mobile terminal, mobile terminal can be implemented in a variety of manners, and the mobile terminal has the function of connection network.For example, hand
Machine, PDA, PAD etc..
If step 502, receive the safe level for first operation for reminding window, determining first operation instruction
Not Wei the login account level of security.
Optionally, after step 501, can also include:If the operation to the prompting window is not received, according to note
The information sensitivity of volume account determines the level of security of the login account.
Step 503, verification mode when logging in the login account set according to the level of security of the login account.
Specifically, terminal according to the level of security of login account set log in the login account when verification mode it
Afterwards, if user logs on the account, verification can be carried out according to the verification mode of setting and logged in, particularly for different peaces
Full rank uses different verification modes.
Wherein, the account and password of various social security cards, common reserve fund card, or vip card, over time password do not remember or hold
It is easy to remember mixed, cause inconvenient for use, for such being related to user privacy information or property safety, corresponding higher peace can be set
Full rank, i.e. high safety rank.
Here, the process of the login account of above-mentioned steps 501 to 503 can be understood as the registration process of the second account, when
The verification mode set when can be according to registration when logging in the second account again carries out verification and logged in.
When level of security is high safety rank, when detecting account logon operation, verified according to verification mode
Login account includes step 504 to step 509.
Step 504, when detecting the second account logon operation, show the first authentication window.
Step 505, obtain the first authentication information, if according to first authentication information carry out authentication into
Work(, the accounts information and encrypted message of second account are obtained according to the Password Management on backstage, show second account
Accounts information and partial password information.
Wherein, the first authentication can include:Fingerprint authentication or iris verification.
Step 506, Password Input operation is received, obtain the accounts information of second account and complete encrypted message.
Wherein, the complete encrypted message includes:The partial password information of display and the encrypted message of input;
If step 507, the accounts information of second account obtained and complete encrypted message are proved to be successful, according to described
Accounts information and complete encrypted message log in second account.
If the number of step 508, the accounts information of second account obtained and complete encrypted message authentication failed is big
In default value, the second authentication window is shown.
Wherein, default value can be 3 times, can also be 5 times, can also be other numerical value, user can also oneself
Set, the embodiment of the present invention is not limited this.
Specifically, as shown in figure 8, user logs in the second account, after terminal detects the logon operation of user, fingerprint is shown
Window is verified, after user is verified by fingerprint, according to the encryption file acquisition prestored from the background second account
Accounts information and partial password information, user supplies last several passwords, then the password after supplying and account believed manually
Breath is verified, the second account is directly logged in if being verified, if continuous several times all not by needing the more safe schools of triggering
Test, that is, trigger the second authentication, the second authentication can pass through camera or cell-phone number invitation code or identity card verification etc.
Verified.
Step 509, obtain the second authentication information, if according to second authentication information carry out authentication into
Work(, directly log in second account.
It is exemplary, for being related to user privacy information or property safety, corresponding higher level of security can be set,
Such as 4 grades, when transferring this account number cipher information, one wicket of ejection is known, it is necessary to user fingerprints identification or iris recognition
Not by recalling account information, or partial password beginning, it is necessary to which user supplies finally several according to association manually, if after input
Whole passwords with registration when password it is consistent then can secure log, if failure 3 times, need to trigger more safety checks, including take the photograph
As the more harsh verification examination & verification such as head or cell-phone number invitation code or identity card verification, verification is by then directly logging in, otherwise, display
Log in failure.
The embodiments of the invention provide a kind of information processing method, is carried out by the account password used in being lived to user
Differentiated control, logged in for the account number cipher of different degrees of risk using different verification modes, save memory and input
The process of account password information, saves the time.
The embodiment of the present invention also provides a kind of terminal 60, as shown in figure 9, the terminal 60 includes:Processor 601, storage
Device 602 and communication bus 603;
The communication bus 603 is used to realize the connection communication between processor 601 and memory 602;
The processor 601 is used to perform the message handling program stored in memory 602, to realize following steps:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration
The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described
The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account
The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, the processor 601 is used to perform the message handling program that stores in memory 602, with realize with
Lower step:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration
In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification
After mode, the processor 601 is additionally operable to perform the message handling program stored in memory 602, to realize following steps:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, when the level of security is lower security rank, in the safe level according to the login account
After verification mode when She Zhi not log in the login account, the processor 601 is additionally operable to perform and stored in memory 602
Message handling program, to realize following steps:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed
Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message
First account, described second operates for indicating that determination logs in first account.
Further, when the level of security is high safety rank, in the safe level according to the login account
After verification mode when She Zhi not log in the login account, the processor 601 is additionally operable to perform and stored in memory 602
Message handling program, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to
The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account
And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close
Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information
Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count
Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly
Log in second account.
Here, memory 602 can be volatile memory or nonvolatile memory, may also comprise volatibility and Fei Yi
Both the property lost memories.Wherein, nonvolatile memory can be read-only storage (ROM, Read Only Memory), can compile
Journey read-only storage (PROM, Programmable Read-Only Memory), Erasable Programmable Read Only Memory EPROM
(EPROM, Erasable Programmable Read-Only Memory), Electrically Erasable Read Only Memory
(EEPROM, Electrically Erasable Programmable Read-Only Memory), magnetic random access store
Device (FRAM, ferromagnetic random access memory), flash memory (Flash Memory), magnetic surface are deposited
Reservoir, CD or read-only optical disc (CD-ROM, Compact Disc Read-Only Memory);Magnetic surface storage can be
Magnetic disk storage or magnetic tape storage.Volatile memory can be random access memory (RAM, Random Access
Memory), it is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as
Static RAM (SRAM, Static Random Access Memory), synchronous static RAM
(SSRAM, Synchronous Static Random Access Memory), dynamic random access memory (DRAM,
Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous
Dynamic Random Access Memory), double data speed synchronous dynamic RAM (DDRSDRAM,
Double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random
Access memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), synchronized links
Dynamic random access memory (SLDRAM, SyncLink Dynamic Random Access Memory), direct rambus
Random access memory (DRRAM, Direct Rambus Random Access Memory).Description of the embodiment of the present invention is deposited
Reservoir 602 is intended to the memory of including but not limited to these and any other suitable type.
Memory 602 in the embodiment of the present invention is used to store various types of data to support the operation of terminal 60.This
The example of a little data includes:For any computer program operated in terminal 60, such as operating system and application program;Contact
Personal data;Telephone book data;Message;Picture;Video etc..Wherein, operating system includes various system programs, such as ccf layer,
Core library layer, driving layer etc., for realizing various basic businesses and the hardware based task of processing.Application program can include
Various application programs, such as media player (Media Player), browser (Browser) etc., for realizing various applications
Business.Realize that the program of present invention method may be embodied in application program.
The method that the embodiments of the present invention disclose can apply in processor 601, or be realized by processor 601.
Processor 601 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 601 or the instruction of software form.Above-mentioned processing
Device 601 can be general processor, digital signal processor (DSP, Digital Signal Processor), or other can
Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..Processor 601 can be realized or held
Disclosed each method, step and logic diagram in the row embodiment of the present invention.General processor can be microprocessor or appoint
What conventional processor etc..The step of method with reference to disclosed in the embodiment of the present invention, it can be embodied directly at hardware decoding
Reason device performs completion, or performs completion with the hardware in decoding processor and software module combination.Software module can be located at
In storage medium, the storage medium is located at memory 602, and processor 601 reads the information in memory 602, with reference to its hardware
The step of completing preceding method.
Specifically, the understanding of terminal provided in an embodiment of the present invention may be referred to saying for above- mentioned information processing method embodiment
Bright, the embodiment of the present invention will not be repeated here.
The embodiments of the invention provide terminal, and differentiated control is carried out by the account password used in being lived to user, right
Logged in the account number cipher of different degrees of risk using different verification modes, save memory and input account password information
Process, save the time.
In the exemplary embodiment, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, such as including
The memory of computer program, above computer program can be by the computing devices in server, to complete described in preceding method
Step.Computer-readable recording medium can be that FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface are deposited
The memories such as reservoir, CD or CD-ROM;Can also be the various equipment for including one of above-mentioned memory or any combination, such as
Mobile phone, computer, tablet device, personal digital assistant etc..
The embodiment of the present invention also provides a kind of computer-readable recording medium, and the computer-readable recording medium storage has
One or more program, one or more of programs can be walked by one or more computing device so that realization is following
Suddenly:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration
The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described
The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account
The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, one or more of programs can be walked by one or more computing device so that realization is following
Suddenly:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration
In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification
After mode, one or more of programs can be by one or more computing device, to realize following steps:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, when the level of security is lower security rank, in the safe level according to the login account
After verification mode when She Zhi not log in the login account, one or more of programs can be by one or more
Manage device to perform, to realize following steps:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed
Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message
First account, described second operates for indicating that determination logs in first account.
Further, when the level of security is high safety rank, in the safe level according to the login account
After verification mode when She Zhi not log in the login account, one or more of programs can be by one or more
Manage device to perform, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to
The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account
And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close
Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information
Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count
Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly
Log in second account.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
1. a kind of information processing method, it is characterised in that methods described includes:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to login account
Password carry out classification selection;
If receiving the first operation to the prompting window, the level of security for determining first operation instruction is the registration
The level of security of account;
If not receiving the operation to the prompting window, the login account is determined according to the information sensitivity of login account
Level of security;
Verification mode when logging in the login account is set according to the level of security of the login account.
2. according to the method for claim 1, it is characterised in that the triggering backstage Password Management, including:
Triggering backstage generation encryption file, the encryption file are used for during synchronously preserving Account Registration in Account Registration
Information, the information during the Account Registration comprise at least:Accounts information and encrypted message.
3. method according to claim 1 or 2, it is characterised in that in the level of security according to the login account
After verification mode when logging in the login account is set, in addition to:
When detecting account logon operation, verification login account is carried out according to the verification mode.
4. according to the method for claim 3, it is characterised in that described to work as when the level of security is lower security rank
When detecting account logon operation, verification login account is carried out according to the verification mode, including:
When detecting the first account logon operation, according to the Password Management on backstage obtain first account accounts information and
Encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, according to logging in the accounts information of first account shown automatically and encrypted message
First account, described second operates for indicating that determination logs in first account.
5. according to the method for claim 3, it is characterised in that described to work as when the level of security is high safety rank
When detecting account logon operation, verification login account is carried out according to the verification mode, including:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if authentication success is carried out according to first authentication information, according to backstage
Password Management obtain the accounts information and encrypted message of second account, show accounts information and the portion of second account
Divide encrypted message;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, the complete message in cipher
Breath includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information and complete
Whole encrypted message logs in second account;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than default value, show
Show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, is directly logged in
Second account.
6. a kind of terminal, it is characterised in that the terminal includes:Processor, memory and communication bus;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform the message handling program stored in memory, to realize following steps:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to login account
Password carry out classification selection;
If receiving the first operation to the prompting window, the level of security for determining first operation instruction is the registration
The level of security of account;
If not receiving the operation to the prompting window, the login account is determined according to the information sensitivity of login account
Level of security;
Verification mode when logging in the login account is set according to the level of security of the login account.
7. terminal according to claim 6, it is characterised in that the processor is used to perform the information stored in memory
Processing routine, to realize following steps:
Triggering backstage generation encryption file, the encryption file are used for during synchronously preserving Account Registration in Account Registration
Information, the information during the Account Registration comprise at least:Accounts information and encrypted message.
8. the terminal according to claim 6 or 7, it is characterised in that when the level of security is lower security rank, in institute
After stating the verification mode when login account is logged according to the setting of the level of security of the login account, the processor is also
For performing the message handling program stored in memory, to realize following steps:
When detecting the first account logon operation, according to the Password Management on backstage obtain first account accounts information and
Encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, according to logging in the accounts information of first account shown automatically and encrypted message
First account, described second operates for indicating that determination logs in first account.
9. the terminal according to claim 6 or 7, it is characterised in that when the level of security is high safety rank, in institute
After stating the verification mode when login account is logged according to the setting of the level of security of the login account, the processor is also
For performing the message handling program stored in memory, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if authentication success is carried out according to first authentication information, according to backstage
Password Management obtain the accounts information and encrypted message of second account, show accounts information and the portion of second account
Divide encrypted message;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, the complete message in cipher
Breath includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information and complete
Whole encrypted message logs in second account;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than default value, show
Show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, is directly logged in
Second account.
A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable recording medium storage have one or
Multiple programs, one or more of programs can be by one or more computing devices, to realize such as claim 1 to 5
The step of method described in any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710766481.0A CN107563210B (en) | 2017-08-30 | 2017-08-30 | Information processing method, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710766481.0A CN107563210B (en) | 2017-08-30 | 2017-08-30 | Information processing method, terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107563210A true CN107563210A (en) | 2018-01-09 |
CN107563210B CN107563210B (en) | 2020-08-25 |
Family
ID=60978596
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710766481.0A Active CN107563210B (en) | 2017-08-30 | 2017-08-30 | Information processing method, terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107563210B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995735A (en) * | 2019-12-13 | 2020-04-10 | 北京金山云网络技术有限公司 | Information display method, display device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413106A (en) * | 2010-09-26 | 2012-04-11 | 百度在线网络技术(北京)有限公司 | Method for processing advertising agent data safely and system thereof |
CN103036899A (en) * | 2012-12-25 | 2013-04-10 | 广东欧珀移动通信有限公司 | Method and system of automatic login user account |
WO2013095626A1 (en) * | 2011-12-23 | 2013-06-27 | Intel Corporation | Eye movement based knowledge demonstration |
CN104809389A (en) * | 2015-04-20 | 2015-07-29 | 南华大学 | Personnel password management system and method |
CN105703901A (en) * | 2016-03-25 | 2016-06-22 | 广东欧珀移动通信有限公司 | Encrypted data input method and encrypted data input device |
CN106131070A (en) * | 2016-08-28 | 2016-11-16 | 广安奥海通讯电子科技有限公司 | A kind of mobile phone application software account number safety protection system |
-
2017
- 2017-08-30 CN CN201710766481.0A patent/CN107563210B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413106A (en) * | 2010-09-26 | 2012-04-11 | 百度在线网络技术(北京)有限公司 | Method for processing advertising agent data safely and system thereof |
WO2013095626A1 (en) * | 2011-12-23 | 2013-06-27 | Intel Corporation | Eye movement based knowledge demonstration |
CN103036899A (en) * | 2012-12-25 | 2013-04-10 | 广东欧珀移动通信有限公司 | Method and system of automatic login user account |
CN104809389A (en) * | 2015-04-20 | 2015-07-29 | 南华大学 | Personnel password management system and method |
CN105703901A (en) * | 2016-03-25 | 2016-06-22 | 广东欧珀移动通信有限公司 | Encrypted data input method and encrypted data input device |
CN106131070A (en) * | 2016-08-28 | 2016-11-16 | 广安奥海通讯电子科技有限公司 | A kind of mobile phone application software account number safety protection system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995735A (en) * | 2019-12-13 | 2020-04-10 | 北京金山云网络技术有限公司 | Information display method, display device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107563210B (en) | 2020-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107527200A (en) | A kind of payment management method, mobile terminal and computer-readable recording medium | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN107493497A (en) | A kind of video broadcasting method, terminal and computer-readable recording medium | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN108197441A (en) | Flexible screen terminal and its solution lock control method, computer readable storage medium | |
CN107734128A (en) | One kind swindle number identification method and equipment | |
CN109885999A (en) | A kind of account register method, terminal and computer readable storage medium | |
CN107682359A (en) | One kind is using register method, mobile terminal | |
CN107563158A (en) | Show hiden application figure calibration method, equipment and computer-readable recording medium | |
CN108196762A (en) | A kind of terminal control method, terminal and computer readable storage medium | |
CN107846675A (en) | Register method, terminal, registrar and computer-readable recording medium | |
CN107426441A (en) | A kind of displaying method of terminal, terminal and computer-readable recording medium | |
CN108601004A (en) | NFC uses bootstrap technique, mobile terminal and computer readable storage medium | |
CN107330313A (en) | Application control method, mobile terminal and readable storage medium storing program for executing | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN108012029A (en) | A kind of information processing method, equipment and computer-readable recording medium | |
CN107835306A (en) | A kind of temperature checking method, terminal and computer-readable recording medium | |
CN107330314A (en) | Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic | |
CN107678671A (en) | One kind applies startup method, terminal and computer-readable recording medium | |
CN107770356A (en) | A kind of communication establishing method, equipment and computer-readable recording medium | |
CN107346392A (en) | Terminal system change recognition methods, device and readable storage medium storing program for executing | |
CN107402710A (en) | Method for protecting privacy, mobile terminal and computer-readable recording medium | |
CN107453984A (en) | Method, equipment and the computer replied message can storage medium | |
CN107194217A (en) | User data access control method, equipment and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200727 Address after: Room 302, 3 / F, venture capital service center, Gangqian Avenue, Xuwei New District, Lianyungang City, Jiangsu Province 222000 Applicant after: Jiangsu Fangyang Intelligent Technology Co., Ltd Address before: 518000 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor Applicant before: NUBIA TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |