CN109117623A - A kind of application method for managing security, device and storage medium - Google Patents
A kind of application method for managing security, device and storage medium Download PDFInfo
- Publication number
- CN109117623A CN109117623A CN201710492686.4A CN201710492686A CN109117623A CN 109117623 A CN109117623 A CN 109117623A CN 201710492686 A CN201710492686 A CN 201710492686A CN 109117623 A CN109117623 A CN 109117623A
- Authority
- CN
- China
- Prior art keywords
- control
- password
- application
- application icon
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 68
- 238000007726 management method Methods 0.000 claims description 23
- 238000013507 mapping Methods 0.000 claims description 21
- 238000012544 monitoring process Methods 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 8
- 241000208340 Araliaceae Species 0.000 claims 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims 1
- 235000003140 Panax quinquefolius Nutrition 0.000 claims 1
- 235000008434 ginseng Nutrition 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 2
- 230000026676 system process Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000009467 reduction Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 244000144985 peep Species 0.000 description 2
- 238000007689 inspection Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Abstract
The invention discloses a kind of application method for managing security, device and storage medium is related to, belong to using safety management technology field.Method includes: to judge whether the position of the application icon of the corresponding application program of the operation is consistent with predeterminated position when current interface performs the operation of input password;If consistent, the application program is sent to after the password that user inputs is handled according to preset algorithm and is authenticated;Otherwise, the application program is sent to after the password that user inputs being handled according to random algorithm to authenticate.Situations such as password leaks, intelligent terminal is lost bring security risk can reduce using the present invention, improve the safety coefficient of product.
Description
Technical field
The present invention relates to application safety management technology field more particularly to a kind of application method for managing security, device and deposit
Storage media.
Background technique
Quick with smart phone is popularized, and the business such as mobile payment obtain rapid growth in the service of mobile phone terminal,
The stolen big security threat for but becoming ordinary user with monetary losses of the following customer information.For example user is frequently necessary to
Payment cipher is inputted in public arenas such as dining room, station, markets, there are peep of cipher, the risk stolen;In addition, user is same
Sample faces the risk that various information is stolen in mobile payment application after smart phone is lost;Therefore, by single code authentication
Mode can no longer meet the demand for security of user.
How to provide a kind of safely and conveniently using method for managing security as intelligent terminal urgent problem.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of application method for managing security, device and storage medium, with solution
The problem of certainly prior art can no longer meet the demand for security of user by single code authentication mode.
It is as follows that the present invention solves technical solution used by above-mentioned technical problem:
According to the first aspect of the invention, a kind of application security management method is provided, which comprises
When current interface performs the operation of input password, the application icon of the corresponding application program of the operation is judged
Position it is whether consistent with predeterminated position;
If consistent, the application program is sent to after the password that user inputs is handled according to preset algorithm and is authenticated;
Otherwise, the application program is sent to after the password that user inputs being handled according to random algorithm to authenticate.
Preferably, whether the position of the application icon for judging the control owning application is consistent with predeterminated position
Before, the method also includes:
The secure option of the application program is preset and stored depending on the user's operation, and the secure option includes institute
State the location information of application icon, the control for needing to carry out safety management to the application program markup information and according to
The temporary password of family input and the preset password mapping algorithm that really corresponding relationship of password generates.
Preferably, the method that the location information of the application icon is arranged includes:
The location information of the relative position of the application icon is set, the relative position be the application icon relative to
With reference to application icon locality and the locality on the application icon and the position with reference to application icon
Distance;
The method for needing the control for carrying out safety management to be labeled the application program, comprising:
Record the control information of the control, the control information include packet name, class name, control absolute coordinate position and
At least one of control relative position.
Preferably, the method also includes:
Whether monitoring current interface occurs obtaining the control of input focus;
If so, judging whether the control is mark control according to the control property of the control;
If so, judging that current interface performs the operation of input password.
Preferably, after user exits described program, the method also includes:
The position of the application icon is adjusted at random.
According to the second aspect of the invention, application security managing device is provided, intelligent terminal, the dress are suitable for
It sets and includes:
Judgment module when for performing the operation of input password in current interface, judges the corresponding application of the operation
Whether the position of the application icon of program is consistent with predeterminated position;
Processing module, for when the judgment result of the judgment module is yes by the password of user's input according to pre- imputation
It is sent to the application program after method processing and is authenticated, or when being no for the judging result in the judgment module, it will
The password of user's input is sent to the application program after handling according to random algorithm and authenticates;
Sending module, for treated, password is sent to the application program is authenticated.
Preferably, described device further include:
Setup module, for the position for judging the application icon of the control owning application whether with predeterminated position
Before consistent, the secure option of the application program is preset and stored depending on the user's operation, the secure option includes
The location information of the application icon, the application program is needed to carry out safety management control markup information and according to
The temporary password of user's input and the preset password mapping algorithm that really corresponding relationship of password generates.
Preferably, the setup module further include:
Submodule, the location information of the relative position for the application icon to be arranged, the relative position is arranged in position
It is the application icon relative to the application icon and institute on the locality and the locality of reference application icon
State the positional distance with reference to application icon;
Control marks submodule, is also used to record the control information of the control, the control information includes packet name, class
At least one of name, control absolute coordinate position and control relative position.
Preferably, described device further include:
Monitoring module for monitoring whether current interface occurs obtaining the control of input focus, and is occurring being inputted
When the control of focus, judge whether the control is mark control according to the control property of the control, and be in the control
When marking control, judge that current interface performs the operation of input password.
Preferably, described device further include:
Icon adjusts module, for adjusting the position of the application icon at random after user exits the application program.
According to the third aspect of the present invention, a kind of storage medium is provided, which is characterized in that the storage medium is stored with
One or more program, one or more of programs can be executed by one or more processor, to realize such as first
Step described in aspect.
Application method for managing security, device and the storage medium of the embodiment of the present invention, code authentication and application icon
Position is associated, and only at the position of application icon and all correct password, could pass through authentication, and pass through temporary password
Real password is mapped, situations such as password leaks, intelligent terminal is lost bring security risk is can reduce, improves product
Safety coefficient.
Detailed description of the invention
Fig. 1 is a kind of flow chart for application security management method that the embodiment of the present invention one provides;
Fig. 2 is in the embodiment of the present invention two to the method flow diagram of the setting of secure option;
Fig. 3 is the default schematic diagram of intelligent terminal desktop icons position in the embodiment of the present invention two;
The method flow diagram of Fig. 4 application program progress code authentication;
Fig. 5 is intelligent terminal safe input system block schematic illustration in the embodiment of the present invention;
Fig. 6 is safe input system block flow diagram in the embodiment of the present invention;
A kind of structural schematic diagram for application security managing device that Fig. 7 embodiment of the present invention three provides.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to be clearer and more clear technical problems, technical solutions and advantages to be solved, tie below
Drawings and examples are closed, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only
To explain the present invention, it is not intended to limit the present invention.
The embodiment of the present invention one provides a kind of application security management method, is suitable for intelligent terminal.Please refer to figure
1, this method comprises:
S101, when current interface performs the operation of input password, judge that the corresponding application program of the operation is answered
It is whether consistent with predeterminated position with the position of icon, if so, executing step S102, otherwise, execute step S103;
S102, it is sent to the application program after handling the password that user inputs according to preset algorithm and authenticates;
S103, it is sent to the application program after handling the password that user inputs according to random algorithm and authenticates.
In a feasible scheme, step S102 includes:
The password of user's input is subjected to Mapping and Converting, and the password that will be obtained after conversion according to preset password mapping algorithm
The application program is sent to be authenticated;
In a feasible scheme, step S103 includes:
The password of user's input is subjected to random transition, and the password that will be obtained after conversion according to random cipher mapping algorithm
The application program is sent to be authenticated.
In a feasible scheme, before step S101, this method further include:
The secure option of the application program is preset and stored depending on the user's operation, which includes the application
The location information of icon, the application program is needed to carry out safety management control markup information and according to user input
The preset password mapping algorithm that the corresponding relationship of temporary password and really password generates.
In a feasible scheme, this method further include:
Whether monitoring current interface occurs obtaining the control of input focus;
If so, judging whether the control is mark control according to the control property of the control;
If so, judging that current interface performs the operation of input password.
In a feasible scheme, the method that the location information of the application icon is arranged includes:
The location information of the relative position of the application icon is set, which is that the application icon is answered relative to reference
The positional distance of application icon is referred to this with the application icon on the locality of icon and the locality.
In practical application, user can first select an opposite application, and current application icon is then arranged relative to opposite
The distance of two application icon positions on the direction of relative position is finally arranged in the locality of application icon.For example, current
The application for needing to encrypt is A, at default application icon position, first selects one and applies B relatively, A application icon is then arranged
Direction of the position relative to B application icon, specific direction can be upper and lower, left and right, upper left, lower-left, upper right, bottom right, finally
The relative distance of A and B icon is set, can be 1,2,3,4 etc..The relative position that can complete A application in this way is default, such as A
The icon of application is located at first, the right side of B application icon or the icon of A application is located at the top first of B application icon.
In a feasible scheme, to the method that the application program needs the control for carrying out safety management to be labeled,
Include:
The control information of the control is recorded, which includes packet name, class name, control absolute coordinate position and control
At least one of relative position.
After the picture mark position for completing application is default, the code input control for needing to carry out safety management in application is carried out
Mark, for example the Password Input frame control of the Password Input page in application is labeled.
In practical application, the mask method to code input control is to record the control information, including packet name, class name, control
Part absolute coordinate position, control relative position etc., to achieve the purpose that uniquely determine control, system preservation is marked
The control information of note.
In a feasible scheme, after user exits the application program, this method further include:
The position of the application icon is adjusted at random.
In practical application, when can be set to pass through when subscription authentication and normally exit the application program, random adjustment should
The position of application icon.
It is random to adjust application icon position when user in normal use and exits using after a certain period of time in practical application
Movement, complete application icon position adjust automatically.Specifically, the method for system call interception application icon position is modification desktop
Icon data library file adjusts the position of application icon.
Specifically, the strategy of adjustment application icon position can be customized by the user at random, in order to facilitate user's one hand behaviour
Making quickly reduction picture mark position can be with relatively applied picture mark position for circle when adjusting picture mark position at random to predeterminated position, system
The heart, facilitating the distance of one-handed performance is radius, adjusts picture mark position at random in the border circular areas, such mode can be convenient
User's one-handed performance quickly restores picture mark position to predeterminated position.
In practical application, in order to which, by authentication, user needs before starting application program after inputting password, reduction application
Picture mark position is to predeterminated position.
The position of the icon of application program is all when due to exiting the application program including the control being marked every time, on desktop
It can be upset at random, in the case where not knowing the predeterminated position of application icon, be unable to map having input temporary password
It generates real password and passes through authentication.
In the present embodiment, user can carry out preset in advance to the desktop icons position of each application and temporary password,
When public arena is using social activity, bank, payment class important application, even if peep of cipher, stealing, what other people obtained is also to face
When password, payment is unable to complete in other equipment by temporary password or logs in authentication;Still further aspect, when mobile terminal is lost
When mistake, temporary password are stolen, the picture mark position due to application is upset at random, other people can not know the default position of application icon
It sets, code authentication operation is also unable to complete by temporary password.
The application security management method of the present embodiment, is associated the position of code authentication and application icon, only
Have in position and all correct password of application icon, authentication could be passed through, and real password is mapped by temporary password,
It can reduce situations such as password leaks, intelligent terminal is lost bring security risk, improve the safety coefficient of product.
On the basis of previous embodiment, second embodiment of the present invention provides another application security management methods.
For the convenience of description, being carried out respectively in the method that the present embodiment manages the program safety to setting secure option and code authentication
Explanation.
Referring to Fig. 2, the setting to secure option includes the following steps:
S201, enter preset function interface when user input systems administrator's password.
S202, the application program for needing to carry out safety management is determined according to the user's choice, and pre- depending on the user's operation
If the location information on the table of the application icon.
As shown in figure 3, the position of the application icon of application program A is determined by the picture mark position of application program B, then B
Application icon is the reference application icon of A application icon.A application icon position is located at the right side of B application icon position in Fig. 3
First.The screen number for the display screen that the preset location information of A application icon is currently located independent of application icon, icon institute
Line number, columns, only determined with location information relative to B application icon.
S203, the code input control in the application program is labeled, and is believed by the control of interface layout control
Breath navigates to control.
S204, password mapping algorithm is generated according to the temporary password of user's input and true password.
Wherein, temporary password can be used for subsequent applied cryptography authentication, and really password is real when applied cryptography authenticates
Password.
Specifically, user inputs the marked corresponding temporary password of control and true password, system according to temporary password with
The password mapping algorithm that true password generates a temporary password between true password, and save the preset password mapping algorithm.Root
According to the algorithm, temporary password, which can map, generates true password.
S205, the preset position information of application icon, control markup information, password mapping algorithm are saved, for after
It is used when continuous code authentication.
Referring to Fig. 4, the method that application program carries out code authentication includes the following steps:
S401, the current control for obtaining input focus of monitoring, obtain control information.
In practical application, the method for system monitoring table activity window is completed by system service, such as in Android
It in system, is monitored by Window Manager Service service, and the control by currently obtaining input focus
Packet name, class name, control absolute coordinate position, the information such as control relative position judge whether present convergence control is default mark
Code input control.
Control information judgement in S402, the control information and secure option that are obtained according to step S401 obtains input focus
Control whether be the control marked, if so, execute step S403 otherwise continue to execute step S402.
S403, obtain current focus control owning application application icon location information.
In practical application, whether systems inspection application current icon position is preset icon position, can be by preset
Judge with respect to picture mark position, i.e. the relative direction of current application picture mark position and relatively applied picture mark position, relative distance
To judge.
In practical application, the current icon position for obtaining application can be completed by reading the database of desktop application icon
Acquisition of information, for example application icon location information can be completed by Launcher Provider in android system and obtained
It takes.
S404, judge whether the location information of the current application icon of application program is consistent with preset location information;If
Unanimously, step S405 is executed, otherwise, executes step S409.
S405, when user activates input keyboard in code input control, obtain user input temporary password.
In practical application, it can be obtained by customized input management service (Input Method Manager Service)
The temporary password for the user's input for taking input method process to generate.
S406, pass through preset password mapping algorithm, generated to obtain true password by temporary password.
S407, by obtained true password transmission to application program, true password is inputted on control.
S408, application program successfully complete code authentication by true password.
In practical application, if user's temporary password input error, it can not also be generated by preset password mapping algorithm
Password when obtaining true, authenticate still will fail at this time.
S409 obtains the temporary password of user's input when user activates input keyboard in code input control.
S410, using random cipher mapping algorithm, the temporary password that user inputs is mapped as random character.
S411, random cipher pass to application program, and random cipher is inputted on control.
S412, code authentication operation, failed authentication are unable to complete using by random cipher.
In practical application, in the step S409, even if input be temporary password be correctly, due to use at this time with
Secret code mapping algorithm is also unable to map to obtain true password, and therefore, authentication still will fail.
In practical application, password is inputted to user in above-mentioned process and carries out the Password Input for generating mapping after mapping processing
The specific method for obtaining the control (step S405-S407, step S409-S411) of input hot spot please participate in Fig. 5 and Fig. 6.
It includes target program, system process, input method process three parts in system framework that intelligent terminal, which typically enters,.
Work as target program, when needing to input character content such as social software, Mobile banking's software, first to system process Shen
Input method procedure please be open, when system process receives application, binding input frame and display input method.For example, being based on
Pass through Input Method in the system terminal of Android respectively in target program, system process and input method process respectively
Manager, Input Method Manager Service, Input Method Service carry out collaborative interactive.
When input method procedure generates character, character content is not transmitted directly to target program, needs to pass through system process
Target program is passed to after being handled again.System process receives the temporary password that input method procedure generates, and by corresponding
Algorithm is these characters character that is mapped as that treated, then again by system process will treated that character passes to target journey
Sequence, to complete the map operation of password.
Specific system framework flow chart is used to as shown in fig. 6, customized input management service is added in input system
The mapping of password is completed, detailed process is as follows:
User carries out input operation by touch screen, physical button etc.;
Firstly, the drivers such as system kernel layer touch screen, physical button are advised according to the event of multi-point touch protocol definition
Physical signal is then converted to incoming event, and is written to equipment input node;Such as in the intelligence system based on linux,
Input equipment file is under/dev/input/ catalogue.
Then, system framework layer incoming event processing thread is responsible for reading the incoming event in equipment input node, and passes
It passs upper level applications and generates character.
For example, incoming event handles thread for the incoming event of user when user calls input method procedure to input character
Input method procedure is passed to, then input method procedure generates character according to incoming incoming event.
In the present embodiment, system framework layer is except completing conventional incoming event and read input outer, also customized and manage to take
Business program, by application icon current location information, password mapping algorithm, the password that input method is generated maps the service routine
For treated password.
Finally, input processing thread by the password transmission obtained after processing to target program, and then complete the input of password.
A kind of application security management method of the present embodiment, in the management of intelligent terminal existing password and input system base
On plinth, safety management promotion is carried out to the password of application program, is reduced because of situations such as applied cryptography leaks, intelligent terminal is lost band
The security risk come, improves the safety coefficient of product.
On the basis of the above embodiments, third embodiment of the invention provides a kind of application security managing device,
Suitable for intelligent terminal, referring to Fig. 7, the device includes:
Judgment module 701 when for performing the operation of input password in current interface, judging that the operation is corresponding and answering
Whether the position with the application icon of program is consistent with predeterminated position;
Processing module 702, for when the judgment result of the judgment module is yes by the password of user's input according to pre-
If being sent to the application program after algorithm process to be authenticated, or for being no in the judging result of the judgment module
When, the application program, which is sent to, after the password that user inputs is handled according to random algorithm authenticates;
Sending module 703 is authenticated for the password obtained after conversion to be sent to the application program.
In a feasible scheme, the device further include:
Setup module, for the position for judging the application icon of the control owning application whether with predeterminated position
Before consistent, the secure option of the application program is preset and stored depending on the user's operation, which answers including this
With the location information of icon, the markup information for the control for carrying out safety management is needed to the application program and is inputted according to user
Temporary password and really password corresponding relationship generate preset password mapping algorithm.
In a feasible scheme, the setup module further include:
Submodule, the location information of the relative position for the application icon to be arranged is arranged in position, which is should
Application icon refers to application drawing with this relative to the application icon on the locality and the locality of reference application icon
Target positional distance.
Control marks submodule, is also used to record the control information of the control, which includes packet name, class name, control
At least one of part absolute coordinate position and control relative position.
In a feasible scheme, the device further include:
Monitoring module for monitoring whether current interface occurs obtaining the control of input focus, and is occurring being inputted
When the control of focus, judge whether the control is mark control according to the control property of the control, and be mark in the control
When control, judge that current interface performs the operation of input password.
In practical application, whether the authentication which can also monitor the application program succeeds and the application program
Whether normally exit.
In a feasible scheme, described device further include:
Icon adjusts module, for adjusting the position of the application icon at random after user exits the application program.
When user in normal use and exits using after a certain period of time, icon adjustment module can adjust application icon at random
The adjust automatically of application icon position is completed in the movement of position.Specifically, the method for system call interception application icon position can be
The position of application icon is adjusted by modification desktop icons database file.
Specifically, the strategy of adjustment application icon position can be customized by the user at random, in order to facilitate user's one hand behaviour
Making quickly reduction picture mark position can be with relatively applied picture mark position for circle when adjusting picture mark position at random to predeterminated position, system
The heart, facilitating the distance of one-handed performance is radius, adjusts picture mark position at random in the border circular areas, such mode can be convenient
User's one-handed performance quickly restores picture mark position to predeterminated position.
The application security managing device of the present embodiment, is associated the position of code authentication and application icon, only
Have in position and all correct password of application icon, authentication could be passed through, and real password is mapped by temporary password,
It can reduce situations such as password leaks, intelligent terminal is lost bring security risk, improve the safety coefficient of product.
On the basis of previous embodiment, the embodiment of the present invention four provides a kind of storage medium, storage medium storage
There is one or more program, which can be executed by one or more processor, to realize as implemented
Example one this step of.
Preferred embodiments of the present invention have been described above with reference to the accompanying drawings, not thereby limiting the scope of the invention.This
Field technical staff without departing from the scope and spirit of the invention in made by any modifications, equivalent replacements, and improvements, should all this
Within the interest field of invention.
Claims (11)
1. a kind of application security management method, which is characterized in that the described method includes:
When current interface performs the operation of input password, the position of the application icon of the corresponding application program of the operation is judged
It whether consistent with predeterminated position sets;
If consistent, the application program is sent to after the password that user inputs is handled according to preset algorithm and is authenticated;
Otherwise, the application program is sent to after the password that user inputs being handled according to random algorithm to authenticate.
2. the method as described in claim 1, which is characterized in that the application icon of the judgement control owning application
Position it is whether consistent with predeterminated position before, the method also includes:
The secure option of the application program is preset and stored depending on the user's operation, and the secure option includes described answers
It is defeated with the location information of icon, the markup information for the control for needing to carry out safety management to the application program and according to user
The preset password mapping algorithm that the corresponding relationship of the temporary password that enters and really password generates.
3. method according to claim 2, which is characterized in that the method that the location information of the application icon is arranged includes:
The location information of the relative position of the application icon is set, and the relative position is the application icon relative to reference
The application icon and the positional distance with reference to application icon on the locality of application icon and the locality;
The method for needing the control for carrying out safety management to be labeled the application program, comprising:
The control information of the control is recorded, the control information includes packet name, class name, control absolute coordinate position and control
At least one of relative position.
4. method as claimed in claim 3, which is characterized in that the method also includes:
Whether monitoring current interface occurs obtaining the control of input focus;
If so, judging whether the control is mark control according to the control property of the control;
If so, judging that current interface performs the operation of input password.
5. such as the described in any item methods of Claims 1-4, which is characterized in that after user exits described program, the side
Method further include:
The position of the application icon is adjusted at random.
6. a kind of application security managing device, which is characterized in that described device includes:
Judgment module when for performing the operation of input password in current interface, judges the corresponding application program of the operation
Application icon position it is whether consistent with predeterminated position;
Processing module, at when the judgment result of the judgment module is yes by the password of user's input according to preset algorithm
The application program is sent to after reason to be authenticated, or for the judging result in the judgment module be it is no when, by user
The password of input is sent to the application program and is authenticated after handling according to random algorithm;
Sending module, for treated, password is sent to the application program is authenticated.
7. method as claimed in claim 6, which is characterized in that described device further include:
Setup module, for whether consistent with predeterminated position in the position for the application icon for judging the control owning application
Before, the secure option of the application program is preset and stored depending on the user's operation, and the secure option includes described
The location information of application icon, the application program is needed to carry out safety management control markup information and according to user
The preset password mapping algorithm that the corresponding relationship of the temporary password of input and really password generates.
8. device as claimed in claim 7, which is characterized in that the setup module further include:
Submodule is arranged in position, and the location information of the relative position for the application icon to be arranged, the relative position is institute
Application icon is stated relative to the application icon on the locality and the locality of reference application icon and the ginseng
Examine the positional distance of application icon;
Control marks submodule, is also used to record the control information of the control, the control information includes packet name, class name, control
At least one of part absolute coordinate position and control relative position.
9. device as claimed in claim 8, which is characterized in that described device further include:
Monitoring module for monitoring whether current interface occurs obtaining the control of input focus, and is occurring obtaining input focus
Control when, according to the control property of the control judge the control whether be mark control, and the control be mark
When control, judge that current interface performs the operation of input password.
10. such as the described in any item devices of claim 6 to 9, which is characterized in that described device further include:
Icon adjusts module, for adjusting the position of the application icon at random after user exits the application program.
11. a kind of storage medium, which is characterized in that the storage medium is stored with one or more program, it is one or
The multiple programs of person can be executed by one or more processor, to realize such as step described in any one of claim 1 to 5.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710492686.4A CN109117623B (en) | 2017-06-23 | 2017-06-23 | Application security management method, device and storage medium |
PCT/CN2018/092689 WO2018233718A1 (en) | 2017-06-23 | 2018-06-25 | Application program security management method and apparatus, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710492686.4A CN109117623B (en) | 2017-06-23 | 2017-06-23 | Application security management method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109117623A true CN109117623A (en) | 2019-01-01 |
CN109117623B CN109117623B (en) | 2024-01-05 |
Family
ID=64732416
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710492686.4A Active CN109117623B (en) | 2017-06-23 | 2017-06-23 | Application security management method, device and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109117623B (en) |
WO (1) | WO2018233718A1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103744583A (en) * | 2014-01-22 | 2014-04-23 | 联想(北京)有限公司 | Operation processing method and device and electronic device |
CN103778362A (en) * | 2014-01-21 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Unlocking method of communication terminal and communication terminal |
WO2014146551A1 (en) * | 2013-03-18 | 2014-09-25 | Huang Weiqiang | Method for locking and unlocking touch screen mobile phone which is unlocked based on pattern pairing mode |
CN104516645A (en) * | 2013-09-26 | 2015-04-15 | 上海斐讯数据通信技术有限公司 | Electronic device unlocking method |
CN106250754A (en) * | 2016-07-27 | 2016-12-21 | 维沃移动通信有限公司 | The control method of a kind of application program and mobile terminal |
CN106453802A (en) * | 2016-11-30 | 2017-02-22 | 努比亚技术有限公司 | Cipher verification method and device, and terminal |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103034446B (en) * | 2012-12-13 | 2015-10-28 | 广东欧珀移动通信有限公司 | A kind of is the unblock of electronic installation operation interface and the method and apparatus switching theme |
CN105630320B (en) * | 2015-06-26 | 2018-12-25 | 东莞酷派软件技术有限公司 | The unlocking screen method and screen unlocking device of terminal |
CN105809445A (en) * | 2016-02-29 | 2016-07-27 | 宇龙计算机通信科技(深圳)有限公司 | Password verifying and processing method, apparatus and terminal |
CN105844145A (en) * | 2016-04-19 | 2016-08-10 | 广州三星通信技术研究有限公司 | Method and equipment for managing passwords |
-
2017
- 2017-06-23 CN CN201710492686.4A patent/CN109117623B/en active Active
-
2018
- 2018-06-25 WO PCT/CN2018/092689 patent/WO2018233718A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014146551A1 (en) * | 2013-03-18 | 2014-09-25 | Huang Weiqiang | Method for locking and unlocking touch screen mobile phone which is unlocked based on pattern pairing mode |
CN104516645A (en) * | 2013-09-26 | 2015-04-15 | 上海斐讯数据通信技术有限公司 | Electronic device unlocking method |
CN103778362A (en) * | 2014-01-21 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Unlocking method of communication terminal and communication terminal |
CN103744583A (en) * | 2014-01-22 | 2014-04-23 | 联想(北京)有限公司 | Operation processing method and device and electronic device |
CN106250754A (en) * | 2016-07-27 | 2016-12-21 | 维沃移动通信有限公司 | The control method of a kind of application program and mobile terminal |
CN106453802A (en) * | 2016-11-30 | 2017-02-22 | 努比亚技术有限公司 | Cipher verification method and device, and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN109117623B (en) | 2024-01-05 |
WO2018233718A1 (en) | 2018-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11665200B2 (en) | System and method for second factor authentication to perform services | |
CN103249045B (en) | A kind of methods, devices and systems of identification | |
US8990909B2 (en) | Out-of-band challenge question authentication | |
CN103581166B (en) | Location aware certification | |
CN104184705B (en) | Verification method, device, server, subscriber data center and system | |
US9473467B2 (en) | Customer controlled data privacy protection in public cloud | |
CN101794365B (en) | The method of safely inputting information and mobile terminal on mobile terminals | |
CN107210916A (en) | Condition, which is logged in, to be promoted | |
US11270291B2 (en) | Systems and methods for data access control using a short-range transceiver | |
CN109600525A (en) | The control method and device of call center based on virtual reality | |
US20200127993A1 (en) | Systems and methods for data access control and account management | |
CN105337974A (en) | Account authorization method, account login method, account authorization device and client end | |
US11233897B1 (en) | Secure call center communications | |
JP2017073062A (en) | Communication support system | |
CN105868610A (en) | Method and system for realizing user authentication through biological characteristic information | |
US11764962B2 (en) | Systems and methods for data access control of secure memory using a short-range transceiver | |
CN105635164B (en) | The method and apparatus of safety certification | |
CN105871840B (en) | A kind of certificate management method and system | |
CN107835161B (en) | Method, system and the computer storage medium of inside and outside user's unified management | |
CN109117623A (en) | A kind of application method for managing security, device and storage medium | |
CN108322907A (en) | One kind opening chucking method and terminal | |
US20200314650A1 (en) | Controlling access to protected resource using a heat map | |
US11709924B2 (en) | Secure authentication | |
US11816231B2 (en) | Using machine-learning models to determine graduated levels of access to secured data for remote devices | |
US11956224B2 (en) | Using machine-learning models to authenticate users and protect enterprise-managed information and resources |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |