CN112905258A - Mobile terminal application safety starting method - Google Patents
Mobile terminal application safety starting method Download PDFInfo
- Publication number
- CN112905258A CN112905258A CN202110160620.1A CN202110160620A CN112905258A CN 112905258 A CN112905258 A CN 112905258A CN 202110160620 A CN202110160620 A CN 202110160620A CN 112905258 A CN112905258 A CN 112905258A
- Authority
- CN
- China
- Prior art keywords
- information
- mobile terminal
- nfc
- preset
- background server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000013475 authorization Methods 0.000 claims abstract description 69
- 238000012795 verification Methods 0.000 claims abstract description 26
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a safe starting method of a mobile terminal application, which comprises the following steps: the mobile terminal receives an application opening instruction input by a user; the mobile terminal acquires the authentication information of the user; the mobile terminal sends authorization request information to the background server, wherein the authorization request information comprises user information and verification information; the background server sends an authorization instruction to the mobile terminal after verifying the authorization request information; and the mobile terminal opens the application through the authorization instruction after receiving the authorization instruction. The mobile terminal application safety starting method can verify the verification information of the user for opening the mobile terminal application according to the preset starting configuration information, and sends an authorization instruction to the mobile terminal when the verification information meets the conditions.
Description
Technical Field
The invention relates to a safe starting method for a mobile terminal application.
Background
With the popularization of smart phones, various applications are continuously developed for people to use.
Due to the convenience of mobile phone office work, more and more companies use mobile phone office applications for office work. Therefore, the mobile phone application may involve the business secret of the company, and the company does not want the employee to enter the application for use in the non-working time and non-working place because of the risk of data leakage.
Disclosure of Invention
The invention provides a safe starting method of a mobile terminal application, which adopts the following technical scheme:
a method for safely starting a mobile terminal application comprises the following steps:
the mobile terminal receives an application opening instruction input by a user;
the mobile terminal acquires the authentication information of the user;
the mobile terminal sends authorization request information to the background server, wherein the authorization request information comprises user information and verification information;
the background server sends an authorization instruction to the mobile terminal after verifying the authorization request information;
and the mobile terminal opens the application through the authorization instruction after receiving the authorization instruction.
Further, the specific method for the background server to verify the authorization request information is as follows:
the background server matches the corresponding starting configuration information through the user information;
and the background server verifies whether the verification information meets the requirements according to the starting configuration information.
Further, the authentication information contains NFC information;
the startup configuration information comprises preset NFC information;
the background server judges whether the NFC information is the same as the preset NFC information or not and sends an authorization instruction to the mobile terminal when the NFC information is the same as the preset NFC information.
Further, the NFC information contains a plurality of sub-NFC information of different identities;
the background server judges whether the sub NFC information of the plurality of different identities is the same as the preset NFC information or not and sends an authorization instruction to the mobile terminal when the sub NFC information of the plurality of different identities is the same as the preset NFC information.
Further, the mobile terminal acquires sub-NFC information of a plurality of different identities according to a preset sequence;
the verification information is a plurality of sequentially arranged sub-NFC information;
the background server judges whether the plurality of sequentially arranged sub-NFC information is the same as the preset NFC information or not and sends an authorization instruction to the mobile terminal when the plurality of sequentially arranged sub-NFC information is the same as the preset NFC information.
Further, the verification information also contains face information of the user;
the starting configuration information also comprises preset face information;
the background server also judges whether the face information is the same as the preset face information or not and sends an authorization instruction to the mobile terminal when the face information is the same as the preset face information.
Further, the authorization request information also contains time information;
the start-up configuration information also comprises a preset time information range;
the background server also judges whether the time information belongs to a preset time information range or not and sends an authorization instruction to the mobile terminal when the time information also belongs to the preset time information range.
Further, the authorization request information also contains location information;
the starting configuration information also comprises a preset position information range;
the background server also judges whether the position information belongs to a preset position information range or not and sends an authorization instruction to the mobile terminal when the position information also belongs to the preset position information range.
Further, the authorization request information also contains location information;
the user information corresponds to a plurality of pieces of starting configuration information;
the background server matches the corresponding starting configuration information according to the user information and the position information;
and the background server verifies the verification information and the time information according to the matched starting configuration information and sends an authorization instruction to the mobile terminal after the verification is passed.
The method has the advantages that the verification information of the user for opening the mobile terminal application can be verified according to the preset starting configuration information, and the authorization instruction is sent to the mobile terminal when the verification information meets the conditions. Different startup configuration information may be set for different users.
Drawings
Fig. 1 is a flowchart of a secure boot method for a mobile application according to the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the embodiments.
FIG. 1 shows a secure booting method for a mobile application according to the present invention, which mainly comprises the following steps: and the mobile terminal receives an instruction for opening the application, which is input by a user. S2: the mobile terminal acquires the authentication information of the user. S3: the mobile terminal sends authorization request information to the background server, wherein the authorization request information comprises user information and verification information. S4: and the background server sends an authorization instruction to the mobile terminal after verifying the authorization request information. S5: and the mobile terminal opens the application through the authorization instruction after receiving the authorization instruction. Through the steps, the verification information of the user for opening the application of the mobile terminal can be verified according to the preset starting configuration information, and an authorization instruction is sent to the mobile terminal when the verification information meets the conditions. The above steps are specifically described below.
For step S1: and the mobile terminal receives an instruction for opening the application, which is input by a user.
It can be understood that the mobile terminal is a mobile phone or a tablet computer. In the invention, the mobile terminal is a mobile phone. The mobile phone receives an operation of touching an icon of the application program by the user.
For step S2: the mobile terminal acquires the authentication information of the user.
In the present invention, the authentication information includes, but is not limited to, NFC information and face information. The mobile phone receives the NFC card information of the user or acquires the face image of the user.
For step S3: the mobile terminal sends authorization request information to the background server, wherein the authorization request information comprises user information and verification information.
And the mobile terminal sends the authorization request information to the background server, wherein the authorization request comprises user information and verification information. The user information is used for subsequent matching start-up configuration information.
For step S4: and the background server sends an authorization instruction to the mobile terminal after verifying the authorization request information.
The specific method for the background server to verify the authorization request information is that the background server matches the corresponding start configuration information through the user information. And the background server verifies whether the verification information meets the requirements according to the starting configuration information. The startup configuration information is pre-configured according to the level of the user. The corresponding startup configuration information for different users may be different.
In step S2, the information acquired by the mobile phone includes NFC information. Specifically, the mobile phone receives card swiping (NFC card) information of the user. The startup configuration information includes preset NFC information. The background server judges whether the NFC information is the same as the preset NFC information or not and sends an authorization instruction to the mobile terminal when the NFC information is the same as the preset NFC information.
Preferably, the NFC information contains a plurality of sub-NFC information of different identities.
The background server judges whether the sub NFC information of the plurality of different identities is the same as the preset NFC information or not and sends an authorization instruction to the mobile terminal when the sub NFC information of the plurality of different identities is the same as the preset NFC information. Unlocking the application requires the co-authorization of multiple NFC cards to be realized. It will be appreciated that for some applications involving corporate secrets, not only the user's own NFC card information but also the NFC card information of a number of key users is required.
Preferably, the mobile terminal acquires the sub-NFC information of a plurality of different identities according to a preset sequence. The authentication information is a plurality of sequentially arranged sub-NFC information. The background server judges whether the plurality of sequentially arranged sub-NFC information is the same as the preset NFC information or not and sends an authorization instruction to the mobile terminal when the plurality of sequentially arranged sub-NFC information is the same as the preset NFC information.
It can be understood that when multiple NFC card information is involved, the NFC cards need to be swiped in a certain order to unlock the application, further reducing the risk of the application being illegally unlocked.
As a preferred embodiment, the verification information further includes face information of the user. The start-up configuration information also includes preset face information. The background server also judges whether the face information is the same as the preset face information or not and sends an authorization instruction to the mobile terminal when the face information is the same as the preset face information.
The face information of the user is used as one of the judgment conditions, so that the situation that the application is unlocked by others due to the fact that the mobile phone and the NFC card are lost can be avoided.
Preferably, the authorization request message further contains time information. The startup configuration information further includes a preset time information range. The background server also judges whether the time information belongs to a preset time information range or not and sends an authorization instruction to the mobile terminal when the time information also belongs to the preset time information range. Only during working hours can the corresponding application be unlocked for use.
Preferably, the authorization request message further contains location information. The start-up configuration information also includes a preset location information range. The background server also judges whether the position information belongs to a preset position information range or not and sends an authorization instruction to the mobile terminal when the position information also belongs to the preset position information range. That is, some applications can be unlocked only in the working area established by the company, and cannot be opened beyond the range.
As another optional implementation, the authorization request information further includes location information. The user information corresponds to a plurality of startup configuration information. And the background server matches the corresponding starting configuration information according to the user information and the position information. And the background server verifies the verification information and the time information according to the matched starting configuration information and sends an authorization instruction to the mobile terminal after the verification is passed.
Unlike the previous embodiment, the position information functions differently in the present embodiment. It will be appreciated that some companies may have multiple office locations, and that the manner in which applications are unlocked may vary for the same user due to the different office locations. For example, when NFC cards needing to be led jointly perform unlocking application, corresponding leaders of joint unlocking are different in different office locations, and therefore corresponding startup configuration information needs to be acquired according to the office locations.
For step S5: and the mobile terminal opens the application through the authorization instruction after receiving the authorization instruction.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It should be understood by those skilled in the art that the above embodiments do not limit the present invention in any way, and all technical solutions obtained by using equivalent alternatives or equivalent variations fall within the scope of the present invention.
Claims (9)
1. A method for safely starting a mobile terminal application is characterized by comprising the following steps:
the mobile terminal receives an application opening instruction input by a user;
the mobile terminal acquires authentication information of a user;
the mobile terminal sends authorization request information to a background server, wherein the authorization request information comprises user information and the verification information;
the background server verifies the authorization request information and then sends an authorization instruction to the mobile terminal;
and the mobile terminal opens the application through the authorization instruction after receiving the authorization instruction.
2. The mobile end application secure boot method according to claim 1,
the specific method for the background server to verify the authorization request information comprises the following steps:
the background server matches the corresponding starting configuration information with the user information;
and the background server verifies whether the verification information meets the requirements or not according to the starting configuration information.
3. The mobile end application secure boot method according to claim 2,
the authentication information contains NFC information;
the starting configuration information comprises preset NFC information;
the background server judges whether the NFC information is the same as the preset NFC information or not and sends the authorization instruction to the mobile terminal when the NFC information is the same as the preset NFC information.
4. The mobile end application secure boot method according to claim 3,
the NFC information comprises a plurality of sub NFC information with different identities;
the background server judges whether the sub NFC information of the plurality of different identities is the same as the preset NFC information or not and sends the authorization instruction to the mobile terminal when the sub NFC information of the plurality of different identities is the same as the preset NFC information.
5. The mobile end application secure boot method according to claim 4,
the mobile terminal acquires the sub NFC information of a plurality of different identities according to a preset sequence;
the verification information is a plurality of sub-NFC information arranged in sequence;
the background server judges whether the plurality of sequentially arranged sub-NFC information is the same as the preset NFC information or not and sends the authorization instruction to the mobile terminal when the plurality of sequentially arranged sub-NFC information is the same as the preset NFC information.
6. The mobile end application secure boot method according to claim 5,
the verification information also comprises face information of the user;
the starting configuration information also comprises preset face information;
the background server also judges whether the face information is the same as the preset face information or not and sends the authorization instruction to the mobile terminal when the face information is the same as the preset face information.
7. The mobile end application secure boot method according to claim 6,
the authorization request information also contains time information;
the starting configuration information also comprises a preset time information range;
the background server also judges whether the time information belongs to the preset time information range or not and sends the authorization instruction to the mobile terminal when the time information also belongs to the preset time information range.
8. The mobile end application secure boot method according to claim 7,
the authorization request information also contains position information;
the starting configuration information also comprises a preset position information range;
the background server also judges whether the position information belongs to the preset position information range or not and sends the authorization instruction to the mobile terminal when the position information also belongs to the preset position information range.
9. The method according to claim 7, wherein the method for securely booting the application at the mobile terminal is characterized in that
The authorization request information also contains position information;
the user information corresponds to a plurality of pieces of starting configuration information;
the background server matches the corresponding starting configuration information according to the user information and the position information;
and the background server verifies the verification information and the time information according to the matched starting configuration information and sends the authorization instruction to the mobile terminal after the verification is passed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110160620.1A CN112905258B (en) | 2021-02-05 | 2021-02-05 | Mobile terminal application safety starting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110160620.1A CN112905258B (en) | 2021-02-05 | 2021-02-05 | Mobile terminal application safety starting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112905258A true CN112905258A (en) | 2021-06-04 |
CN112905258B CN112905258B (en) | 2024-10-01 |
Family
ID=76122778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110160620.1A Active CN112905258B (en) | 2021-02-05 | 2021-02-05 | Mobile terminal application safety starting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112905258B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366104A (en) * | 2013-07-22 | 2013-10-23 | 腾讯科技(深圳)有限公司 | Method and device for controlling accessing of application |
CN104518875A (en) * | 2013-09-27 | 2015-04-15 | 深圳市腾讯计算机系统有限公司 | Identity authentication method, account acquisition method and mobile terminal |
CN105046131A (en) * | 2015-07-20 | 2015-11-11 | 努比亚技术有限公司 | Fingerprint identification apparatus and method |
CN105306771A (en) * | 2014-07-25 | 2016-02-03 | 佳能株式会社 | Information processing apparatus that requires authentication of user, and control method therefor |
CN106778138A (en) * | 2016-12-27 | 2017-05-31 | 东华互联宜家数据服务有限公司 | The control method and device of software license limit |
CN106845211A (en) * | 2016-12-16 | 2017-06-13 | 北京奇虎科技有限公司 | Mobile terminal and its application start method and device |
CN107169343A (en) * | 2017-04-25 | 2017-09-15 | 深圳市金立通信设备有限公司 | A kind of method and terminal of control application program |
CN107679383A (en) * | 2017-09-30 | 2018-02-09 | 北京梆梆安全科技有限公司 | A kind of auth method and device based on geographical position and contact pressure area |
CN109298895A (en) * | 2017-07-24 | 2019-02-01 | 杭州盈高科技有限公司 | APP management method and device in mobile device |
CN209357057U (en) * | 2018-11-30 | 2019-09-06 | 安徽昱康智能科技有限公司 | The card identification device and its robot of pre-set programs |
CN110334489A (en) * | 2019-07-12 | 2019-10-15 | 广州大白互联网科技有限公司 | A kind of unified single sign-on system and method |
CN110992533A (en) * | 2019-12-09 | 2020-04-10 | 深圳Tcl数字技术有限公司 | RFID card verification method, device, equipment and storage medium |
-
2021
- 2021-02-05 CN CN202110160620.1A patent/CN112905258B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366104A (en) * | 2013-07-22 | 2013-10-23 | 腾讯科技(深圳)有限公司 | Method and device for controlling accessing of application |
CN104518875A (en) * | 2013-09-27 | 2015-04-15 | 深圳市腾讯计算机系统有限公司 | Identity authentication method, account acquisition method and mobile terminal |
CN105306771A (en) * | 2014-07-25 | 2016-02-03 | 佳能株式会社 | Information processing apparatus that requires authentication of user, and control method therefor |
CN105046131A (en) * | 2015-07-20 | 2015-11-11 | 努比亚技术有限公司 | Fingerprint identification apparatus and method |
CN106845211A (en) * | 2016-12-16 | 2017-06-13 | 北京奇虎科技有限公司 | Mobile terminal and its application start method and device |
CN106778138A (en) * | 2016-12-27 | 2017-05-31 | 东华互联宜家数据服务有限公司 | The control method and device of software license limit |
CN107169343A (en) * | 2017-04-25 | 2017-09-15 | 深圳市金立通信设备有限公司 | A kind of method and terminal of control application program |
CN109298895A (en) * | 2017-07-24 | 2019-02-01 | 杭州盈高科技有限公司 | APP management method and device in mobile device |
CN107679383A (en) * | 2017-09-30 | 2018-02-09 | 北京梆梆安全科技有限公司 | A kind of auth method and device based on geographical position and contact pressure area |
CN209357057U (en) * | 2018-11-30 | 2019-09-06 | 安徽昱康智能科技有限公司 | The card identification device and its robot of pre-set programs |
CN110334489A (en) * | 2019-07-12 | 2019-10-15 | 广州大白互联网科技有限公司 | A kind of unified single sign-on system and method |
CN110992533A (en) * | 2019-12-09 | 2020-04-10 | 深圳Tcl数字技术有限公司 | RFID card verification method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112905258B (en) | 2024-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107070667B (en) | Identity authentication method | |
CA2686696C (en) | Simplified biometric character sequence entry | |
CN101389133A (en) | Identity verification system and method | |
CN100407831C (en) | Method of intelligent mobile terminal user staged managing | |
EP1827049B1 (en) | Authentication vector generating device, subscriber authentication module, mobile communication system and authentication vector generation method | |
CN101296457A (en) | Screen operation method and device | |
CN101568119A (en) | Mobile terminal with antitheft function and antitheft method thereof | |
CN101677442A (en) | Method and equipment for automatically logging in application programs | |
EP2690840A1 (en) | Internet based security information interaction apparatus and method | |
CN1997188A (en) | A recognition method of the user identity and its handset | |
CN105868970A (en) | Authentication method and electronic device | |
CN109379388B (en) | Identity recognition method, terminal and wearable device | |
CN102521169B (en) | Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk | |
CN105809007A (en) | Privacy protection method and device | |
WO2014180345A1 (en) | User identity verification and authorization system | |
CN101488249A (en) | Method and apparatus for verifying customer transaction | |
CN1786864A (en) | Method for safety identification of computer | |
CN101271507B (en) | File hiding method, system and device based on USB equipment | |
CN105072084B (en) | The method for building up of mobile terminal and external equipment data connection | |
WO2018006326A1 (en) | Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password | |
CN109716277A (en) | Portable information terminal and its control method | |
CN112905258B (en) | Mobile terminal application safety starting method | |
KR101814078B1 (en) | Method, device and mobile terminal for providing authentication service of non-repudiation | |
CN106161365B (en) | Data processing method and device and terminal | |
CN101127995A (en) | An information processing method for phone-card separated mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |