CN109117623A - A kind of application method for managing security, device and storage medium - Google Patents

A kind of application method for managing security, device and storage medium Download PDF

Info

Publication number
CN109117623A
CN109117623A CN201710492686.4A CN201710492686A CN109117623A CN 109117623 A CN109117623 A CN 109117623A CN 201710492686 A CN201710492686 A CN 201710492686A CN 109117623 A CN109117623 A CN 109117623A
Authority
CN
China
Prior art keywords
control
password
application
application icon
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710492686.4A
Other languages
Chinese (zh)
Other versions
CN109117623B (en
Inventor
姚均营
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710492686.4A priority Critical patent/CN109117623B/en
Priority to PCT/CN2018/092689 priority patent/WO2018233718A1/en
Publication of CN109117623A publication Critical patent/CN109117623A/en
Application granted granted Critical
Publication of CN109117623B publication Critical patent/CN109117623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Abstract

The invention discloses a kind of application method for managing security, device and storage medium is related to, belong to using safety management technology field.Method includes: to judge whether the position of the application icon of the corresponding application program of the operation is consistent with predeterminated position when current interface performs the operation of input password;If consistent, the application program is sent to after the password that user inputs is handled according to preset algorithm and is authenticated;Otherwise, the application program is sent to after the password that user inputs being handled according to random algorithm to authenticate.Situations such as password leaks, intelligent terminal is lost bring security risk can reduce using the present invention, improve the safety coefficient of product.

Description

A kind of application method for managing security, device and storage medium
Technical field
The present invention relates to application safety management technology field more particularly to a kind of application method for managing security, device and deposit Storage media.
Background technique
Quick with smart phone is popularized, and the business such as mobile payment obtain rapid growth in the service of mobile phone terminal, The stolen big security threat for but becoming ordinary user with monetary losses of the following customer information.For example user is frequently necessary to Payment cipher is inputted in public arenas such as dining room, station, markets, there are peep of cipher, the risk stolen;In addition, user is same Sample faces the risk that various information is stolen in mobile payment application after smart phone is lost;Therefore, by single code authentication Mode can no longer meet the demand for security of user.
How to provide a kind of safely and conveniently using method for managing security as intelligent terminal urgent problem.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of application method for managing security, device and storage medium, with solution The problem of certainly prior art can no longer meet the demand for security of user by single code authentication mode.
It is as follows that the present invention solves technical solution used by above-mentioned technical problem:
According to the first aspect of the invention, a kind of application security management method is provided, which comprises
When current interface performs the operation of input password, the application icon of the corresponding application program of the operation is judged Position it is whether consistent with predeterminated position;
If consistent, the application program is sent to after the password that user inputs is handled according to preset algorithm and is authenticated;
Otherwise, the application program is sent to after the password that user inputs being handled according to random algorithm to authenticate.
Preferably, whether the position of the application icon for judging the control owning application is consistent with predeterminated position Before, the method also includes:
The secure option of the application program is preset and stored depending on the user's operation, and the secure option includes institute State the location information of application icon, the control for needing to carry out safety management to the application program markup information and according to The temporary password of family input and the preset password mapping algorithm that really corresponding relationship of password generates.
Preferably, the method that the location information of the application icon is arranged includes:
The location information of the relative position of the application icon is set, the relative position be the application icon relative to With reference to application icon locality and the locality on the application icon and the position with reference to application icon Distance;
The method for needing the control for carrying out safety management to be labeled the application program, comprising:
Record the control information of the control, the control information include packet name, class name, control absolute coordinate position and At least one of control relative position.
Preferably, the method also includes:
Whether monitoring current interface occurs obtaining the control of input focus;
If so, judging whether the control is mark control according to the control property of the control;
If so, judging that current interface performs the operation of input password.
Preferably, after user exits described program, the method also includes:
The position of the application icon is adjusted at random.
According to the second aspect of the invention, application security managing device is provided, intelligent terminal, the dress are suitable for It sets and includes:
Judgment module when for performing the operation of input password in current interface, judges the corresponding application of the operation Whether the position of the application icon of program is consistent with predeterminated position;
Processing module, for when the judgment result of the judgment module is yes by the password of user's input according to pre- imputation It is sent to the application program after method processing and is authenticated, or when being no for the judging result in the judgment module, it will The password of user's input is sent to the application program after handling according to random algorithm and authenticates;
Sending module, for treated, password is sent to the application program is authenticated.
Preferably, described device further include:
Setup module, for the position for judging the application icon of the control owning application whether with predeterminated position Before consistent, the secure option of the application program is preset and stored depending on the user's operation, the secure option includes The location information of the application icon, the application program is needed to carry out safety management control markup information and according to The temporary password of user's input and the preset password mapping algorithm that really corresponding relationship of password generates.
Preferably, the setup module further include:
Submodule, the location information of the relative position for the application icon to be arranged, the relative position is arranged in position It is the application icon relative to the application icon and institute on the locality and the locality of reference application icon State the positional distance with reference to application icon;
Control marks submodule, is also used to record the control information of the control, the control information includes packet name, class At least one of name, control absolute coordinate position and control relative position.
Preferably, described device further include:
Monitoring module for monitoring whether current interface occurs obtaining the control of input focus, and is occurring being inputted When the control of focus, judge whether the control is mark control according to the control property of the control, and be in the control When marking control, judge that current interface performs the operation of input password.
Preferably, described device further include:
Icon adjusts module, for adjusting the position of the application icon at random after user exits the application program.
According to the third aspect of the present invention, a kind of storage medium is provided, which is characterized in that the storage medium is stored with One or more program, one or more of programs can be executed by one or more processor, to realize such as first Step described in aspect.
Application method for managing security, device and the storage medium of the embodiment of the present invention, code authentication and application icon Position is associated, and only at the position of application icon and all correct password, could pass through authentication, and pass through temporary password Real password is mapped, situations such as password leaks, intelligent terminal is lost bring security risk is can reduce, improves product Safety coefficient.
Detailed description of the invention
Fig. 1 is a kind of flow chart for application security management method that the embodiment of the present invention one provides;
Fig. 2 is in the embodiment of the present invention two to the method flow diagram of the setting of secure option;
Fig. 3 is the default schematic diagram of intelligent terminal desktop icons position in the embodiment of the present invention two;
The method flow diagram of Fig. 4 application program progress code authentication;
Fig. 5 is intelligent terminal safe input system block schematic illustration in the embodiment of the present invention;
Fig. 6 is safe input system block flow diagram in the embodiment of the present invention;
A kind of structural schematic diagram for application security managing device that Fig. 7 embodiment of the present invention three provides.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to be clearer and more clear technical problems, technical solutions and advantages to be solved, tie below Drawings and examples are closed, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only To explain the present invention, it is not intended to limit the present invention.
The embodiment of the present invention one provides a kind of application security management method, is suitable for intelligent terminal.Please refer to figure 1, this method comprises:
S101, when current interface performs the operation of input password, judge that the corresponding application program of the operation is answered It is whether consistent with predeterminated position with the position of icon, if so, executing step S102, otherwise, execute step S103;
S102, it is sent to the application program after handling the password that user inputs according to preset algorithm and authenticates;
S103, it is sent to the application program after handling the password that user inputs according to random algorithm and authenticates.
In a feasible scheme, step S102 includes:
The password of user's input is subjected to Mapping and Converting, and the password that will be obtained after conversion according to preset password mapping algorithm The application program is sent to be authenticated;
In a feasible scheme, step S103 includes:
The password of user's input is subjected to random transition, and the password that will be obtained after conversion according to random cipher mapping algorithm The application program is sent to be authenticated.
In a feasible scheme, before step S101, this method further include:
The secure option of the application program is preset and stored depending on the user's operation, which includes the application The location information of icon, the application program is needed to carry out safety management control markup information and according to user input The preset password mapping algorithm that the corresponding relationship of temporary password and really password generates.
In a feasible scheme, this method further include:
Whether monitoring current interface occurs obtaining the control of input focus;
If so, judging whether the control is mark control according to the control property of the control;
If so, judging that current interface performs the operation of input password.
In a feasible scheme, the method that the location information of the application icon is arranged includes:
The location information of the relative position of the application icon is set, which is that the application icon is answered relative to reference The positional distance of application icon is referred to this with the application icon on the locality of icon and the locality.
In practical application, user can first select an opposite application, and current application icon is then arranged relative to opposite The distance of two application icon positions on the direction of relative position is finally arranged in the locality of application icon.For example, current The application for needing to encrypt is A, at default application icon position, first selects one and applies B relatively, A application icon is then arranged Direction of the position relative to B application icon, specific direction can be upper and lower, left and right, upper left, lower-left, upper right, bottom right, finally The relative distance of A and B icon is set, can be 1,2,3,4 etc..The relative position that can complete A application in this way is default, such as A The icon of application is located at first, the right side of B application icon or the icon of A application is located at the top first of B application icon.
In a feasible scheme, to the method that the application program needs the control for carrying out safety management to be labeled, Include:
The control information of the control is recorded, which includes packet name, class name, control absolute coordinate position and control At least one of relative position.
After the picture mark position for completing application is default, the code input control for needing to carry out safety management in application is carried out Mark, for example the Password Input frame control of the Password Input page in application is labeled.
In practical application, the mask method to code input control is to record the control information, including packet name, class name, control Part absolute coordinate position, control relative position etc., to achieve the purpose that uniquely determine control, system preservation is marked The control information of note.
In a feasible scheme, after user exits the application program, this method further include:
The position of the application icon is adjusted at random.
In practical application, when can be set to pass through when subscription authentication and normally exit the application program, random adjustment should The position of application icon.
It is random to adjust application icon position when user in normal use and exits using after a certain period of time in practical application Movement, complete application icon position adjust automatically.Specifically, the method for system call interception application icon position is modification desktop Icon data library file adjusts the position of application icon.
Specifically, the strategy of adjustment application icon position can be customized by the user at random, in order to facilitate user's one hand behaviour Making quickly reduction picture mark position can be with relatively applied picture mark position for circle when adjusting picture mark position at random to predeterminated position, system The heart, facilitating the distance of one-handed performance is radius, adjusts picture mark position at random in the border circular areas, such mode can be convenient User's one-handed performance quickly restores picture mark position to predeterminated position.
In practical application, in order to which, by authentication, user needs before starting application program after inputting password, reduction application Picture mark position is to predeterminated position.
The position of the icon of application program is all when due to exiting the application program including the control being marked every time, on desktop It can be upset at random, in the case where not knowing the predeterminated position of application icon, be unable to map having input temporary password It generates real password and passes through authentication.
In the present embodiment, user can carry out preset in advance to the desktop icons position of each application and temporary password, When public arena is using social activity, bank, payment class important application, even if peep of cipher, stealing, what other people obtained is also to face When password, payment is unable to complete in other equipment by temporary password or logs in authentication;Still further aspect, when mobile terminal is lost When mistake, temporary password are stolen, the picture mark position due to application is upset at random, other people can not know the default position of application icon It sets, code authentication operation is also unable to complete by temporary password.
The application security management method of the present embodiment, is associated the position of code authentication and application icon, only Have in position and all correct password of application icon, authentication could be passed through, and real password is mapped by temporary password, It can reduce situations such as password leaks, intelligent terminal is lost bring security risk, improve the safety coefficient of product.
On the basis of previous embodiment, second embodiment of the present invention provides another application security management methods. For the convenience of description, being carried out respectively in the method that the present embodiment manages the program safety to setting secure option and code authentication Explanation.
Referring to Fig. 2, the setting to secure option includes the following steps:
S201, enter preset function interface when user input systems administrator's password.
S202, the application program for needing to carry out safety management is determined according to the user's choice, and pre- depending on the user's operation If the location information on the table of the application icon.
As shown in figure 3, the position of the application icon of application program A is determined by the picture mark position of application program B, then B Application icon is the reference application icon of A application icon.A application icon position is located at the right side of B application icon position in Fig. 3 First.The screen number for the display screen that the preset location information of A application icon is currently located independent of application icon, icon institute Line number, columns, only determined with location information relative to B application icon.
S203, the code input control in the application program is labeled, and is believed by the control of interface layout control Breath navigates to control.
S204, password mapping algorithm is generated according to the temporary password of user's input and true password.
Wherein, temporary password can be used for subsequent applied cryptography authentication, and really password is real when applied cryptography authenticates Password.
Specifically, user inputs the marked corresponding temporary password of control and true password, system according to temporary password with The password mapping algorithm that true password generates a temporary password between true password, and save the preset password mapping algorithm.Root According to the algorithm, temporary password, which can map, generates true password.
S205, the preset position information of application icon, control markup information, password mapping algorithm are saved, for after It is used when continuous code authentication.
Referring to Fig. 4, the method that application program carries out code authentication includes the following steps:
S401, the current control for obtaining input focus of monitoring, obtain control information.
In practical application, the method for system monitoring table activity window is completed by system service, such as in Android It in system, is monitored by Window Manager Service service, and the control by currently obtaining input focus Packet name, class name, control absolute coordinate position, the information such as control relative position judge whether present convergence control is default mark Code input control.
Control information judgement in S402, the control information and secure option that are obtained according to step S401 obtains input focus Control whether be the control marked, if so, execute step S403 otherwise continue to execute step S402.
S403, obtain current focus control owning application application icon location information.
In practical application, whether systems inspection application current icon position is preset icon position, can be by preset Judge with respect to picture mark position, i.e. the relative direction of current application picture mark position and relatively applied picture mark position, relative distance To judge.
In practical application, the current icon position for obtaining application can be completed by reading the database of desktop application icon Acquisition of information, for example application icon location information can be completed by Launcher Provider in android system and obtained It takes.
S404, judge whether the location information of the current application icon of application program is consistent with preset location information;If Unanimously, step S405 is executed, otherwise, executes step S409.
S405, when user activates input keyboard in code input control, obtain user input temporary password.
In practical application, it can be obtained by customized input management service (Input Method Manager Service) The temporary password for the user's input for taking input method process to generate.
S406, pass through preset password mapping algorithm, generated to obtain true password by temporary password.
S407, by obtained true password transmission to application program, true password is inputted on control.
S408, application program successfully complete code authentication by true password.
In practical application, if user's temporary password input error, it can not also be generated by preset password mapping algorithm Password when obtaining true, authenticate still will fail at this time.
S409 obtains the temporary password of user's input when user activates input keyboard in code input control.
S410, using random cipher mapping algorithm, the temporary password that user inputs is mapped as random character.
S411, random cipher pass to application program, and random cipher is inputted on control.
S412, code authentication operation, failed authentication are unable to complete using by random cipher.
In practical application, in the step S409, even if input be temporary password be correctly, due to use at this time with Secret code mapping algorithm is also unable to map to obtain true password, and therefore, authentication still will fail.
In practical application, password is inputted to user in above-mentioned process and carries out the Password Input for generating mapping after mapping processing The specific method for obtaining the control (step S405-S407, step S409-S411) of input hot spot please participate in Fig. 5 and Fig. 6.
It includes target program, system process, input method process three parts in system framework that intelligent terminal, which typically enters,.
Work as target program, when needing to input character content such as social software, Mobile banking's software, first to system process Shen Input method procedure please be open, when system process receives application, binding input frame and display input method.For example, being based on Pass through Input Method in the system terminal of Android respectively in target program, system process and input method process respectively Manager, Input Method Manager Service, Input Method Service carry out collaborative interactive.
When input method procedure generates character, character content is not transmitted directly to target program, needs to pass through system process Target program is passed to after being handled again.System process receives the temporary password that input method procedure generates, and by corresponding Algorithm is these characters character that is mapped as that treated, then again by system process will treated that character passes to target journey Sequence, to complete the map operation of password.
Specific system framework flow chart is used to as shown in fig. 6, customized input management service is added in input system The mapping of password is completed, detailed process is as follows:
User carries out input operation by touch screen, physical button etc.;
Firstly, the drivers such as system kernel layer touch screen, physical button are advised according to the event of multi-point touch protocol definition Physical signal is then converted to incoming event, and is written to equipment input node;Such as in the intelligence system based on linux, Input equipment file is under/dev/input/ catalogue.
Then, system framework layer incoming event processing thread is responsible for reading the incoming event in equipment input node, and passes It passs upper level applications and generates character.
For example, incoming event handles thread for the incoming event of user when user calls input method procedure to input character Input method procedure is passed to, then input method procedure generates character according to incoming incoming event.
In the present embodiment, system framework layer is except completing conventional incoming event and read input outer, also customized and manage to take Business program, by application icon current location information, password mapping algorithm, the password that input method is generated maps the service routine For treated password.
Finally, input processing thread by the password transmission obtained after processing to target program, and then complete the input of password.
A kind of application security management method of the present embodiment, in the management of intelligent terminal existing password and input system base On plinth, safety management promotion is carried out to the password of application program, is reduced because of situations such as applied cryptography leaks, intelligent terminal is lost band The security risk come, improves the safety coefficient of product.
On the basis of the above embodiments, third embodiment of the invention provides a kind of application security managing device, Suitable for intelligent terminal, referring to Fig. 7, the device includes:
Judgment module 701 when for performing the operation of input password in current interface, judging that the operation is corresponding and answering Whether the position with the application icon of program is consistent with predeterminated position;
Processing module 702, for when the judgment result of the judgment module is yes by the password of user's input according to pre- If being sent to the application program after algorithm process to be authenticated, or for being no in the judging result of the judgment module When, the application program, which is sent to, after the password that user inputs is handled according to random algorithm authenticates;
Sending module 703 is authenticated for the password obtained after conversion to be sent to the application program.
In a feasible scheme, the device further include:
Setup module, for the position for judging the application icon of the control owning application whether with predeterminated position Before consistent, the secure option of the application program is preset and stored depending on the user's operation, which answers including this With the location information of icon, the markup information for the control for carrying out safety management is needed to the application program and is inputted according to user Temporary password and really password corresponding relationship generate preset password mapping algorithm.
In a feasible scheme, the setup module further include:
Submodule, the location information of the relative position for the application icon to be arranged is arranged in position, which is should Application icon refers to application drawing with this relative to the application icon on the locality and the locality of reference application icon Target positional distance.
Control marks submodule, is also used to record the control information of the control, which includes packet name, class name, control At least one of part absolute coordinate position and control relative position.
In a feasible scheme, the device further include:
Monitoring module for monitoring whether current interface occurs obtaining the control of input focus, and is occurring being inputted When the control of focus, judge whether the control is mark control according to the control property of the control, and be mark in the control When control, judge that current interface performs the operation of input password.
In practical application, whether the authentication which can also monitor the application program succeeds and the application program Whether normally exit.
In a feasible scheme, described device further include:
Icon adjusts module, for adjusting the position of the application icon at random after user exits the application program.
When user in normal use and exits using after a certain period of time, icon adjustment module can adjust application icon at random The adjust automatically of application icon position is completed in the movement of position.Specifically, the method for system call interception application icon position can be The position of application icon is adjusted by modification desktop icons database file.
Specifically, the strategy of adjustment application icon position can be customized by the user at random, in order to facilitate user's one hand behaviour Making quickly reduction picture mark position can be with relatively applied picture mark position for circle when adjusting picture mark position at random to predeterminated position, system The heart, facilitating the distance of one-handed performance is radius, adjusts picture mark position at random in the border circular areas, such mode can be convenient User's one-handed performance quickly restores picture mark position to predeterminated position.
The application security managing device of the present embodiment, is associated the position of code authentication and application icon, only Have in position and all correct password of application icon, authentication could be passed through, and real password is mapped by temporary password, It can reduce situations such as password leaks, intelligent terminal is lost bring security risk, improve the safety coefficient of product.
On the basis of previous embodiment, the embodiment of the present invention four provides a kind of storage medium, storage medium storage There is one or more program, which can be executed by one or more processor, to realize as implemented Example one this step of.
Preferred embodiments of the present invention have been described above with reference to the accompanying drawings, not thereby limiting the scope of the invention.This Field technical staff without departing from the scope and spirit of the invention in made by any modifications, equivalent replacements, and improvements, should all this Within the interest field of invention.

Claims (11)

1. a kind of application security management method, which is characterized in that the described method includes:
When current interface performs the operation of input password, the position of the application icon of the corresponding application program of the operation is judged It whether consistent with predeterminated position sets;
If consistent, the application program is sent to after the password that user inputs is handled according to preset algorithm and is authenticated;
Otherwise, the application program is sent to after the password that user inputs being handled according to random algorithm to authenticate.
2. the method as described in claim 1, which is characterized in that the application icon of the judgement control owning application Position it is whether consistent with predeterminated position before, the method also includes:
The secure option of the application program is preset and stored depending on the user's operation, and the secure option includes described answers It is defeated with the location information of icon, the markup information for the control for needing to carry out safety management to the application program and according to user The preset password mapping algorithm that the corresponding relationship of the temporary password that enters and really password generates.
3. method according to claim 2, which is characterized in that the method that the location information of the application icon is arranged includes:
The location information of the relative position of the application icon is set, and the relative position is the application icon relative to reference The application icon and the positional distance with reference to application icon on the locality of application icon and the locality;
The method for needing the control for carrying out safety management to be labeled the application program, comprising:
The control information of the control is recorded, the control information includes packet name, class name, control absolute coordinate position and control At least one of relative position.
4. method as claimed in claim 3, which is characterized in that the method also includes:
Whether monitoring current interface occurs obtaining the control of input focus;
If so, judging whether the control is mark control according to the control property of the control;
If so, judging that current interface performs the operation of input password.
5. such as the described in any item methods of Claims 1-4, which is characterized in that after user exits described program, the side Method further include:
The position of the application icon is adjusted at random.
6. a kind of application security managing device, which is characterized in that described device includes:
Judgment module when for performing the operation of input password in current interface, judges the corresponding application program of the operation Application icon position it is whether consistent with predeterminated position;
Processing module, at when the judgment result of the judgment module is yes by the password of user's input according to preset algorithm The application program is sent to after reason to be authenticated, or for the judging result in the judgment module be it is no when, by user The password of input is sent to the application program and is authenticated after handling according to random algorithm;
Sending module, for treated, password is sent to the application program is authenticated.
7. method as claimed in claim 6, which is characterized in that described device further include:
Setup module, for whether consistent with predeterminated position in the position for the application icon for judging the control owning application Before, the secure option of the application program is preset and stored depending on the user's operation, and the secure option includes described The location information of application icon, the application program is needed to carry out safety management control markup information and according to user The preset password mapping algorithm that the corresponding relationship of the temporary password of input and really password generates.
8. device as claimed in claim 7, which is characterized in that the setup module further include:
Submodule is arranged in position, and the location information of the relative position for the application icon to be arranged, the relative position is institute Application icon is stated relative to the application icon on the locality and the locality of reference application icon and the ginseng Examine the positional distance of application icon;
Control marks submodule, is also used to record the control information of the control, the control information includes packet name, class name, control At least one of part absolute coordinate position and control relative position.
9. device as claimed in claim 8, which is characterized in that described device further include:
Monitoring module for monitoring whether current interface occurs obtaining the control of input focus, and is occurring obtaining input focus Control when, according to the control property of the control judge the control whether be mark control, and the control be mark When control, judge that current interface performs the operation of input password.
10. such as the described in any item devices of claim 6 to 9, which is characterized in that described device further include:
Icon adjusts module, for adjusting the position of the application icon at random after user exits the application program.
11. a kind of storage medium, which is characterized in that the storage medium is stored with one or more program, it is one or The multiple programs of person can be executed by one or more processor, to realize such as step described in any one of claim 1 to 5.
CN201710492686.4A 2017-06-23 2017-06-23 Application security management method, device and storage medium Active CN109117623B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710492686.4A CN109117623B (en) 2017-06-23 2017-06-23 Application security management method, device and storage medium
PCT/CN2018/092689 WO2018233718A1 (en) 2017-06-23 2018-06-25 Application program security management method and apparatus, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710492686.4A CN109117623B (en) 2017-06-23 2017-06-23 Application security management method, device and storage medium

Publications (2)

Publication Number Publication Date
CN109117623A true CN109117623A (en) 2019-01-01
CN109117623B CN109117623B (en) 2024-01-05

Family

ID=64732416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710492686.4A Active CN109117623B (en) 2017-06-23 2017-06-23 Application security management method, device and storage medium

Country Status (2)

Country Link
CN (1) CN109117623B (en)
WO (1) WO2018233718A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103744583A (en) * 2014-01-22 2014-04-23 联想(北京)有限公司 Operation processing method and device and electronic device
CN103778362A (en) * 2014-01-21 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Unlocking method of communication terminal and communication terminal
WO2014146551A1 (en) * 2013-03-18 2014-09-25 Huang Weiqiang Method for locking and unlocking touch screen mobile phone which is unlocked based on pattern pairing mode
CN104516645A (en) * 2013-09-26 2015-04-15 上海斐讯数据通信技术有限公司 Electronic device unlocking method
CN106250754A (en) * 2016-07-27 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal
CN106453802A (en) * 2016-11-30 2017-02-22 努比亚技术有限公司 Cipher verification method and device, and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034446B (en) * 2012-12-13 2015-10-28 广东欧珀移动通信有限公司 A kind of is the unblock of electronic installation operation interface and the method and apparatus switching theme
CN105630320B (en) * 2015-06-26 2018-12-25 东莞酷派软件技术有限公司 The unlocking screen method and screen unlocking device of terminal
CN105809445A (en) * 2016-02-29 2016-07-27 宇龙计算机通信科技(深圳)有限公司 Password verifying and processing method, apparatus and terminal
CN105844145A (en) * 2016-04-19 2016-08-10 广州三星通信技术研究有限公司 Method and equipment for managing passwords

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014146551A1 (en) * 2013-03-18 2014-09-25 Huang Weiqiang Method for locking and unlocking touch screen mobile phone which is unlocked based on pattern pairing mode
CN104516645A (en) * 2013-09-26 2015-04-15 上海斐讯数据通信技术有限公司 Electronic device unlocking method
CN103778362A (en) * 2014-01-21 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Unlocking method of communication terminal and communication terminal
CN103744583A (en) * 2014-01-22 2014-04-23 联想(北京)有限公司 Operation processing method and device and electronic device
CN106250754A (en) * 2016-07-27 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal
CN106453802A (en) * 2016-11-30 2017-02-22 努比亚技术有限公司 Cipher verification method and device, and terminal

Also Published As

Publication number Publication date
CN109117623B (en) 2024-01-05
WO2018233718A1 (en) 2018-12-27

Similar Documents

Publication Publication Date Title
US11665200B2 (en) System and method for second factor authentication to perform services
CN103249045B (en) A kind of methods, devices and systems of identification
US8990909B2 (en) Out-of-band challenge question authentication
CN103581166B (en) Location aware certification
CN104184705B (en) Verification method, device, server, subscriber data center and system
US9473467B2 (en) Customer controlled data privacy protection in public cloud
CN101794365B (en) The method of safely inputting information and mobile terminal on mobile terminals
CN107210916A (en) Condition, which is logged in, to be promoted
US11270291B2 (en) Systems and methods for data access control using a short-range transceiver
CN109600525A (en) The control method and device of call center based on virtual reality
US20200127993A1 (en) Systems and methods for data access control and account management
CN105337974A (en) Account authorization method, account login method, account authorization device and client end
US11233897B1 (en) Secure call center communications
JP2017073062A (en) Communication support system
CN105868610A (en) Method and system for realizing user authentication through biological characteristic information
US11764962B2 (en) Systems and methods for data access control of secure memory using a short-range transceiver
CN105635164B (en) The method and apparatus of safety certification
CN105871840B (en) A kind of certificate management method and system
CN107835161B (en) Method, system and the computer storage medium of inside and outside user's unified management
CN109117623A (en) A kind of application method for managing security, device and storage medium
CN108322907A (en) One kind opening chucking method and terminal
US20200314650A1 (en) Controlling access to protected resource using a heat map
US11709924B2 (en) Secure authentication
US11816231B2 (en) Using machine-learning models to determine graduated levels of access to secured data for remote devices
US11956224B2 (en) Using machine-learning models to authenticate users and protect enterprise-managed information and resources

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant