CN107784207A - Display methods, device, equipment and the storage medium at financial APP interfaces - Google Patents
Display methods, device, equipment and the storage medium at financial APP interfaces Download PDFInfo
- Publication number
- CN107784207A CN107784207A CN201711052046.8A CN201711052046A CN107784207A CN 107784207 A CN107784207 A CN 107784207A CN 201711052046 A CN201711052046 A CN 201711052046A CN 107784207 A CN107784207 A CN 107784207A
- Authority
- CN
- China
- Prior art keywords
- user
- watermark
- financial app
- log
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000003860 storage Methods 0.000 title claims abstract description 19
- 239000011159 matrix material Substances 0.000 claims description 36
- 238000004590 computer program Methods 0.000 claims description 25
- 238000012545 processing Methods 0.000 claims description 13
- 239000000284 extract Substances 0.000 claims description 6
- 238000000605 extraction Methods 0.000 claims description 5
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 claims description 4
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 4
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 claims description 3
- 239000010931 gold Substances 0.000 claims description 3
- 229910052737 gold Inorganic materials 0.000 claims description 3
- 208000012839 conversion disease Diseases 0.000 claims description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 2
- 238000002844 melting Methods 0.000 claims 1
- 230000008018 melting Effects 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 23
- 241001269238 Data Species 0.000 description 12
- 238000004422 calculation algorithm Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 5
- 239000013589 supplement Substances 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000005096 rolling process Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 230000007306 turnover Effects 0.000 description 3
- 230000006854 communication Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000004549 pulsed laser deposition Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 206010038743 Restlessness Diseases 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000033001 locomotion Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention belongs to financial APP interface displays technical field, there is provided a kind of display methods, device, equipment and the storage medium at financial APP interfaces, the display methods include:The address of User Information Database is obtained, and is associated with User Information Database;When user logs in financial APP, the log-on message of user is obtained, and judges that log-on message whether there is in User Information Database;If log-on message is not present in User Information Database, refusal logs in financial APP;If log-on message is present in User Information Database, watermark information is then generated according to log-on message, watermark information is embedded into interface data of the generation with watermark in financial APP interface, it ensure that the legitimacy of the user using financial APP, once financial APP data can then reach the purpose traced to the source illegal transmissions person by illegal transmissions.
Description
Technical field
The invention belongs to financial APP interface displays technical field, more specifically, is related to a kind of financial APP interfaces
Display methods, device, equipment and storage medium.
Background technology
Mode now in work is more and more diversified, due to the portability of mobile phone, makes to be operated using cell phone application
On acquisition of information turn into normality with exchanging, accordingly, financial APP is a kind of APP, financial APP being related in terms of financial finance and economics
The data at interface typically have very high confidentiality, therefore, how to strengthen financial APP data safety become one it is important
Problem.
Current financial APP would generally add company LOGO watermark to increase the security of data, illegally be passed in data
Can play a part of when defeated it is certain trace to the source, still, specific illegal transmissions person can not be accurately determined.Moreover in general gold
Melt APP registration when, the user profile simply entered meets certain requirement, as user name not repeat and Password Length it is enough,
It is stored in APP customer data base, it is impossible to ensure the legitimacy of financial APP user.
The content of the invention
The embodiment of the present invention provides a kind of display methods, device, equipment and the storage medium at financial APP interfaces, to solve
The problem of certainly can not accurately determining illegal transmissions person in the prior art and the legitimacy using financial APP user can not be ensured.
What the embodiment of the present invention was realized in:
First aspect present invention provides a kind of display methods at financial APP interfaces, comprises the following steps:
The address of User Information Database is obtained, and is associated with the User Information Database;
When user logs in the financial APP, the log-on message of user is obtained, and judges that the log-on message whether there is
In the User Information Database;
If the log-on message is not present in the User Information Database, refusal logs in the financial APP;
If the log-on message is present in the User Information Database, watermark is generated according to the log-on message
Information, the watermark information is embedded into interface data of the generation with watermark in the interface of the financial APP.
Second aspect of the present invention provides a kind of display device at financial APP interfaces, the display device at the financial APP interfaces
Including:
User information correlation module, for obtaining the address of User Information Database, and with the User Information Database
It is associated;
User profile judge module, when user logs in the financial APP, for obtaining the log-on message of user, and sentence
The log-on message of breaking whether there is in the User Information Database, when the log-on message is not present in user's letter
When ceasing in database, then refusal logs in the financial APP;
Watermark information display module, if the log-on message is present in the User Information Database, for basis
The log-on message generates watermark information, and the watermark information is embedded into generation in the interface of the financial APP has watermark
Interface data.
Third aspect present invention provides a kind of terminal device, including memory, processor and is stored in the memory
In and the computer program that can run on the processor, such as this hair is realized described in the computing device during computer program
The step of bright first aspect methods described.
Fourth aspect present invention provides a kind of computer-readable recording medium, and the computer-readable recording medium storage has
Computer program, when the computer program is executed by processor realize as described in the first aspect of the invention method the step of.
The present invention provides a kind of display methods, device, equipment and the storage medium at financial APP interfaces, by logging in gold
Melt the verification of APP user profile, when judging the user profile to be present in User Information Database, just allow to log in financial APP,
The legitimacy of financial APP user is ensure that, while user profile generation watermark information is added in financial APP, just in case data
By illegal transmissions, then illegal transmissions person can be tracked, reach the purpose of protection data safety.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
In the required accompanying drawing used be briefly described, it should be apparent that, drawings in the following description be only the present invention some
Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these
Accompanying drawing obtains other accompanying drawings.
Fig. 1 is the flow chart of the display methods at the financial APP interfaces that one embodiment of the invention provides;
Fig. 2 is another flow chart of embodiment illustrated in fig. 1;
Fig. 3 is the flow chart of the display methods at the financial APP interfaces that further embodiment of this invention provides;
Fig. 4 is the flow chart of the display methods at the financial APP interfaces that further embodiment of this invention provides;
Fig. 5 is the structural representation of the display device at the financial APP interfaces that further embodiment of this invention provides;
Fig. 6 is another structural representation of embodiment illustrated in fig. 5;
Fig. 7 is the structural representation for the terminal device that further embodiment of this invention provides.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Financial APP includes the APP used in the company of financial field such as bank, security, insurance, trust, because these APP are related to
And data it is extremely important, therefore, how to prevent that data from by illegal transmissions being the problem of each company all extremely pays close attention to, it is necessary to
Ensure the legitimacy of user, just in case data by illegal transmissions, it is necessary to trace to the source the data of illegal transmissions, retrieve company
Loss.
Fig. 1 is refer to, it illustrates the flow chart of the display methods at financial APP interfaces provided in an embodiment of the present invention, institute
The display methods for stating financial APP interfaces comprises the following steps:
Step S100. obtains the address of User Information Database, and is associated with User Information Database.
User Information Database is financial APP third party database, can be obtained by user's input address,
It can be carried out networking acquisition or downloading link information according to the Business Name that user inputs being obtained, by user profile data
Storehouse is associated together with financial APP, as the database on backstage, is managed by the company using financial APP, when there is new registration
During employee, by the Data Enter of registration employee into the User Information Database, when there is labor turnover, by the employee of leaving office
Deleted from the User Information Database, protect the more new state of the User Information Database.
Wherein, the information of employee includes the username and password that employee uses financial APP.
User Information Database with associating for financial APP is associated by the address of database, for example, first company
User Information Database associated by the database address of first company with financial APP, the User Information Database of company B leads to
The database address for crossing company B associates with financial APP, and when first company personnel logs in financial APP, APP associations are first companies
User Information Database, when company B employee logs in APP, APP association be company B User Information Database.
Step S101, when user logs in financial APP, obtain the logon information of user.
When user logs in financial APP by financial APP log-in interface, financial APP obtains the information of user's input, specifically
To obtain the username and password that user inputs in financial APP log-in interface, for entering with the User Information Database associated
Row compares.
Step S102, judge that logon information whether there is in User Information Database.
After financial APP obtains the information of user's input, compared with the User Information Database of the company selected by user
Compared with, if user's logon information have in User Information Database unique data therewith to it is corresponding when if be judged as being present in user
In information database, user is the validated user of the said firm;If user's logon information in User Information Database no data with
To it is corresponding when be then judged as being not present in User Information Database, user is for the disabled user of the said firm or not in the said firm
Open the user of authority.
Step S103, if log in judged result for user profile be not present in User Information Database when, refusal logs in
Financial APP.
If specifically, log in judged result for user profile be not present in User Information Database when, judge that user is
Disabled user or the user for not opening authority, then refuse user and log in financial APP, user can not be obtained financial APP correlation
Data, ensure the legitimacy of user, prevent disabled user from obtaining the data information of company, caused damage to company.
Step S104, if logging in when judged result is present in User Information Database for user profile according to logon information
Watermark information is generated, watermark information is embedded into interface data of the generation with watermark in financial APP interface.
If specifically, log in judged result for user profile be present in User Information Database when, judge user for conjunction
Method user, it is allowed to user carries out logon operation, and financial APP generates watermark information according to the logon information of user after logging in successfully,
Wherein, watermark information is including but not limited to following several ways:
1. generating watermark information according to the company information of user and user name, company information can recognize aobvious as naked eyes
Show content, and user name is as watermark content, but naked eyes are invisible.The information of company can be the abbreviation of company either
LOGO, such as:The information of company is simply seen, but can't see the letter of user when using APP by " ×× company ", so, user
Breath, avoid user from actively being attacked after such as screenshotss watermark mode of altering and block the information of watermark and carry out the illegal of data again
Transmission.
2. generating watermark information according to the company information of user, user name and landing time, company information can as naked eyes
With the display content of identification, and user name and landing time be as watermark content, but naked eyes are invisible.So watermark is carried
When taking, the landing time information of user can also be extracted, helps to be tracked illegal transmissions data and traces to the source, improve what is traced to the source
Efficiency and precision.
Fig. 2 is refer to, it illustrates another flow of the display methods at financial APP interfaces provided in an embodiment of the present invention
Figure, specifically, the interface that watermark information is embedded into financial APP in step S104 comprises the following steps:
Step S1041, label is generated according to watermark information.
Watermark information is encrypted by preset-key, generates corresponding watermark ciphertext, is given birth to according to watermark ciphertext
Into corresponding label.
Specifically, the label of generation includes two parts:Clear portion and encryption part.Clear portion is the letter of company
Breath, it is indirectly displayed as in plain text, such as showing:" ×× company ", plaintext label is generated based on " ×× company ".Encryption unit point includes:
These user profile such as user name and landing time, based on preset-key, watermark information is encrypted, and obtains corresponding
Watermark ciphertext, and corresponding label is generated based on watermark ciphertext.The watermark that so user sees is clear portion, but encryption unit
Divide user can't see, can largely prevent to carry out the illegal transmissions of data again for the active attack of watermark.
In practical application, if desired the watermark information of acquisition maintains secrecy, then needs to be based on preset-key, by AES,
Such as Advanced Encryption Standard (Advanced Encryption Standard, AES) algorithm, watermark information is encrypted,
Then by encryption algorithm, such as Base64 algorithms, encoded, generate corresponding watermark ciphertext, then, based on watermark ciphertext
Generate corresponding label.So, user is when file is browsed, before intuitively can not knowing encryption by the label of display
Watermark information, reach the purpose of watermark encrypting.
Such as:When username information " Zhang San " is encrypted, preset-key can be based on, watermark information is added
It is close, coded treatment is then carried out, obtains a string of character string watermark ciphertexts " ABC ", then corresponding label is generated based on watermark ciphertext,
User using APP when it is seen that watermark information encryption after watermark ciphertext, can not intuitively know encryption before water
Official seal ceases.
Just in case data, it is necessary to when the information to watermark is extracted, can be passed through by illegal transmissions by by watermark ciphertext
Encoding and decoding algorithm, such as Base64, are decoded, and then, by enciphering and deciphering algorithm, such as AES algorithms, are decrypted, and are obtained corresponding
Watermark information, in this manner it is possible to trace to the source illegal transmissions person.
For example, the watermark information after encryption is " CDF ", decoded by decoding algorithm, decipherment algorithm decryption, after obtaining decryption
Watermark information be " Li Si ".
Further, during label is generated, the transparency of label can also be set.
Such as:User sets the attribute of label, sets the transparency position 90% of label.
By setting the transparency of label, user is set not influenceed when APP is browsed by label.
Step S1042, label is added in default figure layer.
Wherein, default figure layer is the size being adapted with user mobile phone screen, covers whole APP interfaces, figure layer is divided into N
× N number of region, N value can be set, it is preferred that N value is more than 3, this way it is secured that each regions of financial APP
Data have the information of watermark, play a part of protecting data safety and trace to the source.
For example, N values are 4, then default figure layer is divided into 16 regions, that is, financial APP interface is also divided into
, there is the information of watermark in 16 regions in this 16 regions, and user is difficult to some region of data by way of screenshotss
Illegal transmissions are carried out, because will likely include ones which the complete watermark information of at least one in the region of screenshotss.
Step S1043, figure layer and APP data overlaps are presented.
Specifically, it can first adjust the property parameters of figure layer;Then, the figure layer after adjustment is placed in the top at APP interfaces,
Make the overlapping presentation of figure layer and APP interfaces.
Wherein, when adjusting the property parameters of figure layer, one kind or any combination in following parameter are at least adjusted:Figure layer shape
Shape, figure layer transparency, figure layer centre coordinate, the figure layer anglec of rotation.
For example, adjusting the property parameters of figure layer, the rectangle that is shaped as of figure layer, the transparency 80% of figure layer, figure layer are set
Centre coordinate be screen center, the anglec of rotation of figure layer is 0 degree.
By setting the position of figure layer, shape and transparency etc., reach desired figure layer coverage effect.
In addition, the figure layer after adjustment to be placed in the top at financial APP interfaces, make the overlapping presentation of figure layer and APP interfaces, this
Sample, user can see figure layer and APP interfaces simultaneously.
Further, when it is determined that user's instruction APP interfaces are rolled, page turning or during zoom operations, to ensure label
All the time financial APP interfaces are covered, can use but be not limited to following two modes:
Mode one:When it is determined that user's instruction APP interfaces are rolled, page turning or during zoom operations, keep the position of figure layer
Put and display content is constant.
Employing mode one, when APP interface rolling motions, page turning or scaling, the centre coordinate of figure layer and the anglec of rotation of figure layer
Keep constant, the quantity of the label in figure layer is constant all the time, and is arranged all the time according to default N × N arrangement modes, makes figure
Label in layer all the time can be according to default N × N arrangement modes cover screen.
Mode two:When it is determined that user's instruction is rolled to APP interfaces or during page turn over operation, figure layer and APP interfaces are entered
Row synchronous rolling, page turning, and the number of tags to currently being shown in figure layer detects, and based on testing result, is arranged using N × N
Row mode, supplement addition is carried out to the label in figure layer;When it is determined that user's instruction zooms in and out operation to APP interfaces, it will scheme
Layer synchronizes scaling with APP interfaces, and the number of tags to currently being shown in figure layer detects, and based on testing result, adopts
With N × N arrangement modes, supplement addition is carried out to the label in figure layer.
Such as:Label is arranged using 4 × 4 square formation mode in figure layer, and figure layer size is set as the size of whole screen, when
When determining that user's instruction carries out rolling operation to APP interfaces, figure layer and APP interfaces synchronous rolling, to what is currently shown in figure layer
Number of tags is detected, when in figure layer number of tags be less than 4 × 4 when, as in figure layer remaining number of tags be 3 × 4, by 4
Label, using 4 × 4 arrangement mode, supplement is added to corresponding position in figure layer, number of tags is recovered to 16;Example again
Such as:When it is determined that user's instruction carries out page turn over operation to APP interfaces, remaining number of tags is 0*0 in figure layer, then by 16 marks
Label, using 4 × 4 arrangement mode, supplement is added to corresponding position in figure layer, number of tags is recovered to 16;Example again
Such as, when it is determined that user's instruction is amplified operation to APP interfaces, remaining number of tags is 3 × 3 in figure layer, then by 7 marks
Label, using 4 × 4 arrangement mode, supplement is added to corresponding position in figure layer.
Employing mode two, the label shown in figure layer arrange according to N × N arrangement modes all the time, ensure that label in figure layer
To the coverage rate at financial APP interfaces.
By three above step, watermark information is embedded into financial APP interfaces, makes APP interface datas and watermark knot
It is combined, serving prevents APP data by the purpose of illegal transmissions.
The display methods at financial APP interfaces provided in an embodiment of the present invention, by being associated to user's logon information with APP
The comparison of User Information Database, disabled user is kept outside of the door, ensure that the legitimacy of financial APP user, meanwhile, according to
The information generation watermark information at family, and be embedded into the information generation of watermark with ciphertext two parts watermark information in plain text by key
In APP interfaces, user is can only see plaintext watermark information, reduce that watermark is under attack and the possibility destroyed, just in case number
According to by illegal transmissions, then illegal transmissions person can be traced to the source, improve the security of financial APP data.
On the basis of previous embodiment, when user carries out forwarding operation to financial APP interface data files, to interface
Processing is decrypted in watermark information in data, extracts the user profile of watermark, and whether verification user profile meets access right,
If not meeting access right, forbid user to carry out forwarding operation to data, if meeting access right, decryption interface data, permit
Family allowable carries out forwarding operation.
In financial APP practical application, in order to which the reasons such as the exchange on working to APP interface datas, it is necessary to turn
Hair operation, such as APP interface datas are forwarded in mail or other communication tools;In addition, the data pin at financial APP interfaces
Operating right to different user is different, and domestic consumer is the authority that in general employee does not forward data, advanced with master
User more than pipe level just has the authority of forwarding data;Or the employee of each branch of company can check the data of full company
Information, but forwarding operation can only be carried out to the segment information of company.For example, there are Shenzhen branch and Guangzhou branch in certain company, then,
Certain employee of Shenzhen branch can not only check the data of Shenzhen branch but also can check the data of Guangzhou branch, but can only be to Shenzhen
The data of branch carry out forwarding operation.
Fig. 3 is refer to, it illustrates the flow chart of the display methods at financial APP interfaces provided in an embodiment of the present invention, tool
Body, the forwarding operation for monitoring user comprises the following steps:
Step S200, user require to carry out forwarding operation to financial APP interface datas.
User can select the instruction of forwarding, now financial APP receives use according to the needs of oneself at financial APP interfaces
Family requires to forward the instruction of financial APP interface datas.
Step S201, extract the watermark information at financial APP interfaces.
When financial APP, which receives user, requires to forward the instruction of financial APP interface datas, financial APP is to presetting figure layer
In watermark information extracted, by encoding and decoding algorithm, such as Base64, can be decoded by by watermark ciphertext, then,
By enciphering and deciphering algorithm, such as aes algorithm, it is decrypted, obtains corresponding watermark information.
Step S202, judges whether user meets access right.
Specifically, after obtaining watermark information, the related information of user, rank or company to user are also just obtained
Branch is verified, if judging user for domestic consumer or the branch of user and the branch of company belonging to financial APP interface datas
When different, then judge that user does not meet access right;If judging, user divides for advanced level user and with the affiliated company of APP interface datas
When portion is identical, then judge that user meets access right.
Step S203, does not meet access right, then forbids the forwarding of user to operate.
Specifically, when if the judged result after extraction user profile does not meet access right for user, user is forbidden to enter
Row forwarding operation, the threshold of data safety is so improved, further increase the security of financial APP interface datas.
Step S204, meet access right, then allow the forwarding of user to operate.
Specifically, when if the judged result after extraction user profile meets access right for user, user is allowed to carry out
The data at financial APP interfaces are specially first decrypted operation, discharge the authority relayed, enter user by forwarding operation
The operation of row forwarding, the user to financial APP, which brings, uses upper facility.
The display methods at financial APP interfaces provided in an embodiment of the present invention, by requiring to forward financial APP interfaces number
According to one authority of user checking, avoid and do not meet the user of access right forwarding operation is carried out to APP interface datas, enter
One step reduces data by the possibility of illegal transmissions.Simultaneously, it is allowed to the APP user for meeting access right carries out forwarding operation,
And can brings the facility on user job.
On the basis of previous embodiment, in order to which the data after forwarding are also carried out with an encryption, prevent that data are non-
Method is transmitted, and the information of user is carried out one by the embodiment of the present invention by way of scrambling encryption to the APP interface datas of forwarding
Watermark is added, just in case when data are by illegal transmissions, can be traced to the source passing loser.
Fig. 4 is refer to, it illustrates the flow chart of the display methods at financial APP interfaces provided in an embodiment of the present invention, tool
Body, the information addition watermark of forwarding comprises the following steps:
Step S300, watermark matrix is generated according to watermark information.
In embodiment two, when user carries out forwarding operation, financial APP can extract to the information of watermark, judge
After user meets access right permission user's forwarding operation, before actual APP interface datas forward, first watermark is believed
Breath is expressed as the form of matrix, generates watermark matrix.
Step S301, according to Program Generating thread relationship matrix corresponding to financial APP interface data.
Due to thread relationship of the embodiment of the present invention based on financial APP, and cross-thread relation has polytype, in actual mistake
Most suitable relationship type can be selected at situation itself according to financial APP in journey, such as the sequencing relation that thread performs, thread
Main control relation in implementation procedure etc..In order to utilize and change the relation of cross-thread, it is necessary to obtain financial APP existing line
Journey relation, by debugger monitors finance APP implementation procedure, financial APP thread relationship is recorded, and thread relationship is carried out
Numbering, thread relationship matrix is generated further according to numbered thread relationship.
Step S302, thread relationship matrix is subjected to arnold conversion disorder processings, generates out of order thread relationship matrix.
The thread relationship matrix generated after being run to financial APP carries out disorder processing, is used in the embodiment of the present invention
Thread relationship matrix is carried out disorder processing by Arnold conversion, breaks up thread relationship matrix.
Step S303, watermark matrix is embedded in out of order thread relationship matrix, carries out inverse disorder processing, be reduced to order line
Journey relational matrix.
Watermark matrix is embedded in out of order thread relationship matrix, in order to increase the repellence for malicious attack, usage amount
Change technology makes multiple elements in thread relationship matrix correspond to an element in watermark matrix, so as in thread relationship matrix
Even if element is tampered, watermark data also can be not necessarily distorted.In the embodiment of the present invention, according to embedded one element of watermark
Value corresponding in 4 thread relationship matrixes element parity.The value of watermark element be 0 or be 1 possibility it is identical, therefore
This four member is known as half and may not be needed to change.Simultaneously because thread relationship matrix belongs to sparse matrix more, i.e. thread closes
It is that largely value is 0, therefore also only need one 0 in this 4 elements being revised as 1 even if modification in matrix.Will be embedding
Enter to have the out of order thread relationship matrix of software watermark matrix to carry out inverted unrest, revert to order Thread relational matrix.
Step S304, financial APP source code, final journey of the generation with watermark are changed according to order Thread relational matrix
Sequence.
Due to embedded in watermark matrix in thread relational matrix, financial APP is modified to reflect thread relationship square
The change of battle array, the position of the value changed by determining thread relationship matrix before and after embedded watermark, determines two lines that it influences
Journey, further according to code at thread is corresponded in the financial APP source codes of relationship type modification of selection, it is corresponding to complete all variation elements
Thread modification after, so that it may obtain being embedded in the final program after watermark.
Because the various conventional changes in financial APP communication processes will not impact to thread relationship, at the same user by
In the source code of no software, thus can not completely clear and definite cross-thread relation, financial APP can be caused not by modifying rashly
Energy normal use, thus have higher security using the watermark based on thread relationship.
The display methods at financial APP interfaces provided in an embodiment of the present invention, by adding to the financial APP information of forwarding operation
Add the watermark of thread relationship, further increase the security of financial APP data, having reached prevents data by the mesh of illegal transmissions
's.
Fig. 5 is refer to, it illustrates the structural representation of the display device at financial APP interfaces provided in an embodiment of the present invention
Figure, the display device 50 at financial APP interfaces include:User information correlation module 501, user profile judge module 502 and watermark
Information display module 503.
User information correlation module 501, enter for obtaining the address of User Information Database, and with User Information Database
Row association;
User profile judge module 502, when user logs in financial APP, for obtaining the log-on message of user, and judge
Log-on message whether there is in User Information Database, when log-on message is not present in User Information Database, then refuse
Financial APP is logged in absolutely;
Watermark information display module 503, if log-on message is present in User Information Database, for being believed according to login
Breath generation watermark information, watermark information is embedded into interface data of the generation with watermark in financial APP interface.
Further, in a kind of embodiment, watermark information display module 503 is used to generate watermark letter according to log-on message
Breath, watermark information is added in preset figure layer, figure layer and financial APP interface are carried out into overlapping presentation generation has watermark
Interface data.
In another embodiment, watermark information display module 503 is used to generate watermark information according to log-on message, according to
Watermark information is encrypted preset-key, the watermark information after encryption is added in preset figure layer, by figure layer and finance
APP interface carries out overlapping present and generates the interface data with watermark.
Fig. 6 is refer to, it shows another structural representation of display device at financial APP interfaces provided in an embodiment of the present invention
Figure, the display device 50 at financial APP interfaces also include:Watermark information extraction module 504 and access right judge module 505.
Watermark information extraction module 504, when user to financial APP interface data files carry out forwarding operation when, for pair
Processing is decrypted in watermark information on interface data, extracts the user profile of watermark;
Access right judge module 505, for judging whether user profile meets access right, if not meeting the right to use
Limit, then forbid user to carry out forwarding operation to data, if meeting access right, decryption interface data, it is allowed to which user is forwarded
Operation.
The specific work process of module in above-mentioned terminal device, may be referred to the corresponding process in preceding method embodiment,
It will not be repeated here.
The display device at financial APP interfaces provided in an embodiment of the present invention, pass through the school to logging in financial APP user profile
Test, when judging the user profile to be present in User Information Database, just allow to log in financial APP, ensure that financial APP is used
The legitimacy at family, while user profile generation watermark information is added in financial APP, just in case data are by illegal transmissions, then
Illegal transmissions person can be tracked, reach the purpose of protection data safety.
Another embodiment of the present invention provides a computer-readable recording medium, is stored on the computer-readable recording medium
There is computer program, the computer program realizes the display side at the financial APP interfaces in above-described embodiment when being executed by processor
Method, to avoid repeating, repeat no more here.Or the computer program realize when being executed by processor it is golden in above-described embodiment
Melt the function of each module/unit in the display device at APP interfaces, to avoid repeating, repeat no more here.
Fig. 7 is refer to, it illustrates the schematic diagram of terminal device provided in an embodiment of the present invention.Terminal device 6 includes place
Manage device 60, memory 61 and be stored in the computer program 62 that can be run in memory 61 and on processor 60.Processor
Each step of financial product display methods in above-described embodiment is realized during 60 execution computer program 62, such as shown in Fig. 1
Step S100, S101, S102 and S103.Or realized during the execution computer program 62 of processor 60 financial in above-described embodiment
The function of each module/unit of display device at APP interfaces, user information correlation module 501 as shown in Figure 5, user profile is sentenced
Disconnected module 502 and watermark information display module 503.
Computer program 62 can be divided into one or more module/units, and one or more module/unit is deposited
Storage performs in memory 61, and by processor 60, to complete the present invention.One or more module/units can be can be complete
Into the series of computation machine programmed instruction section of specific function, the instruction segment is used to describe computer program 62 in terminal device 6
Implementation procedure.For example, computer program 62 can be divided into user information correlation module 501, user profile judge module
502 and watermark information display module 503 (module in virtual bench).
The terminal device 6 can be the computing devices such as desktop PC, notebook, palm PC and cloud server.
Terminal device may include, but be not limited only to, processor 60, memory 61.It will be understood by those skilled in the art that Fig. 7 is only
The example of terminal device 6, the restriction to terminal device 6 is not formed, parts more more or less than diagram can be included, or
Combine some parts, or different parts, for example, terminal device can also include input-output equipment, network access equipment,
Bus etc..
Alleged processor 60 can be CPU (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng.
Memory 61 can be the internal storage unit of terminal device 6, such as the hard disk or internal memory of terminal device 6.Storage
Device 61 can also be the plug-in type hard disk being equipped with the External memory equipment of terminal device 6, such as terminal device 6, intelligent storage
Block (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..
Further, memory 61 can also both include the internal storage unit of terminal device 6 or including External memory equipment.Memory
61 are used to store computer program and other programs and data needed for terminal device.Memory 61 can be also used for temporarily
Store the data that has exported or will export.
The terminal device 6 can be the computing devices such as desktop PC, notebook, palm PC and cloud server.
Terminal device may include, but be not limited only to, processor 60, memory 61.It will be understood by those skilled in the art that Fig. 7 is only
The example of terminal device 6, the restriction to terminal device 6 is not formed, parts more more or less than diagram can be included, or
Combine some parts, or different parts, for example, terminal device can also include input-output equipment, network access equipment,
Bus etc..
Alleged processor 60 can be CPU (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng.
Memory 61 can be the internal storage unit of terminal device 6, such as the hard disk or internal memory of terminal device 6.Storage
Device 61 can also be the plug-in type hard disk being equipped with the External memory equipment of terminal device 6, such as terminal device 6, intelligent storage
Block (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..
Further, memory 61 can also both include the internal storage unit of terminal device 6 or including External memory equipment.Memory
61 are used to store computer program and other programs and data needed for terminal device.Memory 61 can be also used for temporarily
Store the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work(
Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion
The all or part of function of description.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated module/unit realized in the form of SFU software functional unit and as independent production marketing or
In use, it can be stored in a computer read/write memory medium.Based on such understanding, the present invention realizes above-mentioned implementation
All or part of flow in example method, by computer program the hardware of correlation can also be instructed to complete, described meter
Calculation machine program can be stored in a computer-readable recording medium, and the computer program can be achieved when being executed by processor
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer-readable medium
It can include:Any entity or device, recording medium, USB flash disk, mobile hard disk, the magnetic of the computer program code can be carried
Dish, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It is it should be noted that described
The content that computer-readable medium includes can carry out appropriate increasing according to legislation in jurisdiction and the requirement of patent practice
Subtract, such as in some jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to foregoing reality
Example is applied the present invention is described in detail, it will be understood by those within the art that:It still can be to foregoing each
Technical scheme described in embodiment is modified, or carries out equivalent substitution to which part technical characteristic;And these are changed
Or replace, the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme, all should
Within protection scope of the present invention.
Claims (10)
1. a kind of display methods at financial APP interfaces, it is characterised in that the display methods at the financial APP interfaces includes following
Step:
The address of User Information Database is obtained, and is associated with the User Information Database;
When user logs in the financial APP, the log-on message of user is obtained, and judges that the log-on message whether there is in institute
State in User Information Database;
If the log-on message is not present in the User Information Database, refusal logs in the financial APP;
If the log-on message is present in the User Information Database, watermark letter is generated according to the log-on message
Breath, the watermark information is embedded into interface data of the generation with watermark in the interface of the financial APP.
2. the display methods at financial APP interfaces as claimed in claim 1, it is characterised in that generated according to the log-on message
Watermark information, the watermark information is embedded into interface data of the generation with watermark in the interface of the financial APP, including:
Watermark information is generated according to the log-on message, the watermark information is added in preset figure layer, by the figure layer
Overlapping present, which is carried out, with the interface of the financial APP generates the interface data with watermark.
3. the display methods at financial APP interfaces as claimed in claim 1, it is characterised in that generated according to the log-on message
Watermark information, the watermark information is embedded into interface data of the generation with watermark in the interface of the financial APP, including:
Watermark information is generated according to the log-on message, the watermark information is encrypted according to preset-key, after encryption
Watermark information be added to preset figure layer in, by the figure layer and the financial APP interface carry out it is overlapping present generation tool
There is the interface data of watermark.
4. the display methods at financial APP interfaces as claimed in claim 3, it is characterised in that according to preset-key to the water
Official seal breath is encrypted, and the watermark information after encryption is added in preset figure layer, including:
The watermark information is encrypted by preset-key, generates corresponding watermark ciphertext, it is close according to the watermark
Text generates corresponding label, and the label is added in preset figure layer.
5. the display methods at financial APP interfaces as claimed in claim 3, it is characterised in that the display at the financial APP interfaces
Method also includes:
When user carries out forwarding operation to the financial APP interface data files, to the watermark information on the interface data
Processing is decrypted, extracts the user profile of the watermark;
Judge whether the user profile meets access right, if not meeting access right, forbid the user to the number
According to forwarding operation is carried out, if meeting, the interface data is decrypted, it is allowed to which the user carries out forwarding operation.
6. the display methods at financial APP interfaces as claimed in claim 5, it is characterised in that decrypt the interface data, it is allowed to
The user carries out forwarding operation, also includes afterwards:
Watermark matrix is generated according to the watermark information;
According to Program Generating thread relationship matrix corresponding to the interface data of the financial APP;
The thread relationship matrix is subjected to arnold conversion disorder processings, generates out of order thread relationship matrix;
The watermark matrix is embedded in the out of order thread relationship matrix, carries out inverse disorder processing, is reduced to order Thread pass
It is matrix;
The source code of the financial APP, the generation final journey with watermark are changed according to the order Thread relational matrix
Sequence.
7. a kind of display device at financial APP interfaces, it is characterised in that the display device at the financial APP interfaces includes:
User information correlation module, carried out for obtaining the address of User Information Database, and with the User Information Database
Association;
User profile judge module, when user logs in the financial APP, for obtaining the log-on message of user, and judge institute
State log-on message to whether there is in the User Information Database, when the log-on message is not present in the user profile number
During according in storehouse, then refusal logs in the financial APP;
Watermark information display module, if the log-on message is present in the User Information Database, for according to
Log-on message generates watermark information, and the watermark information is embedded into boundary of the generation with watermark in the interface of the financial APP
Face data.
8. the display device at financial APP interfaces as claimed in claim 7, it is characterised in that the watermark information display module
For generating watermark information according to the log-on message, the watermark information is added in preset figure layer, by the figure layer
Overlapping present, which is carried out, with the interface of the financial APP generates the interface data with watermark;
Or the watermark information display module is used to generate watermark information according to the log-on message, according to preset-key pair
The watermark information is encrypted, and the watermark information after encryption is added in preset figure layer, by the figure layer and the gold
The interface for melting APP carries out the overlapping interface data for presenting and generating and having watermark;
The display device at the financial APP interfaces also includes:
Watermark information extraction module, when user carries out forwarding operation to the financial APP interface data files, for described
Processing is decrypted in watermark information on interface data, extracts the user profile of the watermark;
Access right judge module, for judging whether the user profile meets access right, if not meeting the right to use
Limit, then forbid the user to carry out forwarding operation to the data, if meeting the access right, decrypt the interface data,
The user is allowed to carry out forwarding operation.
9. a kind of terminal device, including memory, processor and it is stored in the memory and can be on the processor
The computer program of operation, it is characterised in that realize such as claim 1 to 6 described in the computing device during computer program
The step of any one methods described.
10. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, and its feature exists
In when the computer program is executed by processor the step of realization such as any one of claim 1 to 6 methods described.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711052046.8A CN107784207B (en) | 2017-10-30 | 2017-10-30 | Display method, device and equipment of financial APP interface and storage medium |
PCT/CN2017/113779 WO2019085126A1 (en) | 2017-10-30 | 2017-11-30 | Display method, device and apparatus for financial application interface, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711052046.8A CN107784207B (en) | 2017-10-30 | 2017-10-30 | Display method, device and equipment of financial APP interface and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107784207A true CN107784207A (en) | 2018-03-09 |
CN107784207B CN107784207B (en) | 2019-12-10 |
Family
ID=61432341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711052046.8A Active CN107784207B (en) | 2017-10-30 | 2017-10-30 | Display method, device and equipment of financial APP interface and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107784207B (en) |
WO (1) | WO2019085126A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109598140A (en) * | 2018-11-28 | 2019-04-09 | 国家电网有限公司 | A kind of guard method of webpage information and device |
CN109658123A (en) * | 2018-10-23 | 2019-04-19 | 平安普惠企业管理有限公司 | The method, apparatus and storage medium of financial business are promoted by small routine |
CN109801205A (en) * | 2018-12-21 | 2019-05-24 | 苏宁易购集团股份有限公司 | A kind of implicit watermark adding method and device traced to the source |
CN112084516A (en) * | 2020-09-14 | 2020-12-15 | 洛阳众智软件科技股份有限公司 | Method and equipment for safely protecting CAD drawing information |
CN115167969A (en) * | 2022-09-07 | 2022-10-11 | 平安银行股份有限公司 | Remote collaboration method and device based on cloud |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113780798B (en) * | 2021-09-07 | 2024-05-28 | 杭州天宽科技有限公司 | Key index display system based on cloud computing |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102521536A (en) * | 2011-12-06 | 2012-06-27 | 杭州安恒信息技术有限公司 | Method and system for detecting inner core object invasion of database |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN103929473A (en) * | 2014-03-25 | 2014-07-16 | 冯力新 | Method and system for accessing multiple subsystems and public subsystem with distributed storage personalized data through single APP program |
CN106023059A (en) * | 2016-05-26 | 2016-10-12 | 北京启迪思创科技有限公司 | Watermarking information generation method and apparatus |
CN107066491A (en) * | 2016-12-28 | 2017-08-18 | 北京五八信息技术有限公司 | The method and device of quick log-on webpage application |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103379101A (en) * | 2012-04-20 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Watermark generation method, client side and server |
CN103116717B (en) * | 2013-01-25 | 2015-11-18 | 东莞宇龙通信科技有限公司 | A kind of user login method and system |
-
2017
- 2017-10-30 CN CN201711052046.8A patent/CN107784207B/en active Active
- 2017-11-30 WO PCT/CN2017/113779 patent/WO2019085126A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN102521536A (en) * | 2011-12-06 | 2012-06-27 | 杭州安恒信息技术有限公司 | Method and system for detecting inner core object invasion of database |
CN103929473A (en) * | 2014-03-25 | 2014-07-16 | 冯力新 | Method and system for accessing multiple subsystems and public subsystem with distributed storage personalized data through single APP program |
CN106023059A (en) * | 2016-05-26 | 2016-10-12 | 北京启迪思创科技有限公司 | Watermarking information generation method and apparatus |
CN107066491A (en) * | 2016-12-28 | 2017-08-18 | 北京五八信息技术有限公司 | The method and device of quick log-on webpage application |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109658123A (en) * | 2018-10-23 | 2019-04-19 | 平安普惠企业管理有限公司 | The method, apparatus and storage medium of financial business are promoted by small routine |
CN109598140A (en) * | 2018-11-28 | 2019-04-09 | 国家电网有限公司 | A kind of guard method of webpage information and device |
CN109801205A (en) * | 2018-12-21 | 2019-05-24 | 苏宁易购集团股份有限公司 | A kind of implicit watermark adding method and device traced to the source |
CN109801205B (en) * | 2018-12-21 | 2022-02-25 | 苏宁易购集团股份有限公司 | Traceable implicit watermark adding method and device |
CN112084516A (en) * | 2020-09-14 | 2020-12-15 | 洛阳众智软件科技股份有限公司 | Method and equipment for safely protecting CAD drawing information |
CN115167969A (en) * | 2022-09-07 | 2022-10-11 | 平安银行股份有限公司 | Remote collaboration method and device based on cloud |
CN115167969B (en) * | 2022-09-07 | 2022-12-23 | 平安银行股份有限公司 | Remote collaboration method and device based on cloud |
Also Published As
Publication number | Publication date |
---|---|
WO2019085126A1 (en) | 2019-05-09 |
CN107784207B (en) | 2019-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107784207A (en) | Display methods, device, equipment and the storage medium at financial APP interfaces | |
US10565357B2 (en) | Method for securely transmitting a secret data to a user of a terminal | |
CN104751036B (en) | A kind of computer information safe system | |
CN103929306B (en) | The approaches to IM of intelligent cipher key equipment and intelligent cipher key equipment | |
CN105024803B (en) | Behavior fingerprint in white box realization | |
CN104794388B (en) | application program access protection method and application program access protection device | |
CN106506159A (en) | Encryption method and equipment for key safety | |
CN104322003B (en) | Cryptographic authentication and identification method using real-time encryption | |
CN106682903B (en) | A kind of feedback validation method of bank paying Licensing Authority information | |
CN103929307A (en) | Password input method, intelligent secret key device and client device | |
CN105975867B (en) | A kind of data processing method | |
CN110401538A (en) | Data ciphering method, system and terminal | |
CN104376631B (en) | A kind of implementation method of safety door prohibition system based on commercial cipher algorithm | |
CN105007256A (en) | Security module for secure function execution on untrusted platform | |
CN105761066A (en) | Bank card password protection method and system | |
CN104268447A (en) | Encryption method of embedded software | |
CN103929312A (en) | Mobile terminal and method and system for protecting individual information of mobile terminal | |
CN109510702A (en) | A method of it key storage based on computer characteristic code and uses | |
CN200993803Y (en) | Internet banking system safety terminal | |
CN1331015C (en) | Computer security startup method | |
CN111768523A (en) | CTID-based NFC intelligent door lock unlocking method, system, equipment and medium | |
CN102902903B (en) | A kind of ecommerce intelligent code key with button and its implementation | |
CN105933117A (en) | Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage | |
CN100543762C (en) | Computer-aided design data encryption protecting method based on hardware environment | |
CN104462932A (en) | Method for generating and verifying maintenance password of embedded device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |