CN108763888A - Files on each of customers processing method, device, computer equipment and storage medium - Google Patents
Files on each of customers processing method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN108763888A CN108763888A CN201810546441.XA CN201810546441A CN108763888A CN 108763888 A CN108763888 A CN 108763888A CN 201810546441 A CN201810546441 A CN 201810546441A CN 108763888 A CN108763888 A CN 108763888A
- Authority
- CN
- China
- Prior art keywords
- security password
- password
- interface
- instruction
- identifying code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
This application involves a kind of files on each of customers processing method, device, computer equipment and storage mediums.The method includes:When receiving the application start instruction of input, corresponding application program is started according to the application start instruction;Instruction is checked when receiving files on each of customers, inquires default mark corresponding with the application program;Whether the default mark was locally arranged security password to identify;Judge whether security password locally was set according to the default mark;When security password locally was not arranged, interface is arranged in pop-up security password;The first security password that interface receives input is set by the security password, obtains terminal iidentification, and server will be uploaded to after first security password and terminal iidentification encryption;When the successful response results of the upload for receiving the server return, the value of the default mark is changed, and show the files on each of customers.It can ensure the safety of files on each of customers using this method.
Description
Technical field
This application involves field of computer technology, are set more particularly to a kind of files on each of customers processing method, device, computer
Standby and storage medium.
Background technology
With the development of computer technology, there are various application programs, to which user can be in application program
On operated, for example, user can be by the application program in terminal come into interrogation, physical examination etc. on line.
However, current user by the application program in terminal come into interrogation, physical examination etc. on line, generation
Files on each of customers record is stored in application program, therefore every can be checked with the user of login user application program
The files on each of customers is revealed so as to cause files on each of customers.
Invention content
Based on this, it is necessary in view of the above technical problems, provide a kind of user's shelves that can ensure files on each of customers safety
Case processing method, device, computer equipment and storage medium.
A kind of files on each of customers processing method, the method includes:
When receiving the application start instruction of input, corresponding answer is started according to the application start instruction
Use program;
Instruction is checked when receiving files on each of customers, inquires default mark corresponding with the application program;The pre- bidding
Know and whether security password locally was set to identify;
Judge whether security password locally was set according to the default mark;
When security password locally was not arranged, interface is arranged in pop-up security password;
The first security password that interface receives input is set by the security password, obtains terminal iidentification, and will be described
It is uploaded to server after first security password and terminal iidentification encryption;
When the successful response results of the upload for receiving the server return, the value of the default mark is changed, and
Show the files on each of customers.
The method further includes in one of the embodiments,:
When security password was locally located, the number of input security password mistake in preset time period is obtained, and is judged
Whether the number is more than the first preset value;
When the number is less than first preset value, display security password verifies interface;
The second security password that interface receives input is verified by the security password;
Terminal iidentification is obtained, and password authentification instruction, institute are generated according to the terminal iidentification and second security password
It states password authentification instruction and is used to indicate the server according to the terminal iidentification corresponding third security password verification described the
Whether two security passwords are correct;
Receive the verification result for second security password that the server returns;
When the verification result indicates that second security password is proved to be successful, the files on each of customers is shown.
The method further includes in one of the embodiments,:
When verify interface reception by the security password is to forget Password instruction, judge whether to answer with described
With the corresponding user contact details of program;
When there are user contact details corresponding with the application program, display identifying code obtains interface;
To the server send identifying code acquisition instruction, the identifying code acquisition instruction be used to indicate the server to
User terminal corresponding with the user contact details returns to identifying code;
Interface is obtained by the identifying code and receives the identifying code of input, and the identifying code inputted is sent to the clothes
Business device is verified;
When the server returns to the response message that inputted identifying code is proved to be successful, continues pop-up security password and set
Set interface.
In one of the embodiments, it is described according to the application start instruction start corresponding application program it
Afterwards, further include:
The setting instruction for receiving input, instructs according to the setting and shows user setup interface;
Inquiry default mark corresponding with the application program;Whether the default mark was locally arranged peace to identify
Full password;
Judge locally whether security password was set according to the default mark, and it is close to be locally set safety
Code, display security password reset interface;
The instruction that forgets Password of input is received, and continues to determine whether to contact in the presence of user corresponding with the application program
Mode.
The method further includes in one of the embodiments,:
The setting instruction for receiving input shows the user setup interface according to setting instruction;
Inquiry default mark corresponding with the application program;Whether the default mark was locally arranged peace to identify
Full password;
Judge whether security password locally was set according to the default mark;
When security password was not locally arranged, continue to pop up security password setting interface.
A kind of files on each of customers processing unit, described device include:
Starting module, for when receiving the application start instruction of input, being referred to according to the application program launching
It enables and starts corresponding application program;
First enquiry module checks that instruction, inquiry are corresponding with the application program pre- for that ought receive files on each of customers
Bidding is known;Whether the default mark was locally arranged security password to identify;
First judgment module, for judging locally whether security password was arranged according to the default mark;
First pop-up module, for when security password locally was not arranged, interface to be arranged in pop-up security password;
Uploading module obtains terminal for the first security password that interface receives input to be arranged by the security password
Mark, and server will be uploaded to after first security password and terminal iidentification encryption;
First display module, for when receiving the successful response results of upload that the server returns, changing institute
The value of default mark is stated, and shows the files on each of customers.
Described device further includes in one of the embodiments,:
Second judgment module, for when security password was locally located, obtaining and inputting security password in preset time period
The number of mistake, and judge the number whether more than the first preset value;
Security password verifies interface display module, for when the number is less than first preset value, display to be pacified
Full password authentification interface;
First receiving module, for verifying the second security password that interface receives input by the security password;
First authentication module is given birth to for obtaining terminal iidentification, and according to the terminal iidentification and second security password
It is instructed at password authentification, the password authentification instruction is used to indicate the server and is pacified according to the corresponding third of the terminal iidentification
Whether the second security password is correct described in full password authentification;
Second receiving module, the verification result for second security password returned for receiving the server;
Second display module, for when the verification result indicates that second security password is proved to be successful, showing institute
State files on each of customers.
Described device further includes in one of the embodiments,:
Third judgment module, for when verify interface reception by the security password is to forget Password instruction, sentencing
It is disconnected to whether there is user contact details corresponding with the application program;
Identifying code obtains interface display module, is used for when there are user contact details corresponding with the application program,
Show that identifying code obtains interface;
Identifying code acquisition module, for sending identifying code acquisition instruction, the identifying code acquisition instruction to the server
It is used to indicate the server and returns to identifying code to user terminal corresponding with the user contact details;
Second authentication module for obtaining the identifying code that interface receives input by the identifying code, and will be inputted
Identifying code is sent to the server and is verified;
Second pop-up module, for when the server returns to the response message that inputted identifying code is proved to be successful,
Continue to pop up security password setting interface.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes any of the above-described the method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of method described in any one of the above embodiments is realized when row.
Above-mentioned files on each of customers processing method, device, computer equipment and storage medium, not only application program, which exists, logs in
Password, the files on each of customers inside application program are also provided with special password, therefore even if user can with login application program,
When not knowing the first security password of files on each of customers, the files on each of customers can not be also got, ensure that files on each of customers safety,
And when security password locally is not arranged, terminal meeting active warning user carries out the setting of the first security password, to ensure that
Security password is arranged in user in time, is not in the files on each of customers for being not provided with security password.
Description of the drawings
Fig. 1 is the application scenario diagram of files on each of customers processing method in one embodiment;
Fig. 2 is the flow diagram of files on each of customers processing method in one embodiment;
Fig. 3 is the schematic diagram at the security password setting interface in one embodiment;
Fig. 4 is the schematic diagram at the security password verification interface in one embodiment;
Fig. 5 is the structure diagram of files on each of customers processing unit in one embodiment;
Fig. 6 is the internal structure chart of one embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Files on each of customers processing method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, eventually
End is communicated by network with server.User can operate the application program in terminal, such as when the user clicks
When the corresponding icon of application program, terminal receives the application start instruction of input, is executed according to the application program launching
Start corresponding application program, after application program launching, user can check files on each of customers, such as click and apply journey
Files on each of customers option in sequence, the files on each of customers that terminal receives input at this time check instruction, the default mark of terminal inquiry local
Whether security password locally was set to determine, if local security password was not arranged, pop-up security password is arranged interface, uses
Family is arranged interface by security password and inputs the first security password, and the is got to which interface can be arranged from security password in terminal
One security password, and by the first acquired security password and terminal iidentification encryption after upload server, it is waiting to receive server
When the successful response results of the upload of return, the value of default mark is changed, and show files on each of customers.Wherein, terminal can with but not
Be limited to various personal computers, laptop, smart mobile phone, tablet computer and portable wearable device, server can
To be realized with the independent server server cluster that either multiple servers form.
In one embodiment, as shown in Fig. 2, providing a kind of files on each of customers processing method, it is applied to Fig. 1 in this way
In server for illustrate, include the following steps:
S202:When receiving the application start instruction of input, started according to application start instruction corresponding
Application program.
Specifically, application program is installed, user can be operated by the application program, such as be asked on line in terminal
It examines, on line after interrogation, the application program in terminal can generate corresponding files on each of customers, example according to the process of interrogation on line
Such as, the record of interrogation on line is added to the homepage of files on each of customers, then by line interrogation as a result, i.e. on line interrogation doctor
The second page etc. in files on each of customers is arranged in the diagnosis provided.
In practical applications, user first clicks on the application icon shown in terminal when using application program, when
When terminal is received for the application program image target click commands, terminal starts corresponding using journey according to the click commands
Sequence, to which terminal can show the home interface of application program.
S204:Instruction is checked when receiving files on each of customers, inquires default mark corresponding with application program;Default mark is used
Whether security password was set so that mark is local.
Specifically, after application program launching, user can be operated to use the function of being integrated in application program, example
If user can click " files on each of customers " button, when terminal detects that user clicks " files on each of customers " button, that is, use is received
When the files on each of customers of family input checks instruction, whether inquiry is local was arranged security password, in the present embodiment, default by one
Whether mark was locally arranged security password to determine, such as when security password was locally located, default to be identified as " 1 ", when
It is local that security password was not set, it is default to be identified as " 0 ".
S206:Judge whether security password locally was set according to default mark.
Specifically, as indicated above, terminal detects the default mark, is identified as " 1 " when default, peace was locally located in expression
Full password is identified as " 0 " when default, judges that security password was not locally arranged.
S208:When security password locally was not arranged, interface is arranged in pop-up security password.
Specifically, in order to ensure the files on each of customers produced the either safety for the files on each of customers to be generated in the future,
As long as user clicks " files on each of customers " button, terminal needs to pop up security password setting interface, to remind user to pacify
The setting of full password, accordingly even when being not provided with security password, user can not view security password immediately, specifically,
Files on each of customers setting interface may refer to shown in Fig. 3.
Even the operations such as interrogation on line have been carried out in user in this way, produce corresponding files on each of customers, and user does not have
Input or setting security password can not view corresponding files on each of customers, ensure that the safety of files on each of customers.If at this time
User also not into operations such as interrogations on line, i.e., does not generate files on each of customers also, can pre-set security password, at end
When end generates files on each of customers according to operations such as interrogations on line, can directly it be stored, when user needs to check generated use
When the archives of family, it is necessary to input accurate security password, terminal can just show corresponding files on each of customers.
S210:The first security password that interface receives input is set by security password, obtains terminal iidentification, and by first
It is uploaded to server after security password and terminal iidentification encryption.
Specifically, in conjunction with Fig. 3, user inputs the first security password in the input frame that interface is arranged in security password.It is optional
Ground, terminal can carry out first security password first format check, such as can examine the length of first security password
It is enough, if length is less than preset length, indicates that there are problems for the first security password, need user to re-enter, if length
More than or equal to preset length, indicate that the first security password verifies successfully.Further, it is also possible to the format of first security password into
Row verification, such as judge whether the first security password has English alphabet and there is number again, the first peace only input by user
Full password has number there are English alphabet again when, which verifies successfully.
Terminal iidentification is can be with the mark of unique mark terminal, such as can be MAC Address of terminal etc. or terminal
Label etc..
The first security password that user is inputted and terminal iidentification are encrypted terminal, and safe by encrypted first
Password and terminal iidentification are uploaded to server, to which server can be by first security password, terminal iidentification and using journey
The account password of sequence logon account is associated storage, close to safety input by user when checking files on each of customers again for user
Code is verified.
S212:When the successful response results of the upload for receiving server return, the value of default mark is changed, and show
Files on each of customers.
Specifically, terminal iidentification, security password are uploaded to server by terminal, and server is by terminal iidentification, security password
And the account identification of the account of current login application program is associated storage, and after storing successfully safety is returned to terminal
Password uploads successful response results, and terminal changes the value of default mark, i.e., by default mark after receiving the response results
Value be set as indicating local being set security password, and after the completion of change, display files on each of customers.Optionally,
Two threads may be used to be handled in terminal, such as first thread, by the value of the default mark of change, the second thread is for showing
Show files on each of customers.
And if when security password uploads unsuccessful, terminal can prompt this security password setup failed, prompt user
It resets.
Above-mentioned files on each of customers processing method, not only application program is there are login password, user's shelves inside application program
Case is also provided with special password, therefore even if user can be with login application program, in the first safety for not knowing files on each of customers
When password, the files on each of customers can not be also got, ensure that files on each of customers safety, and security password ought be set locally
When, terminal meeting active warning user carries out the setting of the first security password, to ensure that security password is arranged in user in time,
It is not in the files on each of customers for being not provided with security password.
The files on each of customers processing method can also include in one of the embodiments,:When security password was locally located
When, the number of input security password mistake in preset time period is obtained, and judge number whether more than the first preset value;Work as number
When being less than the first preset value, display security password verifies interface;The second peace that interface receives input is verified by security password
Full password;Terminal iidentification is obtained, and password authentification instruction, password authentification instruction are generated according to terminal iidentification and the second security password
It is whether correct according to terminal iidentification the second security password of corresponding third security password verification to be used to indicate server;Receive service
The verification result for the second security password that device returns;When verification result indicates that the second security password is proved to be successful, display
Files on each of customers.
Specifically, the present embodiment focuses on password authentification, when default mark indicates to be locally located security password, eventually
End can obtain the number of input security password mistake in preset time period, such as terminal can get user in one day and input
The number of security password mistake, terminal simultaneously judge the number whether more than the first preset value, for example whether (being only herein more than 5
For example, can also be other first preset values in other embodiments, it is not specifically limited herein) etc., when user is defeated
When entering the number of security password mistake and being less than the first preset value, display security password verifies interface, as shown in figure 4, user can
To input the second security password in security password verification interface, to which terminal can get security password verification interface
Second security password of middle input, and terminal iidentification is obtained, to which terminal iidentification and the second security password are encrypted terminal,
And password authentification instruction is generated according to encrypted terminal iidentification and the second security password, and password authentification instruction is sent to
Server after server receives the encrypted terminal iidentification and the second security password, is decrypted to obtain terminal mark first
Know and its corresponding security password is inquired by terminal iidentification first with the second security password, such as server, then passes through application
The account of program chooses corresponding third security password from the security password inquired, and the second safety that terminal is sent is close
Code is compared with third security password, if the second security password is identical with third security password, server is returned to terminal
The correct verification result of security password, if the second security password and third security password differ, server is returned to terminal
The verification result of security password mistake.
Terminal receive server return verification result after, if the verification result indicate the second security password verification at
When work(, files on each of customers is shown, to which user can check corresponding files on each of customers.If verification result indicates the second security password
When authentication failed, terminal obtains user in preset time period and inputs the residue degree of security password mistake, such as gets user
First number of the security password mistake inputted, and obtain the security password mistake that the admissible user of terminal can input
Second number, input security password mistake according to subtracting first number by second number and obtaining user in preset time period
Residue degree, if the residue degree of user's input security password mistake is less than or equal to 0 in the preset time period, terminal output is close
The prompt of code input error, and show in preset time period without input chance.If user inputs safety in the preset time period
The residue degree of password mistake is more than 0, and the residue degree of user's input security password mistake is shown in preset time period, with
The still remaining security password of user is prompted to input number.Similarly, when whether above judging number more than the first preset value
It is obtaining the result is that number is more than the first preset value, the prompt of terminal output password input error, and showing in preset time period
Without input chance.
In above-described embodiment, the account identification of security password, terminal iidentification and application program account is associated storage,
Different terminals is bundled with different security passwords, may further ensure that the safety of files on each of customers.
The files on each of customers processing method can also include in one of the embodiments,:When verifying boundary by security password
What face received is when forgetting Password instruction, to judge whether user contact details corresponding with application program;When presence and answer
When user contact details corresponding with program, display identifying code obtains interface;Identifying code acquisition instruction, verification are sent to server
Code acquisition instruction is used to indicate server and returns to identifying code to user terminal corresponding with user contact details;It is obtained by identifying code
It takes interface to receive the identifying code of input, and the identifying code inputted is sent to server and is verified;When server returns to institute
When the response message that the identifying code of input is proved to be successful, continue to pop up security password setting interface.
Specifically, the present embodiment terminal is the modification of security password, can be close by safety when user forgets Password
Code verification interface, which receives, to forget Password instruction, " forgetting Password " as shown in Figure 4, terminal it is first determined whether in the presence of with using journey
Sequence corresponding user contact details, such as cell-phone number, mailbox etc., if it does, display identifying code obtains interface, wherein user joins
It is mode to be directly displayed at identifying code and obtain interface, then user clicks " identifying code acquisitions " button, so that terminal can be with
Calling interface sends identifying code to server and obtains request, and server contacts after receiving identifying code and obtaining request to user
The corresponding user terminal of mode sends corresponding identifying code, and user terminal calling interface gets the identifying code of server transmission,
If identifying code obtains successfully, accessed identifying code is input to the corresponding position that identifying code obtains interface by user, such as
Fruit identifying code obtains failure, and terminal can show miscue, and user is prompted to reacquire identifying code.Terminal will receive
Identifying code is sent to server and is verified, and server is inquired according to the account identification of terminal iidentification and the account of application program
To its generation identifying code, then with terminal send identifying code be compared, if the two is identical, indicate identifying code verification at
Work(, no identifying code authentication failed, if identifying code authentication failed, terminal shows the information of identifying code authentication failed, if verification
Code is proved to be successful, and terminal pops up security password and interface is arranged, as shown in Figure 3.
When identifying code is by server authentication success, terminal pops up security password and interface is arranged, and user passes through the safety
Password is arranged interface and inputs the first security password, and terminal uploads after being packaged the first security password input by user and terminal iidentification
To server, if uploaded successfully, default mark is revised as indicating locally to be set security password, is lost if uploaded
It loses, user is prompted to reset security password.
In addition, if user contact details are not present, terminal shows that user contact details bind interface, is used for user bound
Contact method, such as can show that cell-phone number binds interface, it is used for the cell-phone number of user bound.
Optionally, during above-mentioned security password is verified, terminal can also upload current geographic position information to clothes
It is engaged in device, if server judges current geographic position information and the last current geographic position information for checking files on each of customers not phase
Meanwhile server sends the information for suggesting modification security password to terminal, and security password is changed when terminal receives the suggestion
When information, which is shown after application program launching, in order to which modification safety is close as procedure described above in time by user
Code.
In above-described embodiment, when user needs to change security password, interface input can be verified by security password and is forgotten
Remember cipher instruction, carries out security password modification further according to above-mentioned steps, thereby may be ensured that the time update of security password, so as to
In the safety for ensureing files on each of customers.
The setting of security password can also be by being carried out in setting options in one of the embodiments, to root
After starting corresponding application program according to application start instruction, can also include:The setting instruction for receiving input, according to setting
It sets instruction and shows user setup interface;Inquiry default mark corresponding with application program;It is default to identify whether to identify local
Security password was set;Judge locally whether security password was set according to default mark, and ought locally be set safe
Password, display security password reset interface;The instruction that forgets Password of input is received, and continues to determine whether to exist and application program
Corresponding user contact details.
Specifically, the setting of security password can also be that user is opening application program by what is carried out in setting options
Afterwards, click " I " option, " setting " then is selected, reselection " security password setting " button, terminal is sentenced according to default mark
Whether disconnected user is locally already provided with security password, if so, display security password resets interface, and clicks under security password
Forget security password option, then terminal judges whether corresponding with application program account user connection from server first
It is mode, such as cell-phone number, if it does, display identifying code obtains interface, wherein user contact details can be directly displayed at
Identifying code obtains interface, and then user clicks " identifying code acquisition " button, to which terminal can be sent with calling interface to server
Identifying code obtains request, and server is after receiving identifying code and obtaining request, to the corresponding user terminal hair of user contact details
It send corresponding identifying code, user terminal calling interface to get the identifying code of server transmission, if identifying code obtains successfully, uses
Accessed identifying code is input to the corresponding position that identifying code obtains interface by family, if identifying code obtains failure, terminal
It can show miscue, and user is prompted to reacquire identifying code.Terminal by the identifying code received be sent to server into
Row verification, server inquire the identifying code of its generation according to the account identification of terminal iidentification and the account of application program, so
The identifying code sent afterwards with terminal is compared, if the two is identical, indicates that identifying code is proved to be successful, and no identifying code verification is lost
It loses, if identifying code authentication failed, terminal shows the information of identifying code authentication failed, if identifying code is proved to be successful, terminal bullet
Go out security password setting interface, as shown in Figure 3.
When identifying code is by server authentication success, terminal pops up security password and interface is arranged, and user passes through the safety
Password is arranged interface and inputs the first security password, and terminal uploads after being packaged the first security password input by user and terminal iidentification
To server, if uploaded successfully, default mark is revised as indicating locally to be set security password, is lost if uploaded
It loses, user is prompted to reset security password.
In addition, if user contact details are not present, terminal shows that user contact details bind interface, is used for user bound
Contact method, such as can show that cell-phone number binds interface, it is used for the cell-phone number of user bound.
Optionally, during above-mentioned security password is verified, terminal can also upload current geographic position information to clothes
It is engaged in device, if server judges current geographic position information and the last current geographic position information for checking files on each of customers not phase
Meanwhile server sends the information for suggesting modification security password to terminal, and security password is changed when terminal receives the suggestion
When information, which is shown after application program launching, in order to which modification safety is close as procedure described above in time by user
Code.
It, can be close in safety by being carried out in setting options when user needs to change security password in above-described embodiment
Code resetting interface inputs the instruction that forgets Password, and security password modification is carried out further according to above-mentioned steps, thereby may be ensured that safety is close
The time update of code, in order to ensure the safety of files on each of customers.
Above-mentioned files on each of customers processing method can also include in one of the embodiments,:The setting instruction of input is received,
It is instructed according to setting and shows user setup interface;Inquiry default mark corresponding with application program;It is default to identify to identify this
Whether ground was arranged security password;Judge whether security password locally was set according to default mark;When peace was not arranged for local
Full password continues to pop up security password setting interface.
Specifically, user is after opening app, click " I " option, " setting " then is selected, reselection " security password
The page is set ", terminal judges whether user is locally already provided with security password according to default mark, is used if not provided, receiving
After the instruction of setting security password is clicked at family, terminal pops up security password and interface is arranged, and boundary is arranged by the security password in user
Face inputs security password, and terminal is uploaded to server after encrypting the security password, and when uploading successfully, modification is default to be identified as
Security password was locally located.
The setting of security password can also be that user clicks after opening application program by what is carried out in setting options
" I " option, " setting " then is selected, reselection " security password setting " button, terminal judges user's sheet according to default mark
Whether ground is already provided with security password, if local be not provided with security password, pop-up security password is arranged interface, such as schemes
Shown in 3, user inputs the first security password in the input frame that interface is arranged in security password.Terminal user is inputted first
Security password and terminal iidentification are encrypted, and encrypted first security password and terminal iidentification are uploaded to server, clothes
The account identification of the account of terminal iidentification, security password and current login application program is associated storage by business device, and
Security password being returned to terminal after storing successfully and uploading successful response results, terminal is after receiving the response results, change
The value of default mark, and after the completion of having changed, show files on each of customers.Optionally, two threads may be used to carry out in terminal
Processing, such as first thread, by the value of the default mark of change, the second thread is for showing files on each of customers.
In above-described embodiment, user can also be carried out by setting options, when security password locally is not arranged, prompt to use
Family be arranged security password, even if to user can with login application program, when not knowing the first security password of files on each of customers,
It can not also get the files on each of customers, ensure that files on each of customers safety.
Specifically, files on each of customers processing method mainly include two processing threads, first thread be user click be to answer
With the files on each of customers button in program, the setting, verification and modification etc. for carrying out security password by clicking files on each of customers button,
What the second thread was that user clicks is setting button, by the way that button is arranged setting, the change etc. that carry out security password.
For may include according to the user's choice in first thread security password setting procedure, security password verification
The modification process of flow and security password.
The setting procedure of security password is when terminal receives files on each of customers input by user and checks instruction, and inquiry is default
Mark, when default mark indicates that security password locally was not arranged, into security password setting procedure, terminal pop-up safety is close
Code setting interface is arranged interface by the security password and receives the first security password input by user, and terminal is close by the first safety
Upload server after code and terminal iidentification encryption, when the successful response results of the upload for receiving server return, change is pre-
It is marked with the value known, and accordingly shows files on each of customers.When default mark indicates locally to be set security password, receives and use
Family input next instruction, when next instruction input by user indicate be forget Password instruction when, as security password change flow
Journey, first terminal judge whether user contact details corresponding with application program;When in the presence of use corresponding with application program
When the contact method of family, display identifying code obtains interface;Identifying code acquisition instruction is sent to server, identifying code acquisition instruction is used for
Indicate that server returns to identifying code to user terminal corresponding with user contact details;Interface, which is obtained, by identifying code receives input
Identifying code, and the identifying code inputted is sent to server and is verified;It is tested when server returns to inputted identifying code
When demonstrate,proving successful response message, continues to pop up security password setting interface, carry out the setting of security password.Under input by user
What one instruction indicated is security password input by user, obtains the number of input security password mistake in preset time period, and is sentenced
Whether disconnected number is more than the first preset value;When number is less than the first preset value, display security password verifies interface;Pass through peace
Full password authentification interface receives the second security password of input;Terminal iidentification is obtained, and close according to terminal iidentification and the second safety
Code generates password authentification instruction, and password authentification instruction is used to indicate server and is tested according to the corresponding third security password of terminal iidentification
Whether correct demonstrate,prove the second security password;Receive the verification result for the second security password that server returns;Work as verification result
When indicating that the second security password is proved to be successful, files on each of customers is shown.
For may include security password resetting flow and security password setting stream according to the user's choice in the second thread
Journey:
When user selects setting options, default mark is inquired, security password was not set when default mark indicates local
When, into security password setting procedure, terminal pops up security password and interface is arranged, and interface, which is arranged, by the security password receives use
First security password of family input, upload server after terminal encrypts the first security password and terminal iidentification, takes when receiving
When the successful response results of upload that device returns of being engaged in, the value of default mark is changed, and accordingly show files on each of customers.When pre- bidding
When knowledge indicates locally to be set security password, next instruction input by user is received, when next instruction table input by user
What is shown is when forgetting Password instruction, and such as security password modification process, terminal first judges whether corresponding with application program
User contact details;When there are user contact details corresponding with application program, display identifying code obtains interface;To server
Identifying code acquisition instruction is sent, identifying code acquisition instruction is used to indicate server to user terminal corresponding with user contact details
Return to identifying code;Interface is obtained by identifying code and receives the identifying code of input, and the identifying code inputted is sent to server
It is verified;When server returns to the response message that inputted identifying code is proved to be successful, continue to pop up security password setting
Interface carries out the setting of security password
It should be understood that although each step in the flow chart of Fig. 2 is shown successively according to the instruction of arrow, this
A little steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2
Step may include that either these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps
It completes, but can execute at different times, the execution sequence in these sub-steps or stage is also not necessarily to be carried out successively,
But it can either the sub-step of other steps or at least part in stage execute in turn or alternately with other steps.
In one embodiment, as shown in figure 5, providing a kind of files on each of customers processing unit, including:Starting module 100,
First enquiry module 200, the first judgment module 300, the first pop-up module 400, uploading module 500 and the first display module 600,
Wherein:
Starting module 100, for when receiving the application start instruction of input, according to application start instruction
Start corresponding application program.
First enquiry module 200 checks instruction for that ought receive files on each of customers, inquires corresponding with application program default
Mark;Whether default mark was locally arranged security password to identify.
First judgment module 300, for judging locally whether security password was arranged according to default mark.
First pop-up module 400, for when security password locally was not arranged, interface to be arranged in pop-up security password.
Uploading module 500 obtains terminal mark for the first security password that interface receives input to be arranged by security password
Know, and server will be uploaded to after the first security password and terminal iidentification encryption.
First display module 600, for when receiving the successful response results of upload of server return, change to be default
The value of mark, and show files on each of customers.
The files on each of customers processing unit can also include in one of the embodiments,:
Second judgment module, for when security password was locally located, obtaining and inputting security password in preset time period
The number of mistake, and judge number whether more than the first preset value.
Security password verifies interface display module, for when number is less than the first preset value, display security password to be tested
Demonstrate,prove interface.
First receiving module, for verifying the second security password that interface receives input by security password.
First authentication module for obtaining terminal iidentification, and generates password according to terminal iidentification and the second security password and tests
Card instruction, it is close according to corresponding the second safety of third security password verification of terminal iidentification that password authentification instruction is used to indicate server
Whether code is correct.
Second receiving module, the verification result for the second security password for receiving server return.
Second display module, for when verification result indicates that the second security password is proved to be successful, showing files on each of customers.
The files on each of customers processing unit can also include in one of the embodiments,:
Third judgment module, for when verify interface reception by security password is to forget Password instruction, judgement to be
It is no to there are user contact details corresponding with application program.
Identifying code obtains interface display module, for when there are user contact details corresponding with application program, showing
Identifying code obtains interface.
Identifying code acquisition module, for sending identifying code acquisition instruction to server, identifying code acquisition instruction is used to indicate
Server returns to identifying code to user terminal corresponding with user contact details.
Second authentication module, for obtaining the identifying code that interface receives input, and the verification that will be inputted by identifying code
Code is sent to server and is verified.
Second pop-up module, for when server returns to the response message that inputted identifying code is proved to be successful, continuing
It pops up security password and interface is set.
The files on each of customers processing unit can also include in one of the embodiments,:
Third receiving module, the setting instruction for receiving input, instructs according to setting and shows user setup interface.
Second enquiry module, for inquiring default mark corresponding with application program;Preset mark is locally to identify
It is no that security password was set.
Security password resets interface display module, for judging locally whether security password was arranged according to default mark,
And it ought be locally set security password, display security password resets interface.
4th receiving module, the instruction that forgets Password for receiving input, and continue to determine whether to exist and application program
Corresponding user contact details.
The files on each of customers processing unit can also include in one of the embodiments,:
5th receiving module is used for third receiving module, the setting instruction for receiving input, according to setting instruction display
User setup interface.
Third enquiry module, for inquiring default mark corresponding with application program;Preset mark is locally to identify
It is no that security password was set.
4th judgment module, for judging locally whether security password was arranged according to default mark.
Third pop-up module continues to pop up security password setting interface for security password ought not to be arranged locally.
Specific about files on each of customers processing unit limits the limit that may refer to above for files on each of customers processing method
Fixed, details are not described herein.Modules in above-mentioned files on each of customers processing unit can fully or partially through software, hardware and its
It combines to realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also
It is stored in a software form in the memory in computer equipment, in order to which processor calls the above modules of execution corresponding
Operation.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure
Figure can be as shown in Figure 6.The computer equipment includes the processor connected by system bus, memory, network interface, display
Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited
Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey
Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The network interface of machine equipment is used to communicate by network connection with external terminal.When the computer program is executed by processor with
Realize a kind of files on each of customers processing method.The display screen of the computer equipment can be that liquid crystal display or electric ink are shown
Screen, the input unit of the computer equipment can be the touch layer covered on display screen, can also be on computer equipment shell
Button, trace ball or the Trackpad of setting can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 6, is only tied with the relevant part of application scheme
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
May include either combining certain components than more or fewer components as shown in the figure or being arranged with different components.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor realize following steps when executing computer program:When the application program launching for receiving input refers to
When enabling, corresponding application program is started according to application start instruction;Instruction is checked when receiving files on each of customers, is inquired and is answered
With the corresponding default mark of program;Whether default mark was locally arranged security password to identify;Judged according to default mark
It is local that whether security password was set;When security password locally was not arranged, interface is arranged in pop-up security password;Pass through safety
The first security password that interface receives input is arranged in password, obtains terminal iidentification, and the first security password and terminal iidentification are added
Server is uploaded to after close;When the successful response results of the upload for receiving server return, the value of default mark is changed, and
Show files on each of customers.
In one embodiment, following steps are also realized when processor executes computer program:It is safe when being locally located
When password, the number of input security password mistake in preset time period is obtained, and judges number whether more than the first preset value;When
When number is less than the first preset value, display security password verifies interface;Verify that interface receives input by security password the
Two security passwords;Terminal iidentification is obtained, and password authentification instruction, password authentification are generated according to terminal iidentification and the second security password
Whether instruction is used to indicate server correct according to terminal iidentification the second security password of corresponding third security password verification;It receives
The verification result for the second security password that server returns;When verification result indicates that the second security password is proved to be successful,
Show files on each of customers.
In one embodiment, following steps are also realized when processor executes computer program:It is tested when by security password
What card interface received is when forgetting Password instruction, to judge whether user contact details corresponding with application program;Work as presence
When user contact details corresponding with application program, display identifying code obtains interface;Identifying code acquisition instruction is sent to server,
Identifying code acquisition instruction is used to indicate server and returns to identifying code to user terminal corresponding with user contact details;Pass through verification
Code obtains interface and receives the identifying code of input, and the identifying code inputted is sent to server and is verified;When server returns
When returning the response message that inputted identifying code is proved to be successful, continue to pop up security password setting interface.
In one embodiment, that is realized when processor execution computer program starts according to application start instruction
After corresponding application program, can also include:The setting instruction for receiving input, instructs according to setting and shows user setting circle
Face;Inquiry default mark corresponding with application program;Whether default mark was locally arranged security password to identify;According to pre-
Bidding, which is known, judges security password whether was locally arranged, and ought locally be set security password, display security password resetting
Interface;The instruction that forgets Password of input is received, and continues to determine whether there are user contact details corresponding with application program.
In one embodiment, following steps are also realized when processor executes computer program:The setting for receiving input refers to
It enables, is instructed according to setting and show user setup interface;Inquiry default mark corresponding with application program;It is default to identify to identify
It is local that whether security password was set;Judge whether security password locally was set according to default mark;It was not arranged when locally
Security password continues to pop up security password setting interface.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes following steps when being executed by processor:When receiving the application start instruction of input, according to using journey
Sequence enabled instruction starts corresponding application program;Check that instruction, inquiry are corresponding with application program pre- when receiving files on each of customers
Bidding is known;Whether default mark was locally arranged security password to identify;Local whether be arranged judged according to default mark
Security password;When security password locally was not arranged, interface is arranged in pop-up security password;Interface is arranged by security password to connect
The first security password of input is received, obtains terminal iidentification, and service will be uploaded to after the first security password and terminal iidentification encryption
Device;When the successful response results of the upload for receiving server return, the value of default mark is changed, and show files on each of customers.
In one embodiment, following steps are also realized when computer program is executed by processor:When peace was locally located
When full password, the number of input security password mistake in preset time period is obtained, and judges number whether more than the first preset value;
When number is less than the first preset value, display security password verifies interface;Interface, which is verified, by security password receives input
Second security password;Terminal iidentification is obtained, and password authentification instruction is generated according to terminal iidentification and the second security password, password is tested
Whether card instruction is used to indicate server correct according to terminal iidentification the second security password of corresponding third security password verification;It connects
Receive the verification result for the second security password that server returns;When verification result indicates that the second security password is proved to be successful
When, show files on each of customers.
In one embodiment, following steps are also realized when computer program is executed by processor:When passing through security password
What verification interface received is when forgetting Password instruction, to judge whether user contact details corresponding with application program;When depositing
In user contact details corresponding with application program, display identifying code obtains interface;Identifying code acquisition is sent to server to refer to
It enables, identifying code acquisition instruction is used to indicate server and returns to identifying code to user terminal corresponding with user contact details;Pass through
Identifying code obtains interface and receives the identifying code of input, and the identifying code inputted is sent to server and is verified;Work as service
When device returns to the response message that inputted identifying code is proved to be successful, continue to pop up security password setting interface.
In one embodiment, that is realized when computer program is executed by processor opens according to application start instruction
After moving corresponding application program, can also include:The setting instruction for receiving input, instructs according to setting and shows user setting circle
Face;Inquiry default mark corresponding with application program;Whether default mark was locally arranged security password to identify;According to pre-
Bidding, which is known, judges security password whether was locally arranged, and ought locally be set security password, display security password resetting
Interface;The instruction that forgets Password of input is received, and continues to determine whether there are user contact details corresponding with application program.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive the setting of input
Instruction instructs according to setting and shows user setup interface;Inquiry default mark corresponding with application program;It is default to identify to mark
Know and whether security password locally was set;Judge whether security password locally was set according to default mark;It is not arranged when locally
Security password is crossed, continues to pop up security password setting interface.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein,
Any reference to memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield is all considered to be the range of this specification record.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the protection domain of the application patent should be determined by the appended claims.
Claims (10)
1. a kind of files on each of customers processing method, the method includes:
When receiving the application start instruction of input, started according to the application start instruction corresponding using journey
Sequence;
Instruction is checked when receiving files on each of customers, inquires default mark corresponding with the application program;The default mark is used
Whether security password was set so that mark is local;
Judge whether security password locally was set according to the default mark;
When security password locally was not arranged, interface is arranged in pop-up security password;
The first security password that interface receives input is set by the security password, obtains terminal iidentification, and by described first
It is uploaded to server after security password and terminal iidentification encryption;
When the successful response results of the upload for receiving the server return, the value of the default mark is changed, and show
The files on each of customers.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
When security password was locally located, the number of input security password mistake in preset time period is obtained, and described in judgement
Whether number is more than the first preset value;
When the number is less than first preset value, display security password verifies interface;
The second security password that interface receives input is verified by the security password;
Terminal iidentification is obtained, and password authentification instruction is generated according to the terminal iidentification and second security password, it is described close
Code verification instruction is used to indicate the server according to the corresponding third security password verification of the terminal iidentification second peace
Whether full password is correct;
Receive the verification result for second security password that the server returns;
When the verification result indicates that second security password is proved to be successful, the files on each of customers is shown.
3. according to the method described in claim 2, it is characterized in that, the method further includes:
When verify interface reception by the security password is to forget Password instruction, judge whether to apply journey with described
The corresponding user contact details of sequence;
When there are user contact details corresponding with the application program, display identifying code obtains interface;
To the server send identifying code acquisition instruction, the identifying code acquisition instruction be used to indicate the server to institute
It states the corresponding user terminal of user contact details and returns to identifying code;
Interface is obtained by the identifying code and receives the identifying code of input, and the identifying code inputted is sent to the server
It is verified;
When the server returns to the response message that inputted identifying code is proved to be successful, continue to pop up security password setting circle
Face.
4. according to the method described in claim 3, it is characterized in that, described started according to the application start instruction corresponds to
Application program after, further include:
The setting instruction for receiving input, instructs according to the setting and shows user setup interface;
Inquiry default mark corresponding with the application program;Local that safety whether was arranged was close to identify for the default mark
Code;
Judge locally whether security password was set according to the default mark, and ought locally be set security password, shows
Show that security password resets interface;
The instruction that forgets Password of input is received, and continues to determine whether there is user's correspondent party corresponding with the application program
Formula.
5. according to the method described in claims 1 to 3 any one, which is characterized in that the method further includes:
The setting instruction for receiving input shows the user setup interface according to setting instruction;
Inquiry default mark corresponding with the application program;Local that safety whether was arranged was close to identify for the default mark
Code;
Judge whether security password locally was set according to the default mark;
When security password was not locally arranged, continue to pop up security password setting interface.
6. a kind of files on each of customers processing unit, which is characterized in that described device includes:
Starting module, for when receiving the application start instruction of input, being opened according to the application start instruction
Move corresponding application program;
First enquiry module checks instruction for that ought receive files on each of customers, inquires pre- bidding corresponding with the application program
Know;Whether the default mark was locally arranged security password to identify;
First judgment module, for judging security password, the default mark whether was locally arranged according to the default mark
Whether security password locally was set to identify;
First pop-up module, for when security password locally was not arranged, interface to be arranged in pop-up security password;
Uploading module receives the first security password inputted for interface to be arranged by the security password, obtains terminal iidentification,
And server will be uploaded to after first security password and terminal iidentification encryption;
First display module, for when receiving the successful response results of upload that the server returns, change to be described pre-
It is marked with the value known, and shows the files on each of customers.
7. device according to claim 6, which is characterized in that described device further includes:
Second judgment module, for when security password was locally located, obtaining and inputting security password mistake in preset time period
Number, and judge the number whether more than the first preset value;
Security password verifies interface display module, for when the number is less than first preset value, display safety to be close
Code verification interface;
First receiving module, for verifying the second security password that interface receives input by the security password;
First authentication module, for obtaining terminal iidentification, and it is close according to the terminal iidentification and second security password generation
Code verification instruction, it is close safely according to the corresponding third of the terminal iidentification that the password authentification instruction is used to indicate the server
Whether code verifies second security password correct;
Second receiving module, the verification result for second security password returned for receiving the server;
Second display module, for when the verification result indicates that second security password is proved to be successful, showing the use
Family archives.
8. device according to claim 6, which is characterized in that described device further includes:
Third judgment module, for when verify interface reception by the security password is to forget Password instruction, judgement to be
It is no to there are user contact details corresponding with the application program;
Identifying code obtains interface display module, for when there are user contact details corresponding with the application program, showing
Identifying code obtains interface;
Identifying code acquisition module, for sending identifying code acquisition instruction to the server, the identifying code acquisition instruction is used for
Indicate that the server returns to identifying code to user terminal corresponding with the user contact details;
Second authentication module, for obtaining the identifying code that interface receives input, and the verification that will be inputted by the identifying code
Code is sent to the server and is verified;
Second pop-up module, for when the server returns to the response message that inputted identifying code is proved to be successful, continuing
It pops up security password and interface is set.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In when the processor executes the computer program the step of any one of realization claim 1 to 5 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claim 1 to 5 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810546441.XA CN108763888B (en) | 2018-05-31 | 2018-05-31 | User profile processing method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810546441.XA CN108763888B (en) | 2018-05-31 | 2018-05-31 | User profile processing method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108763888A true CN108763888A (en) | 2018-11-06 |
CN108763888B CN108763888B (en) | 2022-06-07 |
Family
ID=64001066
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810546441.XA Active CN108763888B (en) | 2018-05-31 | 2018-05-31 | User profile processing method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108763888B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110298184A (en) * | 2019-06-28 | 2019-10-01 | 维沃移动通信有限公司 | Information processing method and terminal device |
CN111382422A (en) * | 2018-12-28 | 2020-07-07 | 卡巴斯基实验室股份制公司 | System and method for changing password of account record under threat of illegal access to user data |
CN111859455A (en) * | 2020-07-28 | 2020-10-30 | 山东健康医疗大数据有限公司 | Privacy security protection method for accessing health files by APP terminal |
CN117668936A (en) * | 2024-01-31 | 2024-03-08 | 荣耀终端有限公司 | Data processing method and related device |
CN118102293A (en) * | 2024-04-29 | 2024-05-28 | 浙江华昱欣科技有限公司 | Wireless device password setting method, wireless device password setting device, computer device and storage medium |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827360A (en) * | 2010-04-09 | 2010-09-08 | 中兴通讯股份有限公司 | Method and device for setting communication terminal graphical passwords |
CN102346831A (en) * | 2011-10-31 | 2012-02-08 | 广东欧珀移动通信有限公司 | Handheld device privacy encryption protection method of Android operating system |
CN102789555A (en) * | 2011-05-17 | 2012-11-21 | 腾讯科技(深圳)有限公司 | Method and system for safely moving file |
WO2013029428A1 (en) * | 2011-08-29 | 2013-03-07 | 惠州Tcl移动通信有限公司 | Mobile terminal and application program login method thereof |
CN103793663A (en) * | 2013-12-26 | 2014-05-14 | 北京奇虎科技有限公司 | Folder locking and unlocking methods and folder locking and unlocking devices |
CN103856472A (en) * | 2012-12-06 | 2014-06-11 | 阿里巴巴集团控股有限公司 | Account login method and device |
CN104486354A (en) * | 2014-12-30 | 2015-04-01 | 飞天诚信科技股份有限公司 | Method for retrieving passwords in secure mode |
CN104639533A (en) * | 2014-12-30 | 2015-05-20 | 小米科技有限责任公司 | Safety control method and device based on terminal |
CN104796263A (en) * | 2015-04-29 | 2015-07-22 | 百度在线网络技术(北京)有限公司 | User identity authentication method and device |
CN105678186A (en) * | 2016-01-05 | 2016-06-15 | 上海卓易科技股份有限公司 | Information encryption method and device |
CN106203061A (en) * | 2016-06-27 | 2016-12-07 | 维沃移动通信有限公司 | The encryption method of a kind of application program and mobile terminal |
CN106548050A (en) * | 2016-10-21 | 2017-03-29 | 北京小米移动软件有限公司 | Using startup method and device |
CN106611112A (en) * | 2016-12-14 | 2017-05-03 | 北京小米移动软件有限公司 | Application program safe processing method, device and equipment |
CN108076056A (en) * | 2017-12-12 | 2018-05-25 | 北京小米移动软件有限公司 | Cloud server login method and device |
-
2018
- 2018-05-31 CN CN201810546441.XA patent/CN108763888B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827360A (en) * | 2010-04-09 | 2010-09-08 | 中兴通讯股份有限公司 | Method and device for setting communication terminal graphical passwords |
CN102789555A (en) * | 2011-05-17 | 2012-11-21 | 腾讯科技(深圳)有限公司 | Method and system for safely moving file |
WO2013029428A1 (en) * | 2011-08-29 | 2013-03-07 | 惠州Tcl移动通信有限公司 | Mobile terminal and application program login method thereof |
US20140013424A1 (en) * | 2011-08-29 | 2014-01-09 | Zhonglei Lv | Mobile terminal and application program login method thereof |
CN102346831A (en) * | 2011-10-31 | 2012-02-08 | 广东欧珀移动通信有限公司 | Handheld device privacy encryption protection method of Android operating system |
CN103856472A (en) * | 2012-12-06 | 2014-06-11 | 阿里巴巴集团控股有限公司 | Account login method and device |
CN103793663A (en) * | 2013-12-26 | 2014-05-14 | 北京奇虎科技有限公司 | Folder locking and unlocking methods and folder locking and unlocking devices |
CN104486354A (en) * | 2014-12-30 | 2015-04-01 | 飞天诚信科技股份有限公司 | Method for retrieving passwords in secure mode |
CN104639533A (en) * | 2014-12-30 | 2015-05-20 | 小米科技有限责任公司 | Safety control method and device based on terminal |
CN104796263A (en) * | 2015-04-29 | 2015-07-22 | 百度在线网络技术(北京)有限公司 | User identity authentication method and device |
CN105678186A (en) * | 2016-01-05 | 2016-06-15 | 上海卓易科技股份有限公司 | Information encryption method and device |
CN106203061A (en) * | 2016-06-27 | 2016-12-07 | 维沃移动通信有限公司 | The encryption method of a kind of application program and mobile terminal |
CN106548050A (en) * | 2016-10-21 | 2017-03-29 | 北京小米移动软件有限公司 | Using startup method and device |
CN106611112A (en) * | 2016-12-14 | 2017-05-03 | 北京小米移动软件有限公司 | Application program safe processing method, device and equipment |
CN108076056A (en) * | 2017-12-12 | 2018-05-25 | 北京小米移动软件有限公司 | Cloud server login method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111382422A (en) * | 2018-12-28 | 2020-07-07 | 卡巴斯基实验室股份制公司 | System and method for changing password of account record under threat of illegal access to user data |
CN111382422B (en) * | 2018-12-28 | 2023-08-11 | 卡巴斯基实验室股份制公司 | System and method for changing passwords of account records under threat of illegally accessing user data |
CN110298184A (en) * | 2019-06-28 | 2019-10-01 | 维沃移动通信有限公司 | Information processing method and terminal device |
CN111859455A (en) * | 2020-07-28 | 2020-10-30 | 山东健康医疗大数据有限公司 | Privacy security protection method for accessing health files by APP terminal |
CN117668936A (en) * | 2024-01-31 | 2024-03-08 | 荣耀终端有限公司 | Data processing method and related device |
CN118102293A (en) * | 2024-04-29 | 2024-05-28 | 浙江华昱欣科技有限公司 | Wireless device password setting method, wireless device password setting device, computer device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108763888B (en) | 2022-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108763888A (en) | Files on each of customers processing method, device, computer equipment and storage medium | |
US10223520B2 (en) | System and method for integrating two-factor authentication in a device | |
US11736468B2 (en) | Enhanced authorization | |
US8387119B2 (en) | Secure application network | |
CN110362308A (en) | Page generation method, device, computer equipment and storage medium | |
CN107864144A (en) | Obtain method and device, computer installation and the storage medium of dynamic password | |
WO2015081777A1 (en) | Method and device for encrypting information of an application | |
CN109669859A (en) | Service test method, device, computer equipment and storage medium | |
CN108076056A (en) | Cloud server login method and device | |
CN106503506B (en) | A kind of information display method and electronic equipment | |
CN109117616B (en) | Verification method and device, electronic equipment and computer readable storage medium | |
CN109299010A (en) | Mock test method, device, computer equipment and storage medium | |
CN109829277A (en) | Terminal unlock method, device, computer equipment and storage medium | |
CN109325666A (en) | Service processing method, device, computer equipment and storage medium | |
CN111131208B (en) | Third-party service application login method and device, computer equipment and storage medium | |
CN111770132B (en) | Work order downloading method, work order uploading method, device and computer equipment | |
CN110222492B (en) | System switching method and device, computer equipment and computer readable storage medium | |
US20230205861A1 (en) | Method and system for obtaining consent to perform an operation | |
CN109543396B (en) | Task execution method, device, computer equipment and storage medium | |
CN109858583A (en) | Electric power instrument borrows information processing method, borrowing method and device | |
CN109828955A (en) | Document processing method, device, computer equipment and storage medium | |
CN114244519A (en) | Password verification method and device, computer equipment and storage medium | |
CN112989379A (en) | Key protection implementation method and device and electronic equipment | |
CA3091380A1 (en) | Method and system for obtaining consent to perform an operation | |
CN110493785A (en) | A kind of login method of mobile client, SIM card and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |