CN109413034A - Application data display methods, device, computer equipment and storage medium - Google Patents
Application data display methods, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109413034A CN109413034A CN201811021293.6A CN201811021293A CN109413034A CN 109413034 A CN109413034 A CN 109413034A CN 201811021293 A CN201811021293 A CN 201811021293A CN 109413034 A CN109413034 A CN 109413034A
- Authority
- CN
- China
- Prior art keywords
- application program
- telephone number
- hidden
- sim card
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
This application involves application securities to protect field, and in particular to a kind of application data display methods, device, computer equipment and storage medium.The described method includes: receiving the application program log-on message of input, and the application program is logged according to the log-on message;Obtain the second telephone number of corresponding first telephone number of local sim card and application program binding;Compare first telephone number and whether second telephone number is identical;When first telephone number and second telephone number be not identical, then after being hidden the corresponding hiding data of the application program, the application program is shown.It can be improved the safety of application program using this method.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of application data display methods, device, calculating
Machine equipment and storage medium.
Background technique
With the development of information technology, the more and more information of user are stored in various application programs, thus
Application program is caused to play indispensable role in people's lives.
However, illegal person can log on in application program, get after the account and password of application program are stolen
The privacy information of user reduces the safety of application program so as to cause user information leakage.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of application journey that can be improved applications security
Sequence data display method, device, computer equipment and storage medium.
A kind of application data display methods, which comprises
The application program log-on message of input is received, and the application program is logged according to the log-on message;
Obtain the second telephone number of corresponding first telephone number of local sim card and application program binding;
Compare first telephone number and whether second telephone number is identical;
It is when first telephone number and second telephone number be not identical, then the application program is corresponding hidden
After hiding data are hidden, the application program is shown.
In one of the embodiments, the method also includes:
When first telephone number is identical as second telephone number, then judge the sim card with the presence or absence of clothes
Business;
When the sim card is there is no servicing, then after the corresponding hiding data of the application program being hidden, display
The application program.
In one of the embodiments, the method also includes:
Judge whether sim card is locally installed;
When being locally not installed with sim card, then terminal iidentification is obtained, and the terminal iidentification is sent to server;
Receive the initial display permission corresponding with the terminal iidentification that the server returns;
It, then will be described when the corresponding hiding data of the application program is hidden by the initial display permission expression
After the corresponding hiding data of application program is hidden, the application program is shown.
In one of the embodiments, the method also includes:
It, then will be described when not receiving the initial display permission corresponding with the terminal iidentification that the server returns
After the corresponding hiding data of application program is hidden, the application program is shown.
It is described in one of the embodiments, not receive the corresponding with the terminal iidentification of the server return
When showing permission, then after the corresponding hiding data of the application program being hidden, after showing the application program, packet
It includes:
It receives the display permission that server is sent and changes prompt, and prompt and the end are changed according to the display permission
End mark sends display authority acquiring request to the server;
Receive the updated display permission corresponding with display authority acquiring request that the server returns;
When the corresponding hiding data of the application program is not hidden by the updated display permission expression, then
The hiding data of the application program is shown.
A kind of application data display device, described device include:
First receiving module, application program log-on message for receiving input, and institute is logged according to the log-on message
State application program;
Telephone number obtains module, for obtaining corresponding first telephone number of local sim card and the application program
Second telephone number of binding;
Whether comparison module is identical for first telephone number and second telephone number;
Hidden module, for when first telephone number and second telephone number be not identical, then being answered by described in
After being hidden with the corresponding hiding data of program, the application program is shown.
Described device in one of the embodiments, further include:
First judgment module, for when first telephone number is identical as second telephone number, then judging institute
Sim card is stated with the presence or absence of service;
The hidden module is also used to when the sim card is there is no servicing, then the application program is corresponding hiding
After data are hidden, the application program is shown.
Described device in one of the embodiments, further include:
Second judgment module, for judging locally whether be equipped with sim card;
Sending module, for when being locally not installed with sim card, then obtaining terminal iidentification, and the terminal iidentification is sent out
It send to server;
Second receiving module, the initial display power corresponding with the terminal iidentification returned for receiving the server
Limit;
The hidden module is also used to indicate when the initial display permission by the corresponding hiding data of the application program
When being hidden, then after being hidden the corresponding hiding data of the application program, the application program is shown.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes any of the above-described the method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of method described in any of the above embodiments is realized when row.
Above-mentioned application data display methods, device, computer equipment and storage medium, by sim card and application program
Hiding data bound, the second of corresponding first telephone number of local sim card that is identified and application program binding
When telephone number is not identical, then the hiding data of application program is not shown, protects privacy of user.
Detailed description of the invention
Fig. 1 is the application scenario diagram of application data display methods in one embodiment;
Fig. 2 is the flow diagram of application data display methods in one embodiment;
Fig. 3 is the flow chart for not installing the application data display methods of sim card in one embodiment;
Fig. 4 is the structural block diagram of application data display device in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Application data display methods provided by the present application, can be applied in application environment as shown in Figure 1.Its
In, terminal 102 is communicated with server 104 by network.Wherein terminal 102 receives the application program log-on message of input,
And according to the log-on message login application program, then terminal 102 get corresponding first telephone number of local sim card and
Whether identical second telephone number of application program binding, compare the two telephone numbers, if it is not the same, then hiding some hidden
It after hiding data, then shows the application program, can protect privacy of user in this way, and when locally sim card not being installed, terminal
102 can get corresponding display permission from server 104, and the data of application program are shown according to display permission.Wherein,
Terminal 102, which can be, but not limited to, to be various personal computers, laptop, smart phone, tablet computer and portable wears
Terminal is worn, server 104 can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, it as shown in Fig. 2, providing a kind of application data display methods, applies in this way
It is illustrated for terminal in Fig. 1, comprising the following steps:
S202: the application program log-on message of input is received, and according to log-on message login application program.
Specifically, application program log-on message refers to the account and password of login application program, and user is opening using journey
After sequence, corresponding application program log-on message is inputted first, so that terminal can log on in the application program of corresponding user, with
Just the application data of corresponding user is browsed.
S204: the second telephone number of corresponding first telephone number of local sim card and application program binding is obtained.
Specifically, terminal gets the sim card for being mounted on terminal local after logging on to application program, and then can obtain
Get corresponding first telephone number of the sim card, i.e., corresponding first telephone number of locally-installed sim card.And terminal may be used also
To get the second telephone number of application program binding, such as the available user information into application program, the wherein use
Family information includes the second telephone number.Optionally, terminal can also send the account of current login application program and password to
Server, so that server can inquire corresponding user information according to the account and password, and choose from user information
To after the second telephone number, which is back to corresponding terminal, in order to which terminal gets second phone
Number.
S206: it is whether identical as the second telephone number to compare the first telephone number.
Optionally, terminal is after getting the first telephone number and the second telephone number, it can be determined that the first telephone number
It is whether identical with the second telephone number, that is, judge whether telephone number corresponds to digital identical on position, if any there are on a certain position
Number it is not identical, then assert that the first telephone number and the second telephone number be not identical.
And optionally, when terminal is double-card dual-standby mode, sim card that can be acquired is two, so as to obtain
It, can be by two to two the first telephone numbers, therefore when the first telephone number to be compared with the second telephone number
One telephone number is compared with the second telephone number, as long as one of them first telephone number and the second telephone number phase
Together, then it is assumed that the first telephone number is identical as the second telephone number.
S208: when the first telephone number and not identical the second telephone number, then by the corresponding hiding data of application program
After being hidden, application program is shown.
Specifically, when terminal judges the first telephone number and the second telephone number is not identical, then journey will can be applied
After the hiding data of sequence is hidden, application program is shown.Wherein hiding data, which can be a user and be not desired to be shared with other people, looks into
The data seen, for example, can be as in shopping list a certain item, purchase by group in a certain item either bank's flowing water a certain item.
Specifically, when application program is shopping application program, then privacy information can be some shopping information;When application program is certain
A when purchasing by group application program, then privacy information can be part group purchase information, such as the information of purchase film, the letter that ktv sings
Breath etc.;When application program is bank application, then the remaining sum shown can be the number transferred accounts no more than some numerical value not
More than some numerical value etc..
Above-mentioned application data display methods, sim card and the hiding data of application program are bound, and are being identified
Corresponding first telephone number of local sim card and application program binding the second telephone number it is not identical when, then do not show and answer
With the hiding data of program, privacy of user is protected.
Above-mentioned application data display methods can also include: when the first telephone number in one of the embodiments,
When identical as the second telephone number, then judge sim card with the presence or absence of service;When sim card is there is no servicing, then by application program
After corresponding hiding data is hidden, application program is shown.
Specifically, terminal is stolen some privacy informations for getting application program later, example by illegal person in order to prevent
Balance information in such as Alipay, even if terminal is also needed when judging that the first telephone number is identical as the second telephone number
Continue to judge whether the sim card of terminal local installation is canceled, i.e., whether sim card is without service, this is because user is having found
After terminal is stolen, it can go to nullify sim card the various information of the terminal modifications application program to prevent illegal person from passing through user,
Obtain the privacy etc. of user.Work as this purpose, terminal when judging that the first telephone number is identical as the second telephone number, then continues judgement
Preceding sim card is with the presence or absence of service, if it is present continuing to show the corresponding all information of application program, if current sim card is not
Presence service then may be to cause not service because of user log off, and first terminal is by the hiding data of application program
It is shown again after being hidden.
In above-described embodiment, terminal is judging that terminal is equipped with sim card, and the first telephone number and the second telephone number
When identical, then further judge whether sim card is canceled, if sim card is canceled, terminal is still by the hiding of application program
Data are shown again after being hidden.
Above-mentioned application data display methods can also include: that local whether pacify judged in one of the embodiments,
Equipped with sim card;When being locally not installed with sim card, then terminal iidentification is obtained, and terminal iidentification is sent to server;It receives
The initial display permission corresponding with terminal iidentification that server returns;When initially display permission indicates that application program is corresponding hidden
When hiding data are hidden, then after being hidden the corresponding hiding data of application program, application program is shown.
Above-mentioned application data display methods can also include: that ought not receive service in one of the embodiments,
When the initial display permission corresponding with terminal iidentification that device returns, then after the corresponding hiding data of application program being hidden,
Show application program.
In one of the embodiments, when not receiving the display permission corresponding with terminal iidentification of server return,
It can also include: to receive server hair after showing application program after then the corresponding hiding data of application program is hidden
The display permission change prompt sent, and display permission is sent to server according to display permission change prompt and terminal iidentification and is obtained
Take request;Receive the updated display permission corresponding with display authority acquiring request that server returns;When updated aobvious
When showing that the corresponding hiding data of application program is not hidden by permission expression, then the hiding data of application program is shown
Show.
It specifically, is the stream for not installing the application data display methods of sim card in one embodiment referring to Fig. 3, Fig. 3
Cheng Tu.In this embodiment, if terminal does not install sim card, the terminal iidentification of terminal is obtained, application program is from service
Device obtains the corresponding display permission of the terminal iidentification, if it is present being shown according to display permission.It's not true, then directly
It connects and hiding information is hidden into display.When not getting the terminal is corresponding display permission, it is also possible to which user has purchased
New terminal, therefore asking for modification display permission can be sent by being equipped with the terminal to server of the sim card of binding mobile phone
It asks, modifies the corresponding display permission of the new terminal.
Specifically, when terminal, which detects, is locally not installed with sim card, such as user is logged in using tablet computer
Deng, then it is available to arrive the corresponding terminal iidentification of terminal, and the terminal iidentification is sent to server, so that server can be looked into
Initial display permission corresponding with the terminal iidentification is ask, and if server has inquired initial display corresponding with terminal iidentification
The initial display permission can be then sent to terminal by permission, and terminal judges that this is initial after receiving the initial display permission
Display permission indicates whether to need to hide corresponding hiding data, if it is, the hiding data of application program is hidden
The application program is shown again afterwards, if it is not, then directly showing all information of application program.
And if indicate that the terminal is for the first time when server does not inquire initial display permission corresponding with terminal iidentification
The application program is logged in, therefore for the sake of security, then returns to the initial display for indicating to be hidden hiding data to terminal
Permission, so that terminal after receiving the initial display permission, is then hidden according to the initial display permission.
In addition, when terminal is to log in the application program for the first time, it is understood that there may be two kinds of situations, one is girlfriend etc. is non-
User itself logs in, there are also it is a kind of may be the terminal newly bought, therefore in order to avoid being terminal that user oneself newly buys, such as flat
When plate logs in the application program, the generation for the case where not shown there are still hiding data, user can pass through original end
It holds to server and sends control right transfer request, or display permission change request, and pass through original terminal, or installation
There is the terminal to server of sim card corresponding with the second telephone number of application program binding to send display permission change to request,
In order to which server changes the display permission of corresponding new terminal, and after the change of the display permission of the new terminal, service
Device can to new terminal send display permission change prompt, in order to new terminal can according to display permission change prompt with
And terminal iidentification sends display authority acquiring request to server, so that server gets updated display permission, and will
Updated display permission is sent to corresponding new terminal, so that new terminal can be carried out according to updated display permission
It has been shown that, such as when the corresponding hiding data of application program is not hidden by the expression of updated display permission, then will apply
The hiding data of program is shown.
And optionally, when user's replacement terminal, then control right transfer, such as user can be passed through into original terminal
Control right transfer request is sent to server, so that ownership is transferred to new terminal by server, so that new terminal is to clothes
Business device sends display permission inquiry request again, it can inquires display permission, and carries out display correspondence according to display permission
Data.
In above-described embodiment, if terminal does not install sim card, obtain the terminal iidentification of terminal, application program from
Server obtains the corresponding display permission of the terminal iidentification, if it is present being shown according to display permission.It's not true,
Hiding information is directly then hidden into display.When not getting the terminal is corresponding display permission, it is also possible to user's purchase
New terminal has been bought, therefore modification display permission can have been sent by being equipped with the terminal to server of the sim card of binding mobile phone
Request, modify the corresponding display permission of the new terminal.
In order to which those skilled in the art can further understand the technical program, citing is illustrated below:
When user uses the application programs such as Taobao for the first time, it can be tied up first using the telephone number of oneself and mailbox
The fixed application needs mailbox to verify if to modify telephone number, if to modify mailbox, telephone number is needed to carry out
Verifying.
User is when using application program, it is understood that there may be some data are not desired to be seen by other people, therefore can answer at this
It is hiding data with those data are arranged in program, and will uploads onto the server after hiding data and non-concealed data markers, with
It is stored convenient for server.
And the display permission of terminal is mutually bound with sim card in the present embodiment, when the corresponding phone of sim card of terminal installation
When number and the not identical telephone number of terminal binding, then terminal only shows non-concealed data.It in this way can be to avoid some embarrassments
The appearance of scene, such as when user needs account lending relatives and friends in use, needing the Taobao as used oneself than other people
Account shopping, Meituan account purchase by group or when safety bank transfers, hiding data can be set and do not show, i.e., other people pass through from
When the application program of oneself terminal login user, corresponding first telephone number of local sim card can be got first and is answered
With the second telephone number of programmatic binding, whether identical compare the two telephone numbers, if it is not the same, then hiding some hide
After data, then the application program is shown, for example, if being to purchase by group app, the group purchase information of partial content is not shown, for example sees electricity
Shadow removes ktv etc.;If it is bank app, the remaining sum of display can be set the number transferred accounts no more than some numerical value and be no more than certain
A numerical value, can protect privacy of user in this way.
It should be understood that although each step in the flow chart of Fig. 2-3 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-3
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in figure 4, providing a kind of application data display device, comprising: first receives
Module 100, telephone number obtain module 200, comparison module 300 and hidden module 400, in which:
First receiving module 100, application program log-on message for receiving input, and logged in and applied according to log-on message
Program.
Telephone number obtains module 200, ties up for obtaining corresponding first telephone number of local sim card and application program
The second fixed telephone number.
Whether comparison module 300 is identical as the second telephone number for comparing the first telephone number.
Hidden module 400, for when the first telephone number and not identical the second telephone number, then corresponding to application program
Hiding data be hidden after, show application program.
Above-mentioned application data display device can also include: in one of the embodiments,
First judgment module, for when the first telephone number is identical as the second telephone number, then judging whether sim card is deposited
It is servicing.
Hidden module 400 can be also used for when sim card there is no service when, then by the corresponding hiding data of application program into
After row is hidden, application program is shown.
Above-mentioned application data display device can also include: in one of the embodiments,
Second judgment module, for judging locally whether be equipped with sim card.
Sending module, for when being locally not installed with sim card, then obtaining terminal iidentification, and terminal iidentification is sent to
Server.
Second receiving module, for receiving the initial display permission corresponding with terminal iidentification of server return.
Hidden module 400 is also used to initially to show that the corresponding hiding data of application program is hidden by permission expression
When, then after being hidden the corresponding hiding data of application program, show application program.
Hidden module 400 can be also used for that server returns and terminal ought not be received in one of the embodiments,
When identifying corresponding initial display permission, then after being hidden the corresponding hiding data of application program, application program is shown.
Above-mentioned application data display device can also include: in one of the embodiments,
Third receiving module, for receiving the display permission change prompt of server transmission, and according to display permission change
Prompt and terminal iidentification are sent to server shows authority acquiring request.
4th receiving module, for receiving the updated display corresponding with display authority acquiring request of server return
Permission.
Hidden module 400 is also used to indicate not carry out the corresponding hiding data of application program when updated display permission
When hiding, then the hiding data of application program is shown.
Specific restriction about application data display device may refer to show above for application data
The restriction of method, details are not described herein.Modules in above-mentioned application data display device can be fully or partially through
Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in terminal
It manages in device, can also be stored in a software form in the memory in terminal, in order to which processor calls execution or more
The corresponding operation of modules.
In one embodiment, a kind of terminal is provided, which can be terminal, internal structure
Figure can be as shown in Figure 5.The terminal includes processor, the memory, network interface, display connected by system bus
Screen and input unit.Wherein, the processor of the terminal is for providing calculating and control ability.The terminal is deposited
Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey
Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The network interface of machine terminal is used to communicate with external terminal by network connection.When the computer program is executed by processor with
Realize a kind of application data display methods.The display screen of the terminal can be liquid crystal display or electric ink
Display screen, the input unit of the terminal can be the touch layer covered on display screen, be also possible to outside terminal
Key, trace ball or the Trackpad being arranged on shell can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the terminal being applied thereon to application scheme, specific terminal
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of terminal, including memory and processor are provided, which is stored with
Computer program, the processor perform the steps of the application program log-on message for receiving input when executing computer program, and
According to log-on message login application program;It obtains corresponding first telephone number of local sim card and application program is bound the
Two telephone numbers;It is whether identical as the second telephone number to compare the first telephone number;When the first telephone number and the second phone number
When code is not identical, then after being hidden the corresponding hiding data of application program, application program is shown.
In one embodiment, processor execute computer program when also perform the steps of when the first telephone number with
When second telephone number is identical, then judge sim card with the presence or absence of service;When sim card is there is no servicing, then by application program pair
After the hiding data answered is hidden, application program is shown.
In one embodiment, it is also performed the steps of when processor executes computer program and local whether install is judged
There is sim card;When being locally not installed with sim card, then terminal iidentification is obtained, and terminal iidentification is sent to server;Receive clothes
The initial display permission corresponding with terminal iidentification that business device returns;When initially display permission indicates that application program is corresponding hiding
When data are hidden, then after being hidden the corresponding hiding data of application program, application program is shown.
In one embodiment, server ought not received by also performing the steps of when processor executes computer program
When the initial display permission corresponding with terminal iidentification returned, then after being hidden the corresponding hiding data of application program, show
Show application program.
In one embodiment, processor execute computer program when realized ought not receive server return with
When the corresponding display permission of terminal iidentification, then after the corresponding hiding data of application program being hidden, display application program it
It afterwards, may include: the display permission change prompt for receiving server and sending, and according to display permission change prompt and terminal mark
Know to server and sends display authority acquiring request;After receiving the update corresponding with display authority acquiring request that server returns
Display permission;When the corresponding hiding data of application program is not hidden by the expression of updated display permission, then will answer
It is shown with the hiding data of program.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of the application program log-on message for receiving input when being executed by processor, and is stepped on according to log-on message
Record application program;Obtain the second telephone number of corresponding first telephone number of local sim card and application program binding;Compare
Whether the first telephone number is identical as the second telephone number;When the first telephone number and not identical the second telephone number, then will
After the corresponding hiding data of application program is hidden, application program is shown.
In one embodiment, it also performs the steps of when computer program is executed by processor when the first telephone number
When identical as the second telephone number, then judge sim card with the presence or absence of service;When sim card is there is no servicing, then by application program
After corresponding hiding data is hidden, application program is shown.
In one embodiment, it is also performed the steps of when computer program is executed by processor and local whether pacify is judged
Equipped with sim card;When being locally not installed with sim card, then terminal iidentification is obtained, and terminal iidentification is sent to server;It receives
The initial display permission corresponding with terminal iidentification that server returns;When initially display permission indicates that application program is corresponding hidden
When hiding data are hidden, then after being hidden the corresponding hiding data of application program, application program is shown.
In one embodiment, service ought not received by also performing the steps of when computer program is executed by processor
When the initial display permission corresponding with terminal iidentification that device returns, then after the corresponding hiding data of application program being hidden,
Show application program.
In one embodiment, that is realized when computer program is executed by processor ought not receive what server returned
When display permission corresponding with terminal iidentification, then after being hidden the corresponding hiding data of application program, application program is shown
It later, may include: the display permission change prompt for receiving server and sending, and according to display permission change prompt and terminal
It identifies to server and sends display authority acquiring request;Receive the update corresponding with display authority acquiring request that server returns
Display permission afterwards;When the corresponding hiding data of application program is not hidden by the expression of updated display permission, then will
The hiding data of application program is shown.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of application data display methods, which comprises
The application program log-on message of input is received, and the application program is logged according to the log-on message;
Obtain the second telephone number of corresponding first telephone number of local sim card and application program binding;
Compare first telephone number and whether second telephone number is identical;
When first telephone number and second telephone number be not identical, then by the corresponding hiding number of the application program
After being hidden, the application program is shown.
2. the method according to claim 1, wherein the method also includes:
When first telephone number is identical as second telephone number, then judge the sim card with the presence or absence of service;
When the sim card is there is no servicing, then after being hidden the corresponding hiding data of the application program, described in display
Application program.
3. the method according to claim 1, wherein the method also includes:
Judge whether sim card is locally installed;
When being locally not installed with sim card, then terminal iidentification is obtained, and the terminal iidentification is sent to server;
Receive the initial display permission corresponding with the terminal iidentification that the server returns;
When the corresponding hiding data of the application program is hidden by the initial display permission expression, then by the application
After the corresponding hiding data of program is hidden, the application program is shown.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
When not receiving the initial display permission corresponding with the terminal iidentification that the server returns, then by the application
After the corresponding hiding data of program is hidden, the application program is shown.
5. according to the method described in claim 4, it is characterized in that, it is described it is ought not receiving that the server returns with it is described
When the corresponding display permission of terminal iidentification, then after being hidden the corresponding hiding data of the application program, answered described in display
After program, comprising:
It receives the display permission that server is sent and changes prompt, and prompt and the terminal mark are changed according to the display permission
Know to the server and sends display authority acquiring request;
Receive the updated display permission corresponding with display authority acquiring request that the server returns;
When the corresponding hiding data of the application program is not hidden by the updated display permission expression, then by institute
The hiding data for stating application program is shown.
6. a kind of application data display device, which is characterized in that described device includes:
First receiving module, application program log-on message for receiving input, and answered according to log-on message login
Use program;
Telephone number obtains module, for obtaining corresponding first telephone number of local sim card and application program binding
The second telephone number;
Whether comparison module is identical for first telephone number and second telephone number;
Hidden module, for when first telephone number and second telephone number be not identical, then applying journey for described
After the corresponding hiding data of sequence is hidden, the application program is shown.
7. device according to claim 6, which is characterized in that described device further include:
First judgment module, for when first telephone number is identical as second telephone number, then judging the sim
Card is with the presence or absence of service;
The hidden module is also used to when the sim card is there is no servicing, then by the corresponding hiding data of the application program
After being hidden, the application program is shown.
8. device according to claim 6, which is characterized in that described device further include:
Second judgment module, for judging locally whether be equipped with sim card;
Sending module, for when being locally not installed with sim card, then obtaining terminal iidentification, and the terminal iidentification is sent to
Server;
Second receiving module, the initial display permission corresponding with the terminal iidentification returned for receiving the server;
The hidden module is also used to indicate to carry out the corresponding hiding data of the application program when the initial display permission
When hiding, then after being hidden the corresponding hiding data of the application program, the application program is shown.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 5 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 5 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811021293.6A CN109413034B (en) | 2018-09-03 | 2018-09-03 | Application program data display method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811021293.6A CN109413034B (en) | 2018-09-03 | 2018-09-03 | Application program data display method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109413034A true CN109413034A (en) | 2019-03-01 |
CN109413034B CN109413034B (en) | 2023-04-07 |
Family
ID=65463770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811021293.6A Active CN109413034B (en) | 2018-09-03 | 2018-09-03 | Application program data display method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109413034B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112231758A (en) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN112738007A (en) * | 2019-10-28 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Management authority transfer synchronous updating method, device and computer readable storage medium |
CN114025358A (en) * | 2020-07-15 | 2022-02-08 | 成都鼎桥通信技术有限公司 | Data desensitization method, device, equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101616495A (en) * | 2008-06-23 | 2009-12-30 | 网秦无限(北京)科技有限公司 | The method and system of individual privacy in the protection mobile phone |
US20120242702A1 (en) * | 2010-10-01 | 2012-09-27 | Sanjiv Sirpal | Windows position control for phone applications |
CN103313245A (en) * | 2013-05-28 | 2013-09-18 | 中国联合网络通信集团有限公司 | Network service access method, equipment and system based on mobile phone terminal |
CN104320756A (en) * | 2014-11-18 | 2015-01-28 | 广东欧珀移动通信有限公司 | Account information changing method and device |
WO2016197884A1 (en) * | 2015-12-16 | 2016-12-15 | 中兴通讯股份有限公司 | Identity-based data processing method and device |
CN106453264A (en) * | 2016-09-19 | 2017-02-22 | 北京小米移动软件有限公司 | Method and apparatus for logging in application program |
CN106572081A (en) * | 2016-10-18 | 2017-04-19 | 江西博瑞彤芸科技有限公司 | Login authority verifying method |
CN107493378A (en) * | 2017-08-07 | 2017-12-19 | 广东欧珀移动通信有限公司 | Method and apparatus, computer equipment and the readable storage medium storing program for executing that application program logs in |
-
2018
- 2018-09-03 CN CN201811021293.6A patent/CN109413034B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101616495A (en) * | 2008-06-23 | 2009-12-30 | 网秦无限(北京)科技有限公司 | The method and system of individual privacy in the protection mobile phone |
US20120242702A1 (en) * | 2010-10-01 | 2012-09-27 | Sanjiv Sirpal | Windows position control for phone applications |
CN103313245A (en) * | 2013-05-28 | 2013-09-18 | 中国联合网络通信集团有限公司 | Network service access method, equipment and system based on mobile phone terminal |
CN104320756A (en) * | 2014-11-18 | 2015-01-28 | 广东欧珀移动通信有限公司 | Account information changing method and device |
WO2016197884A1 (en) * | 2015-12-16 | 2016-12-15 | 中兴通讯股份有限公司 | Identity-based data processing method and device |
CN106453264A (en) * | 2016-09-19 | 2017-02-22 | 北京小米移动软件有限公司 | Method and apparatus for logging in application program |
CN106572081A (en) * | 2016-10-18 | 2017-04-19 | 江西博瑞彤芸科技有限公司 | Login authority verifying method |
CN107493378A (en) * | 2017-08-07 | 2017-12-19 | 广东欧珀移动通信有限公司 | Method and apparatus, computer equipment and the readable storage medium storing program for executing that application program logs in |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112738007A (en) * | 2019-10-28 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Management authority transfer synchronous updating method, device and computer readable storage medium |
CN112738007B (en) * | 2019-10-28 | 2022-08-26 | 腾讯科技(深圳)有限公司 | Management authority transfer synchronous updating method, device and computer readable storage medium |
CN114025358A (en) * | 2020-07-15 | 2022-02-08 | 成都鼎桥通信技术有限公司 | Data desensitization method, device, equipment and storage medium |
CN114025358B (en) * | 2020-07-15 | 2024-02-13 | 成都鼎桥通信技术有限公司 | Data desensitization method, device, equipment and storage medium |
CN112231758A (en) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN112231758B (en) * | 2020-11-03 | 2023-11-17 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
Also Published As
Publication number | Publication date |
---|---|
CN109413034B (en) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106462476B (en) | By the compatible extension point for allowing to extend of the Function Extension of application to another application | |
CN103544447B (en) | A kind of method preventing confidential information from revealing based on Android system and terminal | |
CN104717223B (en) | Data access method and device | |
JP6074516B2 (en) | Method, apparatus, facility, program and recording medium for adding plug-in to address book | |
CN103403669A (en) | Securing and managing APPs on a device | |
CN106663174A (en) | Restricting system calls using protected storage | |
CN106485473A (en) | Mobile approval information system and its information processing method | |
CN109413034A (en) | Application data display methods, device, computer equipment and storage medium | |
WO2014192063A1 (en) | Application execution program, application execution method, and information processing terminal device in which application is executed | |
CN100489767C (en) | Communicating device | |
US8675828B2 (en) | Authentication of a user to a telephonic communication device | |
CN103685194A (en) | Capacity calling method and device, and terminal | |
CN102223441A (en) | Method for personably customizing restore factory setting of mobile phone | |
CN105247530A (en) | Method of preventing access to sensitive data of computing device | |
CN108664786A (en) | Authority configuring method, mobile terminal, server and the storage medium of application program | |
CN106127483A (en) | Method of mobile payment, SOC(system on a chip) and terminal | |
CN105740670A (en) | Application encryption method and device, and application startup method and device | |
CN105812370A (en) | Smart card processing method, device and system | |
CN108696864B (en) | Virtual number request and transmission method, device and storage medium | |
Alhamed et al. | Comparing privacy control methods for smartphone platforms | |
CN108205630A (en) | Resource access method and device based on SeLinux under a kind of multi-user | |
CN114417281A (en) | Method and device for responding permission request, computer equipment and storage medium | |
CN112668021A (en) | Information disguising method and system of mobile terminal | |
CN111737725A (en) | User marking method, device, server and storage medium | |
CN110765426A (en) | Equipment permission setting method, device, equipment and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |