CN107563210A - A kind of information processing method, terminal and computer-readable recording medium - Google Patents

A kind of information processing method, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107563210A
CN107563210A CN201710766481.0A CN201710766481A CN107563210A CN 107563210 A CN107563210 A CN 107563210A CN 201710766481 A CN201710766481 A CN 201710766481A CN 107563210 A CN107563210 A CN 107563210A
Authority
CN
China
Prior art keywords
account
information
security
encrypted message
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710766481.0A
Other languages
Chinese (zh)
Other versions
CN107563210B (en
Inventor
王海华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Fangyang Intelligent Technology Co., Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710766481.0A priority Critical patent/CN107563210B/en
Publication of CN107563210A publication Critical patent/CN107563210A/en
Application granted granted Critical
Publication of CN107563210B publication Critical patent/CN107563210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the present invention discloses a kind of information processing method, terminal and computer-readable recording medium, in Account Registration, triggers backstage Password Management, display alarm window is described to remind window to carry out classification selection to the password of login account for reminding;If receiving the first operation to the prompting window, the level of security for determining first operation instruction is the level of security of the login account;If not receiving the operation to the prompting window, the level of security of the login account is determined according to the information sensitivity of login account;Verification mode when logging in the login account is set according to the level of security of the login account, so, differentiated control is carried out by the account password used in being lived to user, logged in for the account number cipher of different degrees of risk using different verification modes, the process of memory and input account password information is saved, saves the time.

Description

A kind of information processing method, terminal and computer-readable recording medium
Technical field
The present invention relates to electronic technology field, more particularly to a kind of information processing method, terminal and computer-readable storage Medium.
Background technology
With the continuous development of internet and electronic technology, application of the various electronic equipments in people live is got over Come it is more extensive, meanwhile, the business based on various electronic equipments people live in application it is more and more extensive.In the prior art, During people are operated, live, learn and entertained by network and electronic equipment, it usually needs register account number information Or the website of encrypted message or APP, using more and more, some users remember for convenience, and it is close to be usually disposed as same account Code, so safety are relatively low;And it is arranged to different account number ciphers, user needs classification to remember a large amount of various passwords again, Easily obscure, easily forget over time, the account that expense was filled in serious even resulting in is looked for return, and is caused very to user Big inconvenience.
The content of the invention
In order to solve the above technical problems, the embodiment of the present invention provides a kind of information processing method, terminal and computer-readable Storage medium, the account password used in being lived to user carry out differentiated control, adopted for the account number cipher of different degrees of risk Logged in different verification modes, save the process of memory and input account password information, save the time.
The technical proposal of the invention is realized in this way:
On the one hand, the embodiment of the present invention provides a kind of information processing method, and methods described includes:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, the triggering backstage Password Management, including:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification After mode, in addition to:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, it is described when detecting account logon operation when the level of security is lower security rank, according to The verification mode carries out verification login account, including:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message First account, described second operates for indicating that determination logs in first account.
Further, it is described when detecting account logon operation when the level of security is high safety rank, according to The verification mode carries out verification login account, including:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly Log in second account.
On the one hand, the embodiment of the present invention also provides a kind of terminal, and the terminal includes:Processor, memory and communication are total Line;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform the message handling program stored in memory, to realize following steps:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, the processor is used to perform the message handling program stored in memory, to realize following steps:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification After mode, the processor is additionally operable to perform the message handling program stored in memory, to realize following steps:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, when the level of security is lower security rank, in the safe level according to the login account After verification mode when She Zhi not log in the login account, the processor is additionally operable to perform the information stored in memory Processing routine, to realize following steps:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message First account, described second operates for indicating that determination logs in first account.
Further, when the level of security is high safety rank, in the safe level according to the login account After verification mode when She Zhi not log in the login account, the processor is additionally operable to perform the information stored in memory Processing routine, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly Log in second account.
On the one hand, the embodiment of the present invention also provides a kind of computer-readable recording medium, the computer-readable storage medium Matter is stored with one or more program, and one or more of programs can be by one or more computing device, with reality Existing following steps:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, one or more of programs can be walked by one or more computing device so that realization is following Suddenly:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification After mode, one or more of programs can be by one or more computing device, to realize following steps:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, when the level of security is lower security rank, in the safe level according to the login account After verification mode when She Zhi not log in the login account, one or more of programs can be by one or more Manage device to perform, to realize following steps:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message First account, described second operates for indicating that determination logs in first account.
Further, when the level of security is high safety rank, in the safe level according to the login account After verification mode when She Zhi not log in the login account, one or more of programs can be by one or more Manage device to perform, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly Log in second account.
The embodiments of the invention provide a kind of information processing method, terminal and computer-readable recording medium, by The account password used in the life of family carries out differentiated control, and different verification sides is used for the account number cipher of different degrees of risk Formula is logged in, and is saved the process of memory and input account password information, is saved the time.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for an optional mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is information processing method schematic flow sheet one provided in an embodiment of the present invention;
Fig. 4 is the prompting window display example figure in terminal provided in an embodiment of the present invention;
Fig. 5 is information processing method schematic flow sheet two provided in an embodiment of the present invention;
Fig. 6 is log-in interface exemplary plot one provided in an embodiment of the present invention;
Fig. 7 is information processing method schematic flow sheet three provided in an embodiment of the present invention;
Fig. 8 is log-in interface exemplary plot two provided in an embodiment of the present invention;
Fig. 9 is terminal structure schematic diagram provided in an embodiment of the present invention.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving GateWay, Gateway) 2034, PGW (PDN GateWay, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and EPC203 between The control node of signaling, there is provided carrying and connection management.HSS2032 is used to provide some registers to manage such as homing position The function of register (not shown) etc, and some are preserved about the special letter of the users such as service features, data rate Breath.All customer data can be transmitted by SGW2034, PGW2035 can provide UE 201 IP address distribute with And other functions, PCRF2036 are the strategy and charging control policy decision point of business data flow and IP bearing resources, it is plan Available strategy and charging control decision-making are slightly selected and provided with charge execution function unit (not shown).
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
The embodiment of the present invention provides a kind of information processing method, as shown in figure 3, this method can include:
Step 301, in Account Registration, trigger backstage Password Management, display alarm window.
Wherein, it is described to remind window to carry out classification selection to the password of login account for reminding.
Specifically, in the embodiment of the present invention, in Account Registration, backstage Password Management is triggered, display alarm window can be with It is to be realized by terminal, be i.e. the Password Management on terminal triggering terminal itself backstage, while show prompting window, reminds user to current The account of registration carries out password differentiated control.Terminal in the present invention can be mobile terminal, can be preferably to have operation The mobile intelligent terminal of system.
Mobile terminal refers to the equipment that can be used on the move, and broad sense is said including mobile phone, notebook, tablet personal computer, Even include vehicle-mounted computer.But refer in most cases mobile phone or with a variety of application functions smart mobile phone and Tablet personal computer.As network and technology are towards the development in more and more broadband direction, Mobile Communication Industry will move towards real The mobile message epoch.On the other hand, as the rapid development of integrated circuit technique, the disposal ability of mobile terminal have had Powerful disposal ability, mobile terminal are changed into an integrated information processing platform from simple call instrument.This is also to shifting Dynamic terminal adds broader development space.Mobile terminal is existing several with Mobile Communication Development as simple communication equipment The history of 10 years.Mobile intelligent terminal is almost changed into the crucial entrance of Internet service between a flash and main innovation is put down Platform, new media, ecommerce and information service platform, Internet resources, mobile network resource and environmental interaction resource are most The strategy system of important pivot, its operating system and processor chips even as current whole information and communication technology (ICT) industry is high Point.Mobile intelligent terminal can be referred to as intelligent terminal, and mobile intelligent terminal possesses access the Internet capability, generally carries various Operating system, various functions can be customized according to user's request.Common intelligent terminal includes mobile intelligent terminal, vehicle-mounted in life Intelligent terminal, intelligent television, wearable device etc..
Specifically, user, when carrying out Account Registration operation in terminal, terminal synchronization triggering terminal itself carries out close from the background Code is managed, while active display alarm window, and alternative secret grade is shown in the prompting window, such as shown in Fig. 4 Window display interface, " secret grade please be set ", including 1-5 level of security are reminded, level of security can be defined from low to high Corresponding safety verification strategy more and more higher, i.e. it is minimum that 1 level security rank correspond to security strategy, and it is clear can to correspond to general Websites login Look at, no fund contact, no sensitive personal information;5 grades of corresponding security strategy highests, user privacy information or property peace can be corresponded to The account and password of full website or application, such as various social security cards, common reserve fund card, or vip card;Optionally, can also determine It is more and more lower that adopted level of security corresponds to safety verification strategy from low to high, i.e. 1 level security rank corresponds to security strategy highest, 5 grades It is minimum that level of security corresponds to security strategy.
Wherein, it can be triggering backstage generation encryption file that terminal synchronization triggering terminal itself backstage, which carries out Password Management, The encryption file is used to synchronously preserve the information during Account Registration, the letter during the Account Registration in Account Registration Breath comprises at least:Accounts information and encrypted message.
After step 301, can also include:Step 302 and step 303.
If step 302, receive the safe level for first operation for reminding window, determining first operation instruction Not Wei the login account level of security.
If step 303, not receiving to the operation for reminding window, institute is determined according to the information sensitivity of login account State the level of security of login account.
Specifically, after terminal display alarm window, user oneself can select the level of security of current login account, when with After family have selected level of security, the level of security that user selects is arranged to the level of security of current login account by terminal, if The operation that user selects level of security is not received by preset time, i.e. user does not select level of security, then terminal is current The information sensitivity of login account determines the level of security of login account, specifically can judge account by the type of login account Information sensitivity, for example, the information sensitivity of bank account is higher, it is necessary to set the higher safe class of security strategy, commonly Website information sensitivity it is relatively low, then the relatively low safe class of security strategy can be set.
Step 304, verification mode when logging in the login account set according to the level of security of the login account.
Specifically, terminal determines the level of security of current login account, each level of security corresponds to a kind of safe plan Omit, i.e. verification mode, after the completion of Account Registration, if user logs on the account, what terminal can be set according to the account Security strategy income corresponding to level of security verifies login account.
Further, it is described according to the level of security of the login account set log in the login account when verification After mode, in addition to:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Method provided in an embodiment of the present invention, be related to website in user, APP, bank, using etc. need login account close During code, terminal system triggering background encryption management, and pop-up window reminds user to carry out classification selection to password;If user is without bright Really it is intended to, system then selects to recommend cryptographic levels according to information sensing degree.Again during follow-up use, according to detection user's account Family password login activity, triggering account password set the corresponding verification means of grade, and verification passes through, and password account is adjusted automatically Go out, automated log on, user saves the energy of many memory account number ciphers, saves the trouble for continually entering long string account number cipher.
The embodiments of the invention provide a kind of information processing method, is carried out by the account password used in being lived to user Differentiated control, logged in for the account number cipher of different degrees of risk using different verification modes, save memory and input The process of account password information, saves the time.
The embodiment of the present invention provides a kind of information processing method, as shown in figure 5, this method can include:
Step 401, in Account Registration, triggering backstage generation encryption file, and display alarm window.
Wherein, the encryption file is used to synchronously preserve the information during Account Registration, the account in Account Registration Information in the registration process of family comprises at least:Accounts information and encrypted message.The prompting window is used to remind to login account Password carry out classification selection.
The executive agent of information processing method provided in an embodiment of the present invention can be terminal, wherein, the terminal can be with For mobile terminal, mobile terminal can be implemented in a variety of manners, and the mobile terminal has the function of connection network.For example, hand Machine, PDA (personal digital assistant), PAD (tablet personal computer) etc..
Exemplary, such as the prompting window display interface shown in Fig. 4, " secret grade please be set ", including 1-5 safety Rank, level of security can be defined and correspond to safety verification strategy more and more higher from low to high, be i.e. 1 level security rank corresponds to safe plan It is slightly minimum, general Websites login can be corresponded to and browsed, no fund contact, no sensitive personal information;5 grades of corresponding security strategies are most Height, website or the application of user privacy information or property safety, such as various social security cards, common reserve fund card, or VIP can be corresponded to The account and password of card.
If step 402, receive the safe level for first operation for reminding window, determining first operation instruction Not Wei the login account level of security.
Optionally, after step 401, can also include:If the operation to the prompting window is not received, according to note The information sensitivity of volume account determines the level of security of the login account.
Step 403, verification mode when logging in the login account set according to the level of security of the login account.
Specifically, terminal according to the level of security of login account set log in the login account when verification mode it Afterwards, if user logs on the account, verification can be carried out according to the verification mode of setting and logged in, particularly for different peaces Full rank uses different verification modes.
Here, the process of the login account of above-mentioned steps 401 to 403 can be understood as the registration process of the first account, when The verification mode set when can be according to registration when logging in the first account again carries out verification and logged in.
When level of security is lower security rank, when detecting account logon operation, verified according to verification mode Login account includes step 404 to step 405.
Step 404, when detecting the first account logon operation, first account is obtained according to the Password Management on backstage Accounts information and encrypted message, show the accounts information and encrypted message of first account automatically.
If step 405, when receiving the second operation, according to the accounts information and password of first account shown automatically First account described in log.
Wherein, described second operate for indicating that determination logs in first account.
Specifically, as shown in fig. 6, user logs in the first account, after terminal detects the logon operation of user, according to backstage The accounts information and encrypted message of encryption file acquisition first account prestored, then automatically by account information and close Code information is input to log-in interface, after user, which clicks on confirmation, to be logged in, logs in automatically.
Exemplary, certain user have registered the account of A forums in March, and after a period of time, June logs on A Forum, the account number cipher of A forums is can not remember, is also not provided with close guarantor's problem when registering originally or can not think close guarantor's problem, It is again pretty troublesome to give password for change.Using method provided in an embodiment of the present invention, mobile phone can worked as by back-end data Intelligent Measurement When first user applies for this A forums account number cipher, an encryption TXT file is generated with regard to synchronous recording, and actively eject and remind small window Mouthful, " secret grade please be set "【Addition has 1-5 security leveldefinition】It is the safe level of A forums that if user, which selects " 1 grade ", Not, wherein, " 1 grade " corresponding security strategy includes:This account is only that general Websites login browses, no fund contact, no sensitive People's information, it is automatic to show account and encrypted message;So, when user logs on A forums window, detect that login is lived from the background It is dynamic, account and encrypted message are jumped out automatically, and password may be selected to add asterisk or directly display, and user only needs a determination can be direct Login is entered.So, user need not just remember substantial amounts of forum of Baidu account or each forum used once in a while.
The embodiments of the invention provide a kind of information processing method, is carried out by the account password used in being lived to user Differentiated control, logged in for the account number cipher of different degrees of risk using different verification modes, save memory and input The process of account password information, saves the time.
The embodiment of the present invention provides a kind of information processing method, as shown in fig. 7, this method can include:
Step 501, in Account Registration, triggering backstage generation encryption file, and display alarm window.
Wherein, the encryption file is used to synchronously preserve the information during Account Registration, the account in Account Registration Information in the registration process of family comprises at least:Accounts information and encrypted message.The prompting window is used to remind to login account Password carry out classification selection.
The executive agent of information processing method provided in an embodiment of the present invention can be terminal, wherein, the terminal can be with For mobile terminal, mobile terminal can be implemented in a variety of manners, and the mobile terminal has the function of connection network.For example, hand Machine, PDA, PAD etc..
If step 502, receive the safe level for first operation for reminding window, determining first operation instruction Not Wei the login account level of security.
Optionally, after step 501, can also include:If the operation to the prompting window is not received, according to note The information sensitivity of volume account determines the level of security of the login account.
Step 503, verification mode when logging in the login account set according to the level of security of the login account.
Specifically, terminal according to the level of security of login account set log in the login account when verification mode it Afterwards, if user logs on the account, verification can be carried out according to the verification mode of setting and logged in, particularly for different peaces Full rank uses different verification modes.
Wherein, the account and password of various social security cards, common reserve fund card, or vip card, over time password do not remember or hold It is easy to remember mixed, cause inconvenient for use, for such being related to user privacy information or property safety, corresponding higher peace can be set Full rank, i.e. high safety rank.
Here, the process of the login account of above-mentioned steps 501 to 503 can be understood as the registration process of the second account, when The verification mode set when can be according to registration when logging in the second account again carries out verification and logged in.
When level of security is high safety rank, when detecting account logon operation, verified according to verification mode Login account includes step 504 to step 509.
Step 504, when detecting the second account logon operation, show the first authentication window.
Step 505, obtain the first authentication information, if according to first authentication information carry out authentication into Work(, the accounts information and encrypted message of second account are obtained according to the Password Management on backstage, show second account Accounts information and partial password information.
Wherein, the first authentication can include:Fingerprint authentication or iris verification.
Step 506, Password Input operation is received, obtain the accounts information of second account and complete encrypted message.
Wherein, the complete encrypted message includes:The partial password information of display and the encrypted message of input;
If step 507, the accounts information of second account obtained and complete encrypted message are proved to be successful, according to described Accounts information and complete encrypted message log in second account.
If the number of step 508, the accounts information of second account obtained and complete encrypted message authentication failed is big In default value, the second authentication window is shown.
Wherein, default value can be 3 times, can also be 5 times, can also be other numerical value, user can also oneself Set, the embodiment of the present invention is not limited this.
Specifically, as shown in figure 8, user logs in the second account, after terminal detects the logon operation of user, fingerprint is shown Window is verified, after user is verified by fingerprint, according to the encryption file acquisition prestored from the background second account Accounts information and partial password information, user supplies last several passwords, then the password after supplying and account believed manually Breath is verified, the second account is directly logged in if being verified, if continuous several times all not by needing the more safe schools of triggering Test, that is, trigger the second authentication, the second authentication can pass through camera or cell-phone number invitation code or identity card verification etc. Verified.
Step 509, obtain the second authentication information, if according to second authentication information carry out authentication into Work(, directly log in second account.
It is exemplary, for being related to user privacy information or property safety, corresponding higher level of security can be set, Such as 4 grades, when transferring this account number cipher information, one wicket of ejection is known, it is necessary to user fingerprints identification or iris recognition Not by recalling account information, or partial password beginning, it is necessary to which user supplies finally several according to association manually, if after input Whole passwords with registration when password it is consistent then can secure log, if failure 3 times, need to trigger more safety checks, including take the photograph As the more harsh verification examination & verification such as head or cell-phone number invitation code or identity card verification, verification is by then directly logging in, otherwise, display Log in failure.
The embodiments of the invention provide a kind of information processing method, is carried out by the account password used in being lived to user Differentiated control, logged in for the account number cipher of different degrees of risk using different verification modes, save memory and input The process of account password information, saves the time.
The embodiment of the present invention also provides a kind of terminal 60, as shown in figure 9, the terminal 60 includes:Processor 601, storage Device 602 and communication bus 603;
The communication bus 603 is used to realize the connection communication between processor 601 and memory 602;
The processor 601 is used to perform the message handling program stored in memory 602, to realize following steps:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, the processor 601 is used to perform the message handling program that stores in memory 602, with realize with Lower step:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification After mode, the processor 601 is additionally operable to perform the message handling program stored in memory 602, to realize following steps:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, when the level of security is lower security rank, in the safe level according to the login account After verification mode when She Zhi not log in the login account, the processor 601 is additionally operable to perform and stored in memory 602 Message handling program, to realize following steps:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message First account, described second operates for indicating that determination logs in first account.
Further, when the level of security is high safety rank, in the safe level according to the login account After verification mode when She Zhi not log in the login account, the processor 601 is additionally operable to perform and stored in memory 602 Message handling program, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly Log in second account.
Here, memory 602 can be volatile memory or nonvolatile memory, may also comprise volatibility and Fei Yi Both the property lost memories.Wherein, nonvolatile memory can be read-only storage (ROM, Read Only Memory), can compile Journey read-only storage (PROM, Programmable Read-Only Memory), Erasable Programmable Read Only Memory EPROM (EPROM, Erasable Programmable Read-Only Memory), Electrically Erasable Read Only Memory (EEPROM, Electrically Erasable Programmable Read-Only Memory), magnetic random access store Device (FRAM, ferromagnetic random access memory), flash memory (Flash Memory), magnetic surface are deposited Reservoir, CD or read-only optical disc (CD-ROM, Compact Disc Read-Only Memory);Magnetic surface storage can be Magnetic disk storage or magnetic tape storage.Volatile memory can be random access memory (RAM, Random Access Memory), it is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as Static RAM (SRAM, Static Random Access Memory), synchronous static RAM (SSRAM, Synchronous Static Random Access Memory), dynamic random access memory (DRAM, Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous Dynamic Random Access Memory), double data speed synchronous dynamic RAM (DDRSDRAM, Double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random Access memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), synchronized links Dynamic random access memory (SLDRAM, SyncLink Dynamic Random Access Memory), direct rambus Random access memory (DRRAM, Direct Rambus Random Access Memory).Description of the embodiment of the present invention is deposited Reservoir 602 is intended to the memory of including but not limited to these and any other suitable type.
Memory 602 in the embodiment of the present invention is used to store various types of data to support the operation of terminal 60.This The example of a little data includes:For any computer program operated in terminal 60, such as operating system and application program;Contact Personal data;Telephone book data;Message;Picture;Video etc..Wherein, operating system includes various system programs, such as ccf layer, Core library layer, driving layer etc., for realizing various basic businesses and the hardware based task of processing.Application program can include Various application programs, such as media player (Media Player), browser (Browser) etc., for realizing various applications Business.Realize that the program of present invention method may be embodied in application program.
The method that the embodiments of the present invention disclose can apply in processor 601, or be realized by processor 601. Processor 601 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 601 or the instruction of software form.Above-mentioned processing Device 601 can be general processor, digital signal processor (DSP, Digital Signal Processor), or other can Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..Processor 601 can be realized or held Disclosed each method, step and logic diagram in the row embodiment of the present invention.General processor can be microprocessor or appoint What conventional processor etc..The step of method with reference to disclosed in the embodiment of the present invention, it can be embodied directly at hardware decoding Reason device performs completion, or performs completion with the hardware in decoding processor and software module combination.Software module can be located at In storage medium, the storage medium is located at memory 602, and processor 601 reads the information in memory 602, with reference to its hardware The step of completing preceding method.
Specifically, the understanding of terminal provided in an embodiment of the present invention may be referred to saying for above- mentioned information processing method embodiment Bright, the embodiment of the present invention will not be repeated here.
The embodiments of the invention provide terminal, and differentiated control is carried out by the account password used in being lived to user, right Logged in the account number cipher of different degrees of risk using different verification modes, save memory and input account password information Process, save the time.
In the exemplary embodiment, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, such as including The memory of computer program, above computer program can be by the computing devices in server, to complete described in preceding method Step.Computer-readable recording medium can be that FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface are deposited The memories such as reservoir, CD or CD-ROM;Can also be the various equipment for including one of above-mentioned memory or any combination, such as Mobile phone, computer, tablet device, personal digital assistant etc..
The embodiment of the present invention also provides a kind of computer-readable recording medium, and the computer-readable recording medium storage has One or more program, one or more of programs can be walked by one or more computing device so that realization is following Suddenly:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to registration The password of account carries out classification selection;
If receiving the first operation to the prompting window, determine that the level of security of first operation instruction is described The level of security of login account;
If not receiving the operation to the prompting window, the registration account is determined according to the information sensitivity of login account The level of security at family;
Verification mode when logging in the login account is set according to the level of security of the login account.
Further, one or more of programs can be walked by one or more computing device so that realization is following Suddenly:
Triggering backstage generation encryption file, the encryption file are used to synchronously preserve Account Registration process in Account Registration In information, the information during the Account Registration comprises at least:Accounts information and encrypted message.
Further, it is described according to the level of security of the login account set log in the login account when verification After mode, one or more of programs can be by one or more computing device, to realize following steps:
When detecting account logon operation, verification login account is carried out according to the verification mode.
Further, when the level of security is lower security rank, in the safe level according to the login account After verification mode when She Zhi not log in the login account, one or more of programs can be by one or more Manage device to perform, to realize following steps:
When detecting the first account logon operation, the account that first account is obtained according to the Password Management on backstage is believed Breath and encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, logged according to the accounts information of first account shown automatically and encrypted message First account, described second operates for indicating that determination logs in first account.
Further, when the level of security is high safety rank, in the safe level according to the login account After verification mode when She Zhi not log in the login account, one or more of programs can be by one or more Manage device to perform, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if carrying out authentication success according to first authentication information, according to The Password Management on backstage obtains the accounts information and encrypted message of second account, shows the accounts information of second account And partial password information;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, it is described complete close Code information includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information Second account is logged in complete encrypted message;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than present count Value, show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, directly Log in second account.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of information processing method, it is characterised in that methods described includes:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to login account Password carry out classification selection;
If receiving the first operation to the prompting window, the level of security for determining first operation instruction is the registration The level of security of account;
If not receiving the operation to the prompting window, the login account is determined according to the information sensitivity of login account Level of security;
Verification mode when logging in the login account is set according to the level of security of the login account.
2. according to the method for claim 1, it is characterised in that the triggering backstage Password Management, including:
Triggering backstage generation encryption file, the encryption file are used for during synchronously preserving Account Registration in Account Registration Information, the information during the Account Registration comprise at least:Accounts information and encrypted message.
3. method according to claim 1 or 2, it is characterised in that in the level of security according to the login account After verification mode when logging in the login account is set, in addition to:
When detecting account logon operation, verification login account is carried out according to the verification mode.
4. according to the method for claim 3, it is characterised in that described to work as when the level of security is lower security rank When detecting account logon operation, verification login account is carried out according to the verification mode, including:
When detecting the first account logon operation, according to the Password Management on backstage obtain first account accounts information and Encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, according to logging in the accounts information of first account shown automatically and encrypted message First account, described second operates for indicating that determination logs in first account.
5. according to the method for claim 3, it is characterised in that described to work as when the level of security is high safety rank When detecting account logon operation, verification login account is carried out according to the verification mode, including:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if authentication success is carried out according to first authentication information, according to backstage Password Management obtain the accounts information and encrypted message of second account, show accounts information and the portion of second account Divide encrypted message;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, the complete message in cipher Breath includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information and complete Whole encrypted message logs in second account;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than default value, show Show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, is directly logged in Second account.
6. a kind of terminal, it is characterised in that the terminal includes:Processor, memory and communication bus;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform the message handling program stored in memory, to realize following steps:
In Account Registration, backstage Password Management, display alarm window are triggered, the prompting window is used to remind to login account Password carry out classification selection;
If receiving the first operation to the prompting window, the level of security for determining first operation instruction is the registration The level of security of account;
If not receiving the operation to the prompting window, the login account is determined according to the information sensitivity of login account Level of security;
Verification mode when logging in the login account is set according to the level of security of the login account.
7. terminal according to claim 6, it is characterised in that the processor is used to perform the information stored in memory Processing routine, to realize following steps:
Triggering backstage generation encryption file, the encryption file are used for during synchronously preserving Account Registration in Account Registration Information, the information during the Account Registration comprise at least:Accounts information and encrypted message.
8. the terminal according to claim 6 or 7, it is characterised in that when the level of security is lower security rank, in institute After stating the verification mode when login account is logged according to the setting of the level of security of the login account, the processor is also For performing the message handling program stored in memory, to realize following steps:
When detecting the first account logon operation, according to the Password Management on backstage obtain first account accounts information and Encrypted message, the accounts information and encrypted message of first account are shown automatically;
If receive the second operation, according to logging in the accounts information of first account shown automatically and encrypted message First account, described second operates for indicating that determination logs in first account.
9. the terminal according to claim 6 or 7, it is characterised in that when the level of security is high safety rank, in institute After stating the verification mode when login account is logged according to the setting of the level of security of the login account, the processor is also For performing the message handling program stored in memory, to realize following steps:
When detecting the second account logon operation, the first authentication window is shown;
The first authentication information is obtained, if authentication success is carried out according to first authentication information, according to backstage Password Management obtain the accounts information and encrypted message of second account, show accounts information and the portion of second account Divide encrypted message;
Password Input operation is received, obtains the accounts information of second account and complete encrypted message, the complete message in cipher Breath includes:The partial password information of display and the encrypted message of input;
If the accounts information and complete encrypted message of second account obtained are proved to be successful, according to the accounts information and complete Whole encrypted message logs in second account;
If the accounts information of second account and the number of complete encrypted message authentication failed that obtain are more than default value, show Show the second authentication window;
The second authentication information is obtained, if carrying out authentication success according to second authentication information, is directly logged in Second account.
A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be by one or more computing devices, to realize such as claim 1 to 5 The step of method described in any one.
CN201710766481.0A 2017-08-30 2017-08-30 Information processing method, terminal and computer readable storage medium Active CN107563210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710766481.0A CN107563210B (en) 2017-08-30 2017-08-30 Information processing method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710766481.0A CN107563210B (en) 2017-08-30 2017-08-30 Information processing method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107563210A true CN107563210A (en) 2018-01-09
CN107563210B CN107563210B (en) 2020-08-25

Family

ID=60978596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710766481.0A Active CN107563210B (en) 2017-08-30 2017-08-30 Information processing method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107563210B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995735A (en) * 2019-12-13 2020-04-10 北京金山云网络技术有限公司 Information display method, display device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413106A (en) * 2010-09-26 2012-04-11 百度在线网络技术(北京)有限公司 Method for processing advertising agent data safely and system thereof
CN103036899A (en) * 2012-12-25 2013-04-10 广东欧珀移动通信有限公司 Method and system of automatic login user account
WO2013095626A1 (en) * 2011-12-23 2013-06-27 Intel Corporation Eye movement based knowledge demonstration
CN104809389A (en) * 2015-04-20 2015-07-29 南华大学 Personnel password management system and method
CN105703901A (en) * 2016-03-25 2016-06-22 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN106131070A (en) * 2016-08-28 2016-11-16 广安奥海通讯电子科技有限公司 A kind of mobile phone application software account number safety protection system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413106A (en) * 2010-09-26 2012-04-11 百度在线网络技术(北京)有限公司 Method for processing advertising agent data safely and system thereof
WO2013095626A1 (en) * 2011-12-23 2013-06-27 Intel Corporation Eye movement based knowledge demonstration
CN103036899A (en) * 2012-12-25 2013-04-10 广东欧珀移动通信有限公司 Method and system of automatic login user account
CN104809389A (en) * 2015-04-20 2015-07-29 南华大学 Personnel password management system and method
CN105703901A (en) * 2016-03-25 2016-06-22 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN106131070A (en) * 2016-08-28 2016-11-16 广安奥海通讯电子科技有限公司 A kind of mobile phone application software account number safety protection system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995735A (en) * 2019-12-13 2020-04-10 北京金山云网络技术有限公司 Information display method, display device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN107563210B (en) 2020-08-25

Similar Documents

Publication Publication Date Title
CN107527200A (en) A kind of payment management method, mobile terminal and computer-readable recording medium
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN107493497A (en) A kind of video broadcasting method, terminal and computer-readable recording medium
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN108197441A (en) Flexible screen terminal and its solution lock control method, computer readable storage medium
CN107734128A (en) One kind swindle number identification method and equipment
CN109885999A (en) A kind of account register method, terminal and computer readable storage medium
CN107682359A (en) One kind is using register method, mobile terminal
CN107563158A (en) Show hiden application figure calibration method, equipment and computer-readable recording medium
CN108196762A (en) A kind of terminal control method, terminal and computer readable storage medium
CN107846675A (en) Register method, terminal, registrar and computer-readable recording medium
CN107426441A (en) A kind of displaying method of terminal, terminal and computer-readable recording medium
CN108601004A (en) NFC uses bootstrap technique, mobile terminal and computer readable storage medium
CN107330313A (en) Application control method, mobile terminal and readable storage medium storing program for executing
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN108012029A (en) A kind of information processing method, equipment and computer-readable recording medium
CN107835306A (en) A kind of temperature checking method, terminal and computer-readable recording medium
CN107330314A (en) Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic
CN107678671A (en) One kind applies startup method, terminal and computer-readable recording medium
CN107770356A (en) A kind of communication establishing method, equipment and computer-readable recording medium
CN107346392A (en) Terminal system change recognition methods, device and readable storage medium storing program for executing
CN107402710A (en) Method for protecting privacy, mobile terminal and computer-readable recording medium
CN107453984A (en) Method, equipment and the computer replied message can storage medium
CN107194217A (en) User data access control method, equipment and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200727

Address after: Room 302, 3 / F, venture capital service center, Gangqian Avenue, Xuwei New District, Lianyungang City, Jiangsu Province 222000

Applicant after: Jiangsu Fangyang Intelligent Technology Co., Ltd

Address before: 518000 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor

Applicant before: NUBIA TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant