CN108763888A - Files on each of customers processing method, device, computer equipment and storage medium - Google Patents

Files on each of customers processing method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108763888A
CN108763888A CN201810546441.XA CN201810546441A CN108763888A CN 108763888 A CN108763888 A CN 108763888A CN 201810546441 A CN201810546441 A CN 201810546441A CN 108763888 A CN108763888 A CN 108763888A
Authority
CN
China
Prior art keywords
security password
password
interface
instruction
identifying code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810546441.XA
Other languages
Chinese (zh)
Other versions
CN108763888B (en
Inventor
马会阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Health Cloud Co Ltd
Ping An Healthcare Technology Co Ltd
Original Assignee
Ping An Health Cloud Co Ltd
Ping An Healthcare Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Health Cloud Co Ltd, Ping An Healthcare Technology Co Ltd filed Critical Ping An Health Cloud Co Ltd
Priority to CN201810546441.XA priority Critical patent/CN108763888B/en
Publication of CN108763888A publication Critical patent/CN108763888A/en
Application granted granted Critical
Publication of CN108763888B publication Critical patent/CN108763888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application involves a kind of files on each of customers processing method, device, computer equipment and storage mediums.The method includes:When receiving the application start instruction of input, corresponding application program is started according to the application start instruction;Instruction is checked when receiving files on each of customers, inquires default mark corresponding with the application program;Whether the default mark was locally arranged security password to identify;Judge whether security password locally was set according to the default mark;When security password locally was not arranged, interface is arranged in pop-up security password;The first security password that interface receives input is set by the security password, obtains terminal iidentification, and server will be uploaded to after first security password and terminal iidentification encryption;When the successful response results of the upload for receiving the server return, the value of the default mark is changed, and show the files on each of customers.It can ensure the safety of files on each of customers using this method.

Description

Files on each of customers processing method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, are set more particularly to a kind of files on each of customers processing method, device, computer Standby and storage medium.
Background technology
With the development of computer technology, there are various application programs, to which user can be in application program On operated, for example, user can be by the application program in terminal come into interrogation, physical examination etc. on line.
However, current user by the application program in terminal come into interrogation, physical examination etc. on line, generation Files on each of customers record is stored in application program, therefore every can be checked with the user of login user application program The files on each of customers is revealed so as to cause files on each of customers.
Invention content
Based on this, it is necessary in view of the above technical problems, provide a kind of user's shelves that can ensure files on each of customers safety Case processing method, device, computer equipment and storage medium.
A kind of files on each of customers processing method, the method includes:
When receiving the application start instruction of input, corresponding answer is started according to the application start instruction Use program;
Instruction is checked when receiving files on each of customers, inquires default mark corresponding with the application program;The pre- bidding Know and whether security password locally was set to identify;
Judge whether security password locally was set according to the default mark;
When security password locally was not arranged, interface is arranged in pop-up security password;
The first security password that interface receives input is set by the security password, obtains terminal iidentification, and will be described It is uploaded to server after first security password and terminal iidentification encryption;
When the successful response results of the upload for receiving the server return, the value of the default mark is changed, and Show the files on each of customers.
The method further includes in one of the embodiments,:
When security password was locally located, the number of input security password mistake in preset time period is obtained, and is judged Whether the number is more than the first preset value;
When the number is less than first preset value, display security password verifies interface;
The second security password that interface receives input is verified by the security password;
Terminal iidentification is obtained, and password authentification instruction, institute are generated according to the terminal iidentification and second security password It states password authentification instruction and is used to indicate the server according to the terminal iidentification corresponding third security password verification described the Whether two security passwords are correct;
Receive the verification result for second security password that the server returns;
When the verification result indicates that second security password is proved to be successful, the files on each of customers is shown.
The method further includes in one of the embodiments,:
When verify interface reception by the security password is to forget Password instruction, judge whether to answer with described With the corresponding user contact details of program;
When there are user contact details corresponding with the application program, display identifying code obtains interface;
To the server send identifying code acquisition instruction, the identifying code acquisition instruction be used to indicate the server to User terminal corresponding with the user contact details returns to identifying code;
Interface is obtained by the identifying code and receives the identifying code of input, and the identifying code inputted is sent to the clothes Business device is verified;
When the server returns to the response message that inputted identifying code is proved to be successful, continues pop-up security password and set Set interface.
In one of the embodiments, it is described according to the application start instruction start corresponding application program it Afterwards, further include:
The setting instruction for receiving input, instructs according to the setting and shows user setup interface;
Inquiry default mark corresponding with the application program;Whether the default mark was locally arranged peace to identify Full password;
Judge locally whether security password was set according to the default mark, and it is close to be locally set safety Code, display security password reset interface;
The instruction that forgets Password of input is received, and continues to determine whether to contact in the presence of user corresponding with the application program Mode.
The method further includes in one of the embodiments,:
The setting instruction for receiving input shows the user setup interface according to setting instruction;
Inquiry default mark corresponding with the application program;Whether the default mark was locally arranged peace to identify Full password;
Judge whether security password locally was set according to the default mark;
When security password was not locally arranged, continue to pop up security password setting interface.
A kind of files on each of customers processing unit, described device include:
Starting module, for when receiving the application start instruction of input, being referred to according to the application program launching It enables and starts corresponding application program;
First enquiry module checks that instruction, inquiry are corresponding with the application program pre- for that ought receive files on each of customers Bidding is known;Whether the default mark was locally arranged security password to identify;
First judgment module, for judging locally whether security password was arranged according to the default mark;
First pop-up module, for when security password locally was not arranged, interface to be arranged in pop-up security password;
Uploading module obtains terminal for the first security password that interface receives input to be arranged by the security password Mark, and server will be uploaded to after first security password and terminal iidentification encryption;
First display module, for when receiving the successful response results of upload that the server returns, changing institute The value of default mark is stated, and shows the files on each of customers.
Described device further includes in one of the embodiments,:
Second judgment module, for when security password was locally located, obtaining and inputting security password in preset time period The number of mistake, and judge the number whether more than the first preset value;
Security password verifies interface display module, for when the number is less than first preset value, display to be pacified Full password authentification interface;
First receiving module, for verifying the second security password that interface receives input by the security password;
First authentication module is given birth to for obtaining terminal iidentification, and according to the terminal iidentification and second security password It is instructed at password authentification, the password authentification instruction is used to indicate the server and is pacified according to the corresponding third of the terminal iidentification Whether the second security password is correct described in full password authentification;
Second receiving module, the verification result for second security password returned for receiving the server;
Second display module, for when the verification result indicates that second security password is proved to be successful, showing institute State files on each of customers.
Described device further includes in one of the embodiments,:
Third judgment module, for when verify interface reception by the security password is to forget Password instruction, sentencing It is disconnected to whether there is user contact details corresponding with the application program;
Identifying code obtains interface display module, is used for when there are user contact details corresponding with the application program, Show that identifying code obtains interface;
Identifying code acquisition module, for sending identifying code acquisition instruction, the identifying code acquisition instruction to the server It is used to indicate the server and returns to identifying code to user terminal corresponding with the user contact details;
Second authentication module for obtaining the identifying code that interface receives input by the identifying code, and will be inputted Identifying code is sent to the server and is verified;
Second pop-up module, for when the server returns to the response message that inputted identifying code is proved to be successful, Continue to pop up security password setting interface.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing The step of device realizes any of the above-described the method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of method described in any one of the above embodiments is realized when row.
Above-mentioned files on each of customers processing method, device, computer equipment and storage medium, not only application program, which exists, logs in Password, the files on each of customers inside application program are also provided with special password, therefore even if user can with login application program, When not knowing the first security password of files on each of customers, the files on each of customers can not be also got, ensure that files on each of customers safety, And when security password locally is not arranged, terminal meeting active warning user carries out the setting of the first security password, to ensure that Security password is arranged in user in time, is not in the files on each of customers for being not provided with security password.
Description of the drawings
Fig. 1 is the application scenario diagram of files on each of customers processing method in one embodiment;
Fig. 2 is the flow diagram of files on each of customers processing method in one embodiment;
Fig. 3 is the schematic diagram at the security password setting interface in one embodiment;
Fig. 4 is the schematic diagram at the security password verification interface in one embodiment;
Fig. 5 is the structure diagram of files on each of customers processing unit in one embodiment;
Fig. 6 is the internal structure chart of one embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Files on each of customers processing method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, eventually End is communicated by network with server.User can operate the application program in terminal, such as when the user clicks When the corresponding icon of application program, terminal receives the application start instruction of input, is executed according to the application program launching Start corresponding application program, after application program launching, user can check files on each of customers, such as click and apply journey Files on each of customers option in sequence, the files on each of customers that terminal receives input at this time check instruction, the default mark of terminal inquiry local Whether security password locally was set to determine, if local security password was not arranged, pop-up security password is arranged interface, uses Family is arranged interface by security password and inputs the first security password, and the is got to which interface can be arranged from security password in terminal One security password, and by the first acquired security password and terminal iidentification encryption after upload server, it is waiting to receive server When the successful response results of the upload of return, the value of default mark is changed, and show files on each of customers.Wherein, terminal can with but not Be limited to various personal computers, laptop, smart mobile phone, tablet computer and portable wearable device, server can To be realized with the independent server server cluster that either multiple servers form.
In one embodiment, as shown in Fig. 2, providing a kind of files on each of customers processing method, it is applied to Fig. 1 in this way In server for illustrate, include the following steps:
S202:When receiving the application start instruction of input, started according to application start instruction corresponding Application program.
Specifically, application program is installed, user can be operated by the application program, such as be asked on line in terminal It examines, on line after interrogation, the application program in terminal can generate corresponding files on each of customers, example according to the process of interrogation on line Such as, the record of interrogation on line is added to the homepage of files on each of customers, then by line interrogation as a result, i.e. on line interrogation doctor The second page etc. in files on each of customers is arranged in the diagnosis provided.
In practical applications, user first clicks on the application icon shown in terminal when using application program, when When terminal is received for the application program image target click commands, terminal starts corresponding using journey according to the click commands Sequence, to which terminal can show the home interface of application program.
S204:Instruction is checked when receiving files on each of customers, inquires default mark corresponding with application program;Default mark is used Whether security password was set so that mark is local.
Specifically, after application program launching, user can be operated to use the function of being integrated in application program, example If user can click " files on each of customers " button, when terminal detects that user clicks " files on each of customers " button, that is, use is received When the files on each of customers of family input checks instruction, whether inquiry is local was arranged security password, in the present embodiment, default by one Whether mark was locally arranged security password to determine, such as when security password was locally located, default to be identified as " 1 ", when It is local that security password was not set, it is default to be identified as " 0 ".
S206:Judge whether security password locally was set according to default mark.
Specifically, as indicated above, terminal detects the default mark, is identified as " 1 " when default, peace was locally located in expression Full password is identified as " 0 " when default, judges that security password was not locally arranged.
S208:When security password locally was not arranged, interface is arranged in pop-up security password.
Specifically, in order to ensure the files on each of customers produced the either safety for the files on each of customers to be generated in the future, As long as user clicks " files on each of customers " button, terminal needs to pop up security password setting interface, to remind user to pacify The setting of full password, accordingly even when being not provided with security password, user can not view security password immediately, specifically, Files on each of customers setting interface may refer to shown in Fig. 3.
Even the operations such as interrogation on line have been carried out in user in this way, produce corresponding files on each of customers, and user does not have Input or setting security password can not view corresponding files on each of customers, ensure that the safety of files on each of customers.If at this time User also not into operations such as interrogations on line, i.e., does not generate files on each of customers also, can pre-set security password, at end When end generates files on each of customers according to operations such as interrogations on line, can directly it be stored, when user needs to check generated use When the archives of family, it is necessary to input accurate security password, terminal can just show corresponding files on each of customers.
S210:The first security password that interface receives input is set by security password, obtains terminal iidentification, and by first It is uploaded to server after security password and terminal iidentification encryption.
Specifically, in conjunction with Fig. 3, user inputs the first security password in the input frame that interface is arranged in security password.It is optional Ground, terminal can carry out first security password first format check, such as can examine the length of first security password It is enough, if length is less than preset length, indicates that there are problems for the first security password, need user to re-enter, if length More than or equal to preset length, indicate that the first security password verifies successfully.Further, it is also possible to the format of first security password into Row verification, such as judge whether the first security password has English alphabet and there is number again, the first peace only input by user Full password has number there are English alphabet again when, which verifies successfully.
Terminal iidentification is can be with the mark of unique mark terminal, such as can be MAC Address of terminal etc. or terminal Label etc..
The first security password that user is inputted and terminal iidentification are encrypted terminal, and safe by encrypted first Password and terminal iidentification are uploaded to server, to which server can be by first security password, terminal iidentification and using journey The account password of sequence logon account is associated storage, close to safety input by user when checking files on each of customers again for user Code is verified.
S212:When the successful response results of the upload for receiving server return, the value of default mark is changed, and show Files on each of customers.
Specifically, terminal iidentification, security password are uploaded to server by terminal, and server is by terminal iidentification, security password And the account identification of the account of current login application program is associated storage, and after storing successfully safety is returned to terminal Password uploads successful response results, and terminal changes the value of default mark, i.e., by default mark after receiving the response results Value be set as indicating local being set security password, and after the completion of change, display files on each of customers.Optionally, Two threads may be used to be handled in terminal, such as first thread, by the value of the default mark of change, the second thread is for showing Show files on each of customers.
And if when security password uploads unsuccessful, terminal can prompt this security password setup failed, prompt user It resets.
Above-mentioned files on each of customers processing method, not only application program is there are login password, user's shelves inside application program Case is also provided with special password, therefore even if user can be with login application program, in the first safety for not knowing files on each of customers When password, the files on each of customers can not be also got, ensure that files on each of customers safety, and security password ought be set locally When, terminal meeting active warning user carries out the setting of the first security password, to ensure that security password is arranged in user in time, It is not in the files on each of customers for being not provided with security password.
The files on each of customers processing method can also include in one of the embodiments,:When security password was locally located When, the number of input security password mistake in preset time period is obtained, and judge number whether more than the first preset value;Work as number When being less than the first preset value, display security password verifies interface;The second peace that interface receives input is verified by security password Full password;Terminal iidentification is obtained, and password authentification instruction, password authentification instruction are generated according to terminal iidentification and the second security password It is whether correct according to terminal iidentification the second security password of corresponding third security password verification to be used to indicate server;Receive service The verification result for the second security password that device returns;When verification result indicates that the second security password is proved to be successful, display Files on each of customers.
Specifically, the present embodiment focuses on password authentification, when default mark indicates to be locally located security password, eventually End can obtain the number of input security password mistake in preset time period, such as terminal can get user in one day and input The number of security password mistake, terminal simultaneously judge the number whether more than the first preset value, for example whether (being only herein more than 5 For example, can also be other first preset values in other embodiments, it is not specifically limited herein) etc., when user is defeated When entering the number of security password mistake and being less than the first preset value, display security password verifies interface, as shown in figure 4, user can To input the second security password in security password verification interface, to which terminal can get security password verification interface Second security password of middle input, and terminal iidentification is obtained, to which terminal iidentification and the second security password are encrypted terminal, And password authentification instruction is generated according to encrypted terminal iidentification and the second security password, and password authentification instruction is sent to Server after server receives the encrypted terminal iidentification and the second security password, is decrypted to obtain terminal mark first Know and its corresponding security password is inquired by terminal iidentification first with the second security password, such as server, then passes through application The account of program chooses corresponding third security password from the security password inquired, and the second safety that terminal is sent is close Code is compared with third security password, if the second security password is identical with third security password, server is returned to terminal The correct verification result of security password, if the second security password and third security password differ, server is returned to terminal The verification result of security password mistake.
Terminal receive server return verification result after, if the verification result indicate the second security password verification at When work(, files on each of customers is shown, to which user can check corresponding files on each of customers.If verification result indicates the second security password When authentication failed, terminal obtains user in preset time period and inputs the residue degree of security password mistake, such as gets user First number of the security password mistake inputted, and obtain the security password mistake that the admissible user of terminal can input Second number, input security password mistake according to subtracting first number by second number and obtaining user in preset time period Residue degree, if the residue degree of user's input security password mistake is less than or equal to 0 in the preset time period, terminal output is close The prompt of code input error, and show in preset time period without input chance.If user inputs safety in the preset time period The residue degree of password mistake is more than 0, and the residue degree of user's input security password mistake is shown in preset time period, with The still remaining security password of user is prompted to input number.Similarly, when whether above judging number more than the first preset value It is obtaining the result is that number is more than the first preset value, the prompt of terminal output password input error, and showing in preset time period Without input chance.
In above-described embodiment, the account identification of security password, terminal iidentification and application program account is associated storage, Different terminals is bundled with different security passwords, may further ensure that the safety of files on each of customers.
The files on each of customers processing method can also include in one of the embodiments,:When verifying boundary by security password What face received is when forgetting Password instruction, to judge whether user contact details corresponding with application program;When presence and answer When user contact details corresponding with program, display identifying code obtains interface;Identifying code acquisition instruction, verification are sent to server Code acquisition instruction is used to indicate server and returns to identifying code to user terminal corresponding with user contact details;It is obtained by identifying code It takes interface to receive the identifying code of input, and the identifying code inputted is sent to server and is verified;When server returns to institute When the response message that the identifying code of input is proved to be successful, continue to pop up security password setting interface.
Specifically, the present embodiment terminal is the modification of security password, can be close by safety when user forgets Password Code verification interface, which receives, to forget Password instruction, " forgetting Password " as shown in Figure 4, terminal it is first determined whether in the presence of with using journey Sequence corresponding user contact details, such as cell-phone number, mailbox etc., if it does, display identifying code obtains interface, wherein user joins It is mode to be directly displayed at identifying code and obtain interface, then user clicks " identifying code acquisitions " button, so that terminal can be with Calling interface sends identifying code to server and obtains request, and server contacts after receiving identifying code and obtaining request to user The corresponding user terminal of mode sends corresponding identifying code, and user terminal calling interface gets the identifying code of server transmission, If identifying code obtains successfully, accessed identifying code is input to the corresponding position that identifying code obtains interface by user, such as Fruit identifying code obtains failure, and terminal can show miscue, and user is prompted to reacquire identifying code.Terminal will receive Identifying code is sent to server and is verified, and server is inquired according to the account identification of terminal iidentification and the account of application program To its generation identifying code, then with terminal send identifying code be compared, if the two is identical, indicate identifying code verification at Work(, no identifying code authentication failed, if identifying code authentication failed, terminal shows the information of identifying code authentication failed, if verification Code is proved to be successful, and terminal pops up security password and interface is arranged, as shown in Figure 3.
When identifying code is by server authentication success, terminal pops up security password and interface is arranged, and user passes through the safety Password is arranged interface and inputs the first security password, and terminal uploads after being packaged the first security password input by user and terminal iidentification To server, if uploaded successfully, default mark is revised as indicating locally to be set security password, is lost if uploaded It loses, user is prompted to reset security password.
In addition, if user contact details are not present, terminal shows that user contact details bind interface, is used for user bound Contact method, such as can show that cell-phone number binds interface, it is used for the cell-phone number of user bound.
Optionally, during above-mentioned security password is verified, terminal can also upload current geographic position information to clothes It is engaged in device, if server judges current geographic position information and the last current geographic position information for checking files on each of customers not phase Meanwhile server sends the information for suggesting modification security password to terminal, and security password is changed when terminal receives the suggestion When information, which is shown after application program launching, in order to which modification safety is close as procedure described above in time by user Code.
In above-described embodiment, when user needs to change security password, interface input can be verified by security password and is forgotten Remember cipher instruction, carries out security password modification further according to above-mentioned steps, thereby may be ensured that the time update of security password, so as to In the safety for ensureing files on each of customers.
The setting of security password can also be by being carried out in setting options in one of the embodiments, to root After starting corresponding application program according to application start instruction, can also include:The setting instruction for receiving input, according to setting It sets instruction and shows user setup interface;Inquiry default mark corresponding with application program;It is default to identify whether to identify local Security password was set;Judge locally whether security password was set according to default mark, and ought locally be set safe Password, display security password reset interface;The instruction that forgets Password of input is received, and continues to determine whether to exist and application program Corresponding user contact details.
Specifically, the setting of security password can also be that user is opening application program by what is carried out in setting options Afterwards, click " I " option, " setting " then is selected, reselection " security password setting " button, terminal is sentenced according to default mark Whether disconnected user is locally already provided with security password, if so, display security password resets interface, and clicks under security password Forget security password option, then terminal judges whether corresponding with application program account user connection from server first It is mode, such as cell-phone number, if it does, display identifying code obtains interface, wherein user contact details can be directly displayed at Identifying code obtains interface, and then user clicks " identifying code acquisition " button, to which terminal can be sent with calling interface to server Identifying code obtains request, and server is after receiving identifying code and obtaining request, to the corresponding user terminal hair of user contact details It send corresponding identifying code, user terminal calling interface to get the identifying code of server transmission, if identifying code obtains successfully, uses Accessed identifying code is input to the corresponding position that identifying code obtains interface by family, if identifying code obtains failure, terminal It can show miscue, and user is prompted to reacquire identifying code.Terminal by the identifying code received be sent to server into Row verification, server inquire the identifying code of its generation according to the account identification of terminal iidentification and the account of application program, so The identifying code sent afterwards with terminal is compared, if the two is identical, indicates that identifying code is proved to be successful, and no identifying code verification is lost It loses, if identifying code authentication failed, terminal shows the information of identifying code authentication failed, if identifying code is proved to be successful, terminal bullet Go out security password setting interface, as shown in Figure 3.
When identifying code is by server authentication success, terminal pops up security password and interface is arranged, and user passes through the safety Password is arranged interface and inputs the first security password, and terminal uploads after being packaged the first security password input by user and terminal iidentification To server, if uploaded successfully, default mark is revised as indicating locally to be set security password, is lost if uploaded It loses, user is prompted to reset security password.
In addition, if user contact details are not present, terminal shows that user contact details bind interface, is used for user bound Contact method, such as can show that cell-phone number binds interface, it is used for the cell-phone number of user bound.
Optionally, during above-mentioned security password is verified, terminal can also upload current geographic position information to clothes It is engaged in device, if server judges current geographic position information and the last current geographic position information for checking files on each of customers not phase Meanwhile server sends the information for suggesting modification security password to terminal, and security password is changed when terminal receives the suggestion When information, which is shown after application program launching, in order to which modification safety is close as procedure described above in time by user Code.
It, can be close in safety by being carried out in setting options when user needs to change security password in above-described embodiment Code resetting interface inputs the instruction that forgets Password, and security password modification is carried out further according to above-mentioned steps, thereby may be ensured that safety is close The time update of code, in order to ensure the safety of files on each of customers.
Above-mentioned files on each of customers processing method can also include in one of the embodiments,:The setting instruction of input is received, It is instructed according to setting and shows user setup interface;Inquiry default mark corresponding with application program;It is default to identify to identify this Whether ground was arranged security password;Judge whether security password locally was set according to default mark;When peace was not arranged for local Full password continues to pop up security password setting interface.
Specifically, user is after opening app, click " I " option, " setting " then is selected, reselection " security password The page is set ", terminal judges whether user is locally already provided with security password according to default mark, is used if not provided, receiving After the instruction of setting security password is clicked at family, terminal pops up security password and interface is arranged, and boundary is arranged by the security password in user Face inputs security password, and terminal is uploaded to server after encrypting the security password, and when uploading successfully, modification is default to be identified as Security password was locally located.
The setting of security password can also be that user clicks after opening application program by what is carried out in setting options " I " option, " setting " then is selected, reselection " security password setting " button, terminal judges user's sheet according to default mark Whether ground is already provided with security password, if local be not provided with security password, pop-up security password is arranged interface, such as schemes Shown in 3, user inputs the first security password in the input frame that interface is arranged in security password.Terminal user is inputted first Security password and terminal iidentification are encrypted, and encrypted first security password and terminal iidentification are uploaded to server, clothes The account identification of the account of terminal iidentification, security password and current login application program is associated storage by business device, and Security password being returned to terminal after storing successfully and uploading successful response results, terminal is after receiving the response results, change The value of default mark, and after the completion of having changed, show files on each of customers.Optionally, two threads may be used to carry out in terminal Processing, such as first thread, by the value of the default mark of change, the second thread is for showing files on each of customers.
In above-described embodiment, user can also be carried out by setting options, when security password locally is not arranged, prompt to use Family be arranged security password, even if to user can with login application program, when not knowing the first security password of files on each of customers, It can not also get the files on each of customers, ensure that files on each of customers safety.
Specifically, files on each of customers processing method mainly include two processing threads, first thread be user click be to answer With the files on each of customers button in program, the setting, verification and modification etc. for carrying out security password by clicking files on each of customers button, What the second thread was that user clicks is setting button, by the way that button is arranged setting, the change etc. that carry out security password.
For may include according to the user's choice in first thread security password setting procedure, security password verification The modification process of flow and security password.
The setting procedure of security password is when terminal receives files on each of customers input by user and checks instruction, and inquiry is default Mark, when default mark indicates that security password locally was not arranged, into security password setting procedure, terminal pop-up safety is close Code setting interface is arranged interface by the security password and receives the first security password input by user, and terminal is close by the first safety Upload server after code and terminal iidentification encryption, when the successful response results of the upload for receiving server return, change is pre- It is marked with the value known, and accordingly shows files on each of customers.When default mark indicates locally to be set security password, receives and use Family input next instruction, when next instruction input by user indicate be forget Password instruction when, as security password change flow Journey, first terminal judge whether user contact details corresponding with application program;When in the presence of use corresponding with application program When the contact method of family, display identifying code obtains interface;Identifying code acquisition instruction is sent to server, identifying code acquisition instruction is used for Indicate that server returns to identifying code to user terminal corresponding with user contact details;Interface, which is obtained, by identifying code receives input Identifying code, and the identifying code inputted is sent to server and is verified;It is tested when server returns to inputted identifying code When demonstrate,proving successful response message, continues to pop up security password setting interface, carry out the setting of security password.Under input by user What one instruction indicated is security password input by user, obtains the number of input security password mistake in preset time period, and is sentenced Whether disconnected number is more than the first preset value;When number is less than the first preset value, display security password verifies interface;Pass through peace Full password authentification interface receives the second security password of input;Terminal iidentification is obtained, and close according to terminal iidentification and the second safety Code generates password authentification instruction, and password authentification instruction is used to indicate server and is tested according to the corresponding third security password of terminal iidentification Whether correct demonstrate,prove the second security password;Receive the verification result for the second security password that server returns;Work as verification result When indicating that the second security password is proved to be successful, files on each of customers is shown.
For may include security password resetting flow and security password setting stream according to the user's choice in the second thread Journey:
When user selects setting options, default mark is inquired, security password was not set when default mark indicates local When, into security password setting procedure, terminal pops up security password and interface is arranged, and interface, which is arranged, by the security password receives use First security password of family input, upload server after terminal encrypts the first security password and terminal iidentification, takes when receiving When the successful response results of upload that device returns of being engaged in, the value of default mark is changed, and accordingly show files on each of customers.When pre- bidding When knowledge indicates locally to be set security password, next instruction input by user is received, when next instruction table input by user What is shown is when forgetting Password instruction, and such as security password modification process, terminal first judges whether corresponding with application program User contact details;When there are user contact details corresponding with application program, display identifying code obtains interface;To server Identifying code acquisition instruction is sent, identifying code acquisition instruction is used to indicate server to user terminal corresponding with user contact details Return to identifying code;Interface is obtained by identifying code and receives the identifying code of input, and the identifying code inputted is sent to server It is verified;When server returns to the response message that inputted identifying code is proved to be successful, continue to pop up security password setting Interface carries out the setting of security password
It should be understood that although each step in the flow chart of Fig. 2 is shown successively according to the instruction of arrow, this A little steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly state otherwise herein, these steps It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2 Step may include that either these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps It completes, but can execute at different times, the execution sequence in these sub-steps or stage is also not necessarily to be carried out successively, But it can either the sub-step of other steps or at least part in stage execute in turn or alternately with other steps.
In one embodiment, as shown in figure 5, providing a kind of files on each of customers processing unit, including:Starting module 100, First enquiry module 200, the first judgment module 300, the first pop-up module 400, uploading module 500 and the first display module 600, Wherein:
Starting module 100, for when receiving the application start instruction of input, according to application start instruction Start corresponding application program.
First enquiry module 200 checks instruction for that ought receive files on each of customers, inquires corresponding with application program default Mark;Whether default mark was locally arranged security password to identify.
First judgment module 300, for judging locally whether security password was arranged according to default mark.
First pop-up module 400, for when security password locally was not arranged, interface to be arranged in pop-up security password.
Uploading module 500 obtains terminal mark for the first security password that interface receives input to be arranged by security password Know, and server will be uploaded to after the first security password and terminal iidentification encryption.
First display module 600, for when receiving the successful response results of upload of server return, change to be default The value of mark, and show files on each of customers.
The files on each of customers processing unit can also include in one of the embodiments,:
Second judgment module, for when security password was locally located, obtaining and inputting security password in preset time period The number of mistake, and judge number whether more than the first preset value.
Security password verifies interface display module, for when number is less than the first preset value, display security password to be tested Demonstrate,prove interface.
First receiving module, for verifying the second security password that interface receives input by security password.
First authentication module for obtaining terminal iidentification, and generates password according to terminal iidentification and the second security password and tests Card instruction, it is close according to corresponding the second safety of third security password verification of terminal iidentification that password authentification instruction is used to indicate server Whether code is correct.
Second receiving module, the verification result for the second security password for receiving server return.
Second display module, for when verification result indicates that the second security password is proved to be successful, showing files on each of customers.
The files on each of customers processing unit can also include in one of the embodiments,:
Third judgment module, for when verify interface reception by security password is to forget Password instruction, judgement to be It is no to there are user contact details corresponding with application program.
Identifying code obtains interface display module, for when there are user contact details corresponding with application program, showing Identifying code obtains interface.
Identifying code acquisition module, for sending identifying code acquisition instruction to server, identifying code acquisition instruction is used to indicate Server returns to identifying code to user terminal corresponding with user contact details.
Second authentication module, for obtaining the identifying code that interface receives input, and the verification that will be inputted by identifying code Code is sent to server and is verified.
Second pop-up module, for when server returns to the response message that inputted identifying code is proved to be successful, continuing It pops up security password and interface is set.
The files on each of customers processing unit can also include in one of the embodiments,:
Third receiving module, the setting instruction for receiving input, instructs according to setting and shows user setup interface.
Second enquiry module, for inquiring default mark corresponding with application program;Preset mark is locally to identify It is no that security password was set.
Security password resets interface display module, for judging locally whether security password was arranged according to default mark, And it ought be locally set security password, display security password resets interface.
4th receiving module, the instruction that forgets Password for receiving input, and continue to determine whether to exist and application program Corresponding user contact details.
The files on each of customers processing unit can also include in one of the embodiments,:
5th receiving module is used for third receiving module, the setting instruction for receiving input, according to setting instruction display User setup interface.
Third enquiry module, for inquiring default mark corresponding with application program;Preset mark is locally to identify It is no that security password was set.
4th judgment module, for judging locally whether security password was arranged according to default mark.
Third pop-up module continues to pop up security password setting interface for security password ought not to be arranged locally.
Specific about files on each of customers processing unit limits the limit that may refer to above for files on each of customers processing method Fixed, details are not described herein.Modules in above-mentioned files on each of customers processing unit can fully or partially through software, hardware and its It combines to realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also It is stored in a software form in the memory in computer equipment, in order to which processor calls the above modules of execution corresponding Operation.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure Figure can be as shown in Figure 6.The computer equipment includes the processor connected by system bus, memory, network interface, display Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The network interface of machine equipment is used to communicate by network connection with external terminal.When the computer program is executed by processor with Realize a kind of files on each of customers processing method.The display screen of the computer equipment can be that liquid crystal display or electric ink are shown Screen, the input unit of the computer equipment can be the touch layer covered on display screen, can also be on computer equipment shell Button, trace ball or the Trackpad of setting can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 6, is only tied with the relevant part of application scheme The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment May include either combining certain components than more or fewer components as shown in the figure or being arranged with different components.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor realize following steps when executing computer program:When the application program launching for receiving input refers to When enabling, corresponding application program is started according to application start instruction;Instruction is checked when receiving files on each of customers, is inquired and is answered With the corresponding default mark of program;Whether default mark was locally arranged security password to identify;Judged according to default mark It is local that whether security password was set;When security password locally was not arranged, interface is arranged in pop-up security password;Pass through safety The first security password that interface receives input is arranged in password, obtains terminal iidentification, and the first security password and terminal iidentification are added Server is uploaded to after close;When the successful response results of the upload for receiving server return, the value of default mark is changed, and Show files on each of customers.
In one embodiment, following steps are also realized when processor executes computer program:It is safe when being locally located When password, the number of input security password mistake in preset time period is obtained, and judges number whether more than the first preset value;When When number is less than the first preset value, display security password verifies interface;Verify that interface receives input by security password the Two security passwords;Terminal iidentification is obtained, and password authentification instruction, password authentification are generated according to terminal iidentification and the second security password Whether instruction is used to indicate server correct according to terminal iidentification the second security password of corresponding third security password verification;It receives The verification result for the second security password that server returns;When verification result indicates that the second security password is proved to be successful, Show files on each of customers.
In one embodiment, following steps are also realized when processor executes computer program:It is tested when by security password What card interface received is when forgetting Password instruction, to judge whether user contact details corresponding with application program;Work as presence When user contact details corresponding with application program, display identifying code obtains interface;Identifying code acquisition instruction is sent to server, Identifying code acquisition instruction is used to indicate server and returns to identifying code to user terminal corresponding with user contact details;Pass through verification Code obtains interface and receives the identifying code of input, and the identifying code inputted is sent to server and is verified;When server returns When returning the response message that inputted identifying code is proved to be successful, continue to pop up security password setting interface.
In one embodiment, that is realized when processor execution computer program starts according to application start instruction After corresponding application program, can also include:The setting instruction for receiving input, instructs according to setting and shows user setting circle Face;Inquiry default mark corresponding with application program;Whether default mark was locally arranged security password to identify;According to pre- Bidding, which is known, judges security password whether was locally arranged, and ought locally be set security password, display security password resetting Interface;The instruction that forgets Password of input is received, and continues to determine whether there are user contact details corresponding with application program.
In one embodiment, following steps are also realized when processor executes computer program:The setting for receiving input refers to It enables, is instructed according to setting and show user setup interface;Inquiry default mark corresponding with application program;It is default to identify to identify It is local that whether security password was set;Judge whether security password locally was set according to default mark;It was not arranged when locally Security password continues to pop up security password setting interface.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:When receiving the application start instruction of input, according to using journey Sequence enabled instruction starts corresponding application program;Check that instruction, inquiry are corresponding with application program pre- when receiving files on each of customers Bidding is known;Whether default mark was locally arranged security password to identify;Local whether be arranged judged according to default mark Security password;When security password locally was not arranged, interface is arranged in pop-up security password;Interface is arranged by security password to connect The first security password of input is received, obtains terminal iidentification, and service will be uploaded to after the first security password and terminal iidentification encryption Device;When the successful response results of the upload for receiving server return, the value of default mark is changed, and show files on each of customers.
In one embodiment, following steps are also realized when computer program is executed by processor:When peace was locally located When full password, the number of input security password mistake in preset time period is obtained, and judges number whether more than the first preset value; When number is less than the first preset value, display security password verifies interface;Interface, which is verified, by security password receives input Second security password;Terminal iidentification is obtained, and password authentification instruction is generated according to terminal iidentification and the second security password, password is tested Whether card instruction is used to indicate server correct according to terminal iidentification the second security password of corresponding third security password verification;It connects Receive the verification result for the second security password that server returns;When verification result indicates that the second security password is proved to be successful When, show files on each of customers.
In one embodiment, following steps are also realized when computer program is executed by processor:When passing through security password What verification interface received is when forgetting Password instruction, to judge whether user contact details corresponding with application program;When depositing In user contact details corresponding with application program, display identifying code obtains interface;Identifying code acquisition is sent to server to refer to It enables, identifying code acquisition instruction is used to indicate server and returns to identifying code to user terminal corresponding with user contact details;Pass through Identifying code obtains interface and receives the identifying code of input, and the identifying code inputted is sent to server and is verified;Work as service When device returns to the response message that inputted identifying code is proved to be successful, continue to pop up security password setting interface.
In one embodiment, that is realized when computer program is executed by processor opens according to application start instruction After moving corresponding application program, can also include:The setting instruction for receiving input, instructs according to setting and shows user setting circle Face;Inquiry default mark corresponding with application program;Whether default mark was locally arranged security password to identify;According to pre- Bidding, which is known, judges security password whether was locally arranged, and ought locally be set security password, display security password resetting Interface;The instruction that forgets Password of input is received, and continues to determine whether there are user contact details corresponding with application program.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive the setting of input Instruction instructs according to setting and shows user setup interface;Inquiry default mark corresponding with application program;It is default to identify to mark Know and whether security password locally was set;Judge whether security password locally was set according to default mark;It is not arranged when locally Security password is crossed, continues to pop up security password setting interface.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, Any reference to memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield is all considered to be the range of this specification record.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. a kind of files on each of customers processing method, the method includes:
When receiving the application start instruction of input, started according to the application start instruction corresponding using journey Sequence;
Instruction is checked when receiving files on each of customers, inquires default mark corresponding with the application program;The default mark is used Whether security password was set so that mark is local;
Judge whether security password locally was set according to the default mark;
When security password locally was not arranged, interface is arranged in pop-up security password;
The first security password that interface receives input is set by the security password, obtains terminal iidentification, and by described first It is uploaded to server after security password and terminal iidentification encryption;
When the successful response results of the upload for receiving the server return, the value of the default mark is changed, and show The files on each of customers.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
When security password was locally located, the number of input security password mistake in preset time period is obtained, and described in judgement Whether number is more than the first preset value;
When the number is less than first preset value, display security password verifies interface;
The second security password that interface receives input is verified by the security password;
Terminal iidentification is obtained, and password authentification instruction is generated according to the terminal iidentification and second security password, it is described close Code verification instruction is used to indicate the server according to the corresponding third security password verification of the terminal iidentification second peace Whether full password is correct;
Receive the verification result for second security password that the server returns;
When the verification result indicates that second security password is proved to be successful, the files on each of customers is shown.
3. according to the method described in claim 2, it is characterized in that, the method further includes:
When verify interface reception by the security password is to forget Password instruction, judge whether to apply journey with described The corresponding user contact details of sequence;
When there are user contact details corresponding with the application program, display identifying code obtains interface;
To the server send identifying code acquisition instruction, the identifying code acquisition instruction be used to indicate the server to institute It states the corresponding user terminal of user contact details and returns to identifying code;
Interface is obtained by the identifying code and receives the identifying code of input, and the identifying code inputted is sent to the server It is verified;
When the server returns to the response message that inputted identifying code is proved to be successful, continue to pop up security password setting circle Face.
4. according to the method described in claim 3, it is characterized in that, described started according to the application start instruction corresponds to Application program after, further include:
The setting instruction for receiving input, instructs according to the setting and shows user setup interface;
Inquiry default mark corresponding with the application program;Local that safety whether was arranged was close to identify for the default mark Code;
Judge locally whether security password was set according to the default mark, and ought locally be set security password, shows Show that security password resets interface;
The instruction that forgets Password of input is received, and continues to determine whether there is user's correspondent party corresponding with the application program Formula.
5. according to the method described in claims 1 to 3 any one, which is characterized in that the method further includes:
The setting instruction for receiving input shows the user setup interface according to setting instruction;
Inquiry default mark corresponding with the application program;Local that safety whether was arranged was close to identify for the default mark Code;
Judge whether security password locally was set according to the default mark;
When security password was not locally arranged, continue to pop up security password setting interface.
6. a kind of files on each of customers processing unit, which is characterized in that described device includes:
Starting module, for when receiving the application start instruction of input, being opened according to the application start instruction Move corresponding application program;
First enquiry module checks instruction for that ought receive files on each of customers, inquires pre- bidding corresponding with the application program Know;Whether the default mark was locally arranged security password to identify;
First judgment module, for judging security password, the default mark whether was locally arranged according to the default mark Whether security password locally was set to identify;
First pop-up module, for when security password locally was not arranged, interface to be arranged in pop-up security password;
Uploading module receives the first security password inputted for interface to be arranged by the security password, obtains terminal iidentification, And server will be uploaded to after first security password and terminal iidentification encryption;
First display module, for when receiving the successful response results of upload that the server returns, change to be described pre- It is marked with the value known, and shows the files on each of customers.
7. device according to claim 6, which is characterized in that described device further includes:
Second judgment module, for when security password was locally located, obtaining and inputting security password mistake in preset time period Number, and judge the number whether more than the first preset value;
Security password verifies interface display module, for when the number is less than first preset value, display safety to be close Code verification interface;
First receiving module, for verifying the second security password that interface receives input by the security password;
First authentication module, for obtaining terminal iidentification, and it is close according to the terminal iidentification and second security password generation Code verification instruction, it is close safely according to the corresponding third of the terminal iidentification that the password authentification instruction is used to indicate the server Whether code verifies second security password correct;
Second receiving module, the verification result for second security password returned for receiving the server;
Second display module, for when the verification result indicates that second security password is proved to be successful, showing the use Family archives.
8. device according to claim 6, which is characterized in that described device further includes:
Third judgment module, for when verify interface reception by the security password is to forget Password instruction, judgement to be It is no to there are user contact details corresponding with the application program;
Identifying code obtains interface display module, for when there are user contact details corresponding with the application program, showing Identifying code obtains interface;
Identifying code acquisition module, for sending identifying code acquisition instruction to the server, the identifying code acquisition instruction is used for Indicate that the server returns to identifying code to user terminal corresponding with the user contact details;
Second authentication module, for obtaining the identifying code that interface receives input, and the verification that will be inputted by the identifying code Code is sent to the server and is verified;
Second pop-up module, for when the server returns to the response message that inputted identifying code is proved to be successful, continuing It pops up security password and interface is set.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In when the processor executes the computer program the step of any one of realization claim 1 to 5 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claim 1 to 5 is realized when being executed by processor.
CN201810546441.XA 2018-05-31 2018-05-31 User profile processing method and device, computer equipment and storage medium Active CN108763888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810546441.XA CN108763888B (en) 2018-05-31 2018-05-31 User profile processing method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810546441.XA CN108763888B (en) 2018-05-31 2018-05-31 User profile processing method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108763888A true CN108763888A (en) 2018-11-06
CN108763888B CN108763888B (en) 2022-06-07

Family

ID=64001066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810546441.XA Active CN108763888B (en) 2018-05-31 2018-05-31 User profile processing method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108763888B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110298184A (en) * 2019-06-28 2019-10-01 维沃移动通信有限公司 Information processing method and terminal device
CN111382422A (en) * 2018-12-28 2020-07-07 卡巴斯基实验室股份制公司 System and method for changing password of account record under threat of illegal access to user data
CN111859455A (en) * 2020-07-28 2020-10-30 山东健康医疗大数据有限公司 Privacy security protection method for accessing health files by APP terminal
CN117668936A (en) * 2024-01-31 2024-03-08 荣耀终端有限公司 Data processing method and related device
CN118102293A (en) * 2024-04-29 2024-05-28 浙江华昱欣科技有限公司 Wireless device password setting method, wireless device password setting device, computer device and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827360A (en) * 2010-04-09 2010-09-08 中兴通讯股份有限公司 Method and device for setting communication terminal graphical passwords
CN102346831A (en) * 2011-10-31 2012-02-08 广东欧珀移动通信有限公司 Handheld device privacy encryption protection method of Android operating system
CN102789555A (en) * 2011-05-17 2012-11-21 腾讯科技(深圳)有限公司 Method and system for safely moving file
WO2013029428A1 (en) * 2011-08-29 2013-03-07 惠州Tcl移动通信有限公司 Mobile terminal and application program login method thereof
CN103793663A (en) * 2013-12-26 2014-05-14 北京奇虎科技有限公司 Folder locking and unlocking methods and folder locking and unlocking devices
CN103856472A (en) * 2012-12-06 2014-06-11 阿里巴巴集团控股有限公司 Account login method and device
CN104486354A (en) * 2014-12-30 2015-04-01 飞天诚信科技股份有限公司 Method for retrieving passwords in secure mode
CN104639533A (en) * 2014-12-30 2015-05-20 小米科技有限责任公司 Safety control method and device based on terminal
CN104796263A (en) * 2015-04-29 2015-07-22 百度在线网络技术(北京)有限公司 User identity authentication method and device
CN105678186A (en) * 2016-01-05 2016-06-15 上海卓易科技股份有限公司 Information encryption method and device
CN106203061A (en) * 2016-06-27 2016-12-07 维沃移动通信有限公司 The encryption method of a kind of application program and mobile terminal
CN106548050A (en) * 2016-10-21 2017-03-29 北京小米移动软件有限公司 Using startup method and device
CN106611112A (en) * 2016-12-14 2017-05-03 北京小米移动软件有限公司 Application program safe processing method, device and equipment
CN108076056A (en) * 2017-12-12 2018-05-25 北京小米移动软件有限公司 Cloud server login method and device

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827360A (en) * 2010-04-09 2010-09-08 中兴通讯股份有限公司 Method and device for setting communication terminal graphical passwords
CN102789555A (en) * 2011-05-17 2012-11-21 腾讯科技(深圳)有限公司 Method and system for safely moving file
WO2013029428A1 (en) * 2011-08-29 2013-03-07 惠州Tcl移动通信有限公司 Mobile terminal and application program login method thereof
US20140013424A1 (en) * 2011-08-29 2014-01-09 Zhonglei Lv Mobile terminal and application program login method thereof
CN102346831A (en) * 2011-10-31 2012-02-08 广东欧珀移动通信有限公司 Handheld device privacy encryption protection method of Android operating system
CN103856472A (en) * 2012-12-06 2014-06-11 阿里巴巴集团控股有限公司 Account login method and device
CN103793663A (en) * 2013-12-26 2014-05-14 北京奇虎科技有限公司 Folder locking and unlocking methods and folder locking and unlocking devices
CN104486354A (en) * 2014-12-30 2015-04-01 飞天诚信科技股份有限公司 Method for retrieving passwords in secure mode
CN104639533A (en) * 2014-12-30 2015-05-20 小米科技有限责任公司 Safety control method and device based on terminal
CN104796263A (en) * 2015-04-29 2015-07-22 百度在线网络技术(北京)有限公司 User identity authentication method and device
CN105678186A (en) * 2016-01-05 2016-06-15 上海卓易科技股份有限公司 Information encryption method and device
CN106203061A (en) * 2016-06-27 2016-12-07 维沃移动通信有限公司 The encryption method of a kind of application program and mobile terminal
CN106548050A (en) * 2016-10-21 2017-03-29 北京小米移动软件有限公司 Using startup method and device
CN106611112A (en) * 2016-12-14 2017-05-03 北京小米移动软件有限公司 Application program safe processing method, device and equipment
CN108076056A (en) * 2017-12-12 2018-05-25 北京小米移动软件有限公司 Cloud server login method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111382422A (en) * 2018-12-28 2020-07-07 卡巴斯基实验室股份制公司 System and method for changing password of account record under threat of illegal access to user data
CN111382422B (en) * 2018-12-28 2023-08-11 卡巴斯基实验室股份制公司 System and method for changing passwords of account records under threat of illegally accessing user data
CN110298184A (en) * 2019-06-28 2019-10-01 维沃移动通信有限公司 Information processing method and terminal device
CN111859455A (en) * 2020-07-28 2020-10-30 山东健康医疗大数据有限公司 Privacy security protection method for accessing health files by APP terminal
CN117668936A (en) * 2024-01-31 2024-03-08 荣耀终端有限公司 Data processing method and related device
CN118102293A (en) * 2024-04-29 2024-05-28 浙江华昱欣科技有限公司 Wireless device password setting method, wireless device password setting device, computer device and storage medium

Also Published As

Publication number Publication date
CN108763888B (en) 2022-06-07

Similar Documents

Publication Publication Date Title
CN108763888A (en) Files on each of customers processing method, device, computer equipment and storage medium
US10223520B2 (en) System and method for integrating two-factor authentication in a device
US11736468B2 (en) Enhanced authorization
US8387119B2 (en) Secure application network
CN110362308A (en) Page generation method, device, computer equipment and storage medium
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
WO2015081777A1 (en) Method and device for encrypting information of an application
CN109669859A (en) Service test method, device, computer equipment and storage medium
CN108076056A (en) Cloud server login method and device
CN106503506B (en) A kind of information display method and electronic equipment
CN109117616B (en) Verification method and device, electronic equipment and computer readable storage medium
CN109299010A (en) Mock test method, device, computer equipment and storage medium
CN109829277A (en) Terminal unlock method, device, computer equipment and storage medium
CN109325666A (en) Service processing method, device, computer equipment and storage medium
CN111131208B (en) Third-party service application login method and device, computer equipment and storage medium
CN111770132B (en) Work order downloading method, work order uploading method, device and computer equipment
CN110222492B (en) System switching method and device, computer equipment and computer readable storage medium
US20230205861A1 (en) Method and system for obtaining consent to perform an operation
CN109543396B (en) Task execution method, device, computer equipment and storage medium
CN109858583A (en) Electric power instrument borrows information processing method, borrowing method and device
CN109828955A (en) Document processing method, device, computer equipment and storage medium
CN114244519A (en) Password verification method and device, computer equipment and storage medium
CN112989379A (en) Key protection implementation method and device and electronic equipment
CA3091380A1 (en) Method and system for obtaining consent to perform an operation
CN110493785A (en) A kind of login method of mobile client, SIM card and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant