CN104539627A - Safety access method, device and terminal - Google Patents

Safety access method, device and terminal Download PDF

Info

Publication number
CN104539627A
CN104539627A CN201510023929.0A CN201510023929A CN104539627A CN 104539627 A CN104539627 A CN 104539627A CN 201510023929 A CN201510023929 A CN 201510023929A CN 104539627 A CN104539627 A CN 104539627A
Authority
CN
China
Prior art keywords
access
code
authentication
input interface
access object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510023929.0A
Other languages
Chinese (zh)
Other versions
CN104539627B (en
Inventor
艾朝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen ZTE Mobile Telecom Co Ltd
Original Assignee
Shenzhen ZTE Mobile Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZTE Mobile Telecom Co Ltd filed Critical Shenzhen ZTE Mobile Telecom Co Ltd
Priority to CN201510023929.0A priority Critical patent/CN104539627B/en
Publication of CN104539627A publication Critical patent/CN104539627A/en
Priority to PCT/CN2015/090614 priority patent/WO2016112712A1/en
Application granted granted Critical
Publication of CN104539627B publication Critical patent/CN104539627B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a safety access method, device and terminal. The safety access method comprises the following steps: firstly, inputting an access password of an access object into a preset password input interface, judging whether the access password is accepted in the identity verification of the access object or not, finally, if the access password is accepted in the identity verification of the access object, skipping to the access object, and awarding the access right to the access object, and if the access password is not accepted in the identity verification of the access object, rejecting accessing the access object. Protection on selection of multiple input interface layers is achieved, and an encrypted object can be relatively well protected under special conditions. At the same time, the encryption logic of a conventional encrypted object is optimized, that is, an interface for inputting the password is found from the encrypted object, the password is input and the encrypted object is accessed. Therefore, the encryption protection measures on the encrypted object are wholly improved.

Description

A kind of safety access method, device and terminal
Technical field
The present invention relates to communication technical field, particularly relate to a kind of safety access method, device and terminal.
Background technology
In prior art, mobile device checks the step of protected file normally:
1, protection module is logged in;
2, input logs in password;
3, protected file is checked.
The shortcoming at technique scheme place is:
1, for the periphery people being familiar with user, use daily or browse in the mobile device of user, if know that user security module logs in password, then have higher file to lose one's way risk;
2, after mobile device is lost, owing to there being protection module log-in interface interface intuitively, the people for pry privacy of user can use other password cracking modes to crack, thus protected file is stolen.
Therefore, in prior art, encryption logic is existed to the encryption measures of cryptographic object rigorous not, there is encryption leak, easily cause the technological deficiency that cryptographic object is stolen.
Summary of the invention
In view of this, the technical problem to be solved in the present invention is to provide a kind of safety access method, device and terminal, to solve in prior art, there is encryption logic rigorous not to the encryption measures of cryptographic object, there is encryption leak, easily cause the technological deficiency that cryptographic object is stolen.
It is as follows that the present invention solves the problems of the technologies described above adopted technical scheme:
Construct a kind of safety access method, the method comprises:
By the access code of access object needed for default password input interface typing;
Judge access code whether by the authentication of access object;
If access code by the authentication of access object, then jumps to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object.
Preferably, by comprising before the access code of access object needed for default password input interface typing:
The access entrance corresponding with access object is set;
Preset the application program corresponding with access entrance;
Password input interface is embedded at the login interface of application program or interactive interface;
By the access character of password input interface typing access object.
Preferably, specifically comprised by the access code of access object needed for default password input interface typing:
After access character by password input interface typing access object, analyze access character in conjunction with the password identification symbol preset;
According to analysis operation, in access character, extract the access code of access object.
Preferably, judge whether access code is specifically comprised by the authentication of access object:
The access code of the access object of extraction is transferred to access object by encrypted tunnel;
Judge access code whether by the authentication of access object.
Preferably, if access code is by the authentication of access object, then jump to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object comprises further:
If access code is not by the authentication of access object, and after denied access access object, the application program that normal access is corresponding with access entrance.
The invention allows for a kind of secure access device, this device comprises:
Access code typing module, for the access code by access object needed for default password input interface typing;
Access code authentication module, for judging access code whether by the authentication of access object;
Secure access Executive Module, if for the authentication of access code by access object, then jump to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object.
Preferably, this device also comprises input interface and arranges module, and input interface arranges module and comprises access entrance setting unit, application program setting unit, input interface embedded unit and password typing unit, wherein,
Access entrance setting unit is for arranging the access entrance corresponding with access object;
Application program setting unit is used for presetting the application program corresponding with access entrance;
Input interface embedded unit is used for being embedded in password input interface at the login interface of application program or interactive interface;
Password typing unit is used for the access character by password input interface typing access object.
Preferably, access code typing module comprises access character analytic unit and access code extraction unit, wherein,
After access character analytic unit is used for the access character by password input interface typing access object, analyze access character in conjunction with the password identification symbol preset;
Access code extraction unit is used for according to analysis operation, extracts the access code of access object in access character.
Preferably, access code authentication module comprises access code transmission unit and identity authenticating unit, wherein,
Access code transmission unit is used for the access code of the access object of extraction to transfer to access object by encrypted tunnel;
Identity authenticating unit is for judging access code whether by the authentication of access object;
Secure access Executive Module also comprises denied access performance element, if denied access performance element is used for access code not by the authentication of access object, and after denied access access object, and the application program that normal access is corresponding with access entrance.
The invention allows for a kind of secure access terminal, this terminal comprises above-mentioned secure access device.
Implement the present invention, first, by the access code of access object needed for the password input interface typing preset, then, access code is judged whether by the authentication of access object, finally, if access code by the authentication of access object, then jumps to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object.The protection having achieved layer inputting interface many and select, in particular cases having better protection to cryptographic object.Such as, if after user loses password, even if the second people obtains or knows the password of user, if but do not know that interface for password input is also have no way of accessing cryptographic object.The fail safe of cryptographic object is further promoted.Meanwhile, also optimize the encryption logic of existing cryptographic object, namely from cryptographic object, find the interface of typing password, typing password, access encrypted cryptographic object.Thus the encryption safeguard procedures enhanced on the whole cryptographic object.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the flow chart of the safety access method that the present invention proposes;
Fig. 2 is the flow chart of the safety access method that the present invention second preferred embodiment proposes;
Fig. 3 is the flow chart of the safety access method that the present invention the 3rd preferred embodiment proposes;
Fig. 4 is the flow chart of the safety access method that the present invention the 4th preferred embodiment proposes;
Fig. 5 is the flow chart of the safety access method that the present invention the 5th preferred embodiment proposes;
Fig. 6 is the structured flowchart of the secure access device that the present invention proposes.
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearly, understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Embodiment one
Fig. 1 is the flow chart of the safety access method that the present invention proposes.The method comprises:
S1, by the access code of access object needed for default password input interface typing.Be appreciated that safety access method that the present embodiment proposes is applicable to smart mobile phone, panel computer etc. and has in the smart machine of encryption function.
Such as, embed third party application as password input interface, as calculator, note, input method, dialing interface etc., particularly, such as, be arranged on dialing interface, then can catch the input of character string of dialing interface.Arrange simultaneously and log in password, wherein, logging in password is mate to carry out checking to the character string that captures of embedding program arranged.
S2, judges access code whether by the authentication of access object.
As above described in example, by the setting of above-mentioned steps S1, checking coupling is carried out to catching character string.Such as, be password input interface in embedding program, and the password that logs in arranged is * #110#.So, be judge that whether this login password is identical with * #110# when user inputs login password at dialing interface, if identical, then by authentication, otherwise refusal passes through authentication.
S3, if access code is by the authentication of access object, then jumps to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object.As above described in example, by the setting of above-mentioned steps S1, checking coupling is carried out to catching character string.Such as, be password input interface in embedding program, and the password that logs in arranged is * #110#.So, when user is at password input interface input * #110# and by authentication, program can jump to password typing success interface automatically or selection enters the interface checking cryptographic object.If mate unsuccessful, be then still trapped in dialing interface, and dial-up program normally runs.
The beneficial effect of the present embodiment is, first, by the access code of access object needed for the password input interface typing preset, then, access code is judged whether by the authentication of access object, finally, if access code by the authentication of access object, then jumps to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object.The protection having achieved layer inputting interface many and select, in particular cases having better protection to cryptographic object.Such as, if after user loses password, even if the second people obtains or knows the password of user, if but do not know that interface for password input is also have no way of accessing cryptographic object.The fail safe of cryptographic object is further promoted.Meanwhile, also optimize the encryption logic of existing cryptographic object, namely from cryptographic object, find the interface of typing password, typing password, access encrypted cryptographic object.Thus the encryption safeguard procedures enhanced on the whole cryptographic object.
Embodiment two
Fig. 2 is the flow chart of the safety access method that the present invention second preferred embodiment proposes.Based on above-described embodiment one, by comprising before the access code of access object needed for default password input interface typing:
S01, arranges the access entrance corresponding with access object.As above, described in example, during initialization, the third-party application needing to embed monitoring incoming event is set.
S02, presets the application program corresponding with access entrance.Such as, to the event meeting setting model, carry out redirect setting.Particularly, when the third-party application opened is correct, and when the password of input is correct, the access interface of cryptographic object can be jumped to immediately.
S03, is embedded in password input interface at the login interface of application program or interactive interface.As above, described in example, password input interface can be embedded at the login interface of third party application or interactive interface.
S04, by the access character of password input interface typing access object.The character string of input is caught by password input interface.
The beneficial effect of the present embodiment is, by arranging the access entrance corresponding with access object, preset the application program corresponding with access entrance, then, password input interface is embedded at the login interface of application program or interactive interface, finally, by the access character of password input interface typing access object.Achieve the Obtaining Accurate of the access character to access object, meanwhile, ensure that the access character to access object obtains the secret protection at interface, strengthen the security guarantee in the access character Input Process of access object further.
Embodiment three
Fig. 3 is the flow chart of the safety access method that the present invention the 3rd preferred embodiment proposes.Based on above-described embodiment one and embodiment two, specifically comprised by the access code of access object needed for default password input interface typing:
S11, after the access character by password input interface typing access object, analyzes access character in conjunction with the password identification symbol preset.
Further, pre-set password identification symbol, analyzed the access character of typing by password identification symbol.In order to avoid the access character of typing conflicts with the typing character occurrence logic embedding program itself, therefore, password identification symbol is set, then can the access character setting arbitrarily also typing be oppositely analyzed.
S12, according to analysis operation, extracts the access code of access object in access character.By above-mentioned analysis operation, obtain the access code of access object.
Further, above-mentioned default password identification symbol can be the key informations such as the private key of being distributed by high in the clouds.
The beneficial effect of the present embodiment is, after the access character by password input interface typing access object, analyzes access character in conjunction with the password identification symbol preset, then, according to analysis operation, extracts the access code of access object in access character.Achieve the Obtaining Accurate to the access code in access character, the authentication operation for the access code in subsequent access character provides and judges basis accurately.
Embodiment four
Fig. 4 is the flow chart of the safety access method that the present invention the 4th preferred embodiment proposes.Based on above-described embodiment one to embodiment three, judge whether access code is specifically comprised by the authentication of access object:
S21, transfers to access object by the access code of the access object of extraction by encrypted tunnel.As above described in example, when complete embed third-party application as password input interface after, set up the encrypted tunnel between cryptographic object and third-party application, by encrypted tunnel, access code transferred to access object.
S22, performs and judges access code whether by the authentication operation of access object.Deterministic process is as above described in example particularly, does not repeat them here.
The beneficial effect of the present embodiment is, transfers to access object by the access code of the access object by extraction by encrypted tunnel, then judges access code whether by the authentication of access object.Thus ensure that access code can not be stolen and usurp in transmitting procedure, strengthen the security reliability by access code checking cryptographic object further.
Embodiment five
Fig. 5 is the flow chart of the safety access method that the present invention the 5th preferred embodiment proposes.Based on above-described embodiment one to embodiment four, if access code by the authentication of access object, then jumps to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object comprises further:
S31, if access code is not by the authentication of access object, and after denied access access object, the application program that normal access is corresponding with access entrance.As above, described in example, if above-mentioned access code coupling is unsuccessful, is the authentication by access object, then will be trapped in dialing interface, and dial-up program normally runs.
The beneficial effect of the present embodiment is, if by judging that access code is not by the authentication of access object, and after denied access access object, and the application program that normal access is corresponding with access entrance.On the one hand, protect when the authentication of access code not by access object, to the protection of access object access rights, on the other hand, the content avoiding access object is leaked.
Implement safety access method of the present invention, first, by the access code of access object needed for the password input interface typing preset, then, access code is judged whether by the authentication of access object, finally, if access code by the authentication of access object, then jumps to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object.The protection having achieved layer inputting interface many and select, in particular cases having better protection to cryptographic object.Such as, if after user loses password, even if the second people obtains or knows the password of user, if but do not know that interface for password input is also have no way of accessing cryptographic object.The fail safe of cryptographic object is further promoted.Meanwhile, also optimize the encryption logic of existing cryptographic object, namely from cryptographic object, find the interface of typing password, typing password, access encrypted cryptographic object.Thus the encryption safeguard procedures enhanced on the whole cryptographic object.
One of ordinary skill in the art will appreciate that all or part of step realized in above-described embodiment method is that the hardware that can control to be correlated with by program completes, described program can be stored in a computer read/write memory medium, described storage medium, as ROM/RAM, disk, CD etc.
Embodiment six
Fig. 6 is the structured flowchart of the secure access device that the present invention proposes.The invention allows for a kind of secure access device, this device comprises:
Access code typing module 10, for the access code by access object needed for default password input interface typing;
Access code authentication module 20, for judging access code whether by the authentication of access object;
Secure access Executive Module 30, if for the authentication of access code by access object, then jump to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object.
Further, this device also comprises input interface and arranges module 40, and input interface arranges module 40 and comprises access entrance setting unit 41, application program setting unit 42, input interface embedded unit 43 and password typing unit 44, wherein,
Access entrance setting unit 41 is for arranging the access entrance corresponding with access object;
Application program setting unit 42 is for presetting the application program corresponding with access entrance;
Input interface embedded unit 43 is for being embedded in password input interface at the login interface of application program or interactive interface;
Password typing unit 444 is for the access character by password input interface typing access object.
Further, access code typing module 10 comprises access character analytic unit 11 and access code extraction unit 12, wherein,
Access character analytic unit 11, for by after the access character of password input interface typing access object, analyzes access character in conjunction with the password identification symbol preset;
Access code extraction unit 12, for according to analysis operation, extracts the access code of access object in access character.
Further, access code authentication module 20 comprises access code transmission unit 21 and identity authenticating unit 22, wherein,
Access code transmission unit 21 transfers to access object for the access code of the access object by extraction by encrypted tunnel;
Identity authenticating unit 22 is for judging access code whether by the authentication of access object;
Secure access Executive Module 30 also comprises denied access performance element 31, if denied access performance element 31 for access code not by the authentication of access object, and after denied access access object, the application program that normal access is corresponding with access entrance.
The invention allows for a kind of secure access terminal, this terminal comprises above-mentioned secure access device.
This secure access device may be used for mobile phone, or there are other intelligent communications terminals of cryptographic authorization functions, such as, in smart mobile phone etc., can be run on the software unit in these communication terminals, also can be integrated in these communication terminals as independently suspension member or run in the application system of these mobile terminals.
It should be noted that, the technical characteristic in said method embodiment is all corresponding applicable at this device, no longer repeats here.
Implement secure access device of the present invention and terminal, first, by the access code of access object needed for the password input interface typing preset, then, access code is judged whether by the authentication of access object, finally, if access code by the authentication of access object, then jumps to access object, and the access rights of granted access object, if access code is not by the authentication of access object, then denied access access object.The protection having achieved layer inputting interface many and select, in particular cases having better protection to cryptographic object.Such as, if after user loses password, even if the second people obtains or knows the password of user, if but do not know that interface for password input is also have no way of accessing cryptographic object.The fail safe of cryptographic object is further promoted.Meanwhile, also optimize the encryption logic of existing cryptographic object, namely from cryptographic object, find the interface of typing password, typing password, access encrypted cryptographic object.Thus the encryption safeguard procedures enhanced on the whole cryptographic object.
Above with reference to the accompanying drawings of the preferred embodiments of the present invention, not thereby limit to interest field of the present invention.Those skilled in the art do not depart from the scope and spirit of the present invention, and multiple flexible program can be had to realize the present invention, and the feature such as an embodiment can be used for another embodiment and obtains another embodiment.All use do within technical conceive of the present invention any amendment, equivalently replace and improve, all should within interest field of the present invention.

Claims (10)

1. a safety access method, is characterized in that, described method comprises:
By the access code of access object needed for default password input interface typing;
Judge described access code whether by the authentication of described access object;
If described access code is by the authentication of described access object, then jump to described access object, and authorize the access rights of described access object, if described access code is not by the authentication of described access object, then access object described in denied access.
2. safety access method according to claim 1, is characterized in that, comprises before the access code of access object needed for the described password input interface typing by presetting:
The access entrance corresponding with described access object is set;
Preset the application program corresponding with described access entrance;
Described password input interface is embedded at the login interface of described application program or interactive interface;
By the access character of access object described in the typing of described password input interface.
3. safety access method according to claim 2, is characterized in that, needed for the described password input interface typing by presetting, the access code of access object specifically comprises:
After access character by access object described in the typing of described password input interface, analyze described access character in conjunction with the password identification symbol preset;
According to described analysis operation, in described access character, extract the access code of described access object.
4. safety access method according to claim 3, is characterized in that, describedly judges whether described access code is specifically comprised by the authentication of described access object:
The access code of the described access object of described extraction is transferred to described access object by encrypted tunnel;
Judge described access code whether by the authentication of described access object.
5. safety access method according to claim 4, it is characterized in that, if described access code is by the authentication of described access object, then jump to described access object, and authorize the access rights of described access object, if described access code is not by the authentication of described access object, then described in denied access, access object comprises further:
If described access code is not by the authentication of described access object, and after access object described in denied access, the application program that normal access is corresponding with described access entrance.
6. a secure access device, is characterized in that, described device comprises:
Access code typing module, for the access code by access object needed for default password input interface typing;
Access code authentication module, for judging described access code whether by the authentication of described access object;
Secure access Executive Module, if for the authentication of described access code by described access object, then jump to described access object, and authorize the access rights of described access object, if described access code is not by the authentication of described access object, then access object described in denied access.
7. secure access device according to claim 6, it is characterized in that, also comprise input interface and arrange module, described input interface arranges module and comprises access entrance setting unit, application program setting unit, input interface embedded unit and password typing unit, wherein
Described access entrance setting unit is for arranging the access entrance corresponding with described access object;
Described application program setting unit is used for presetting the application program corresponding with described access entrance;
Described input interface embedded unit is used for being embedded in described password input interface at the login interface of described application program or interactive interface;
Described password typing unit is used for the access character by access object described in the typing of described password input interface.
8. secure access device according to claim 7, is characterized in that, described access code typing module comprises access character analytic unit and access code extraction unit, wherein,
After described access character analytic unit is used for the access character by access object described in the typing of described password input interface, analyze described access character in conjunction with the password identification symbol preset;
Described access code extraction unit is used for according to described analysis operation, extracts the access code of described access object in described access character.
9. secure access device according to claim 8, is characterized in that, described access code authentication module comprises access code transmission unit and identity authenticating unit, wherein,
Described access code transmission unit is used for the access code of the described access object of described extraction to transfer to described access object by encrypted tunnel;
Described identity authenticating unit is for judging described access code whether by the authentication of described access object;
Described secure access Executive Module also comprises denied access performance element, if described denied access performance element is used for described access code not by the authentication of described access object, and after access object described in denied access, the application program that normal access is corresponding with described access entrance.
10. a secure access terminal, is characterized in that, described terminal comprises the secure access device described in described claim 6-9.
CN201510023929.0A 2015-01-16 2015-01-16 Safety access method, device and terminal Active CN104539627B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510023929.0A CN104539627B (en) 2015-01-16 2015-01-16 Safety access method, device and terminal
PCT/CN2015/090614 WO2016112712A1 (en) 2015-01-16 2015-09-24 Secure access method, apparatus, and terminal, storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510023929.0A CN104539627B (en) 2015-01-16 2015-01-16 Safety access method, device and terminal

Publications (2)

Publication Number Publication Date
CN104539627A true CN104539627A (en) 2015-04-22
CN104539627B CN104539627B (en) 2017-02-22

Family

ID=52855096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510023929.0A Active CN104539627B (en) 2015-01-16 2015-01-16 Safety access method, device and terminal

Country Status (2)

Country Link
CN (1) CN104539627B (en)
WO (1) WO2016112712A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105704143A (en) * 2016-03-17 2016-06-22 珠海格力电器股份有限公司 Method and apparatus for processing playing resources
CN105787335A (en) * 2016-02-25 2016-07-20 东莞盛世科技电子实业有限公司 Switching control method and device for password input interface
WO2016112712A1 (en) * 2015-01-16 2016-07-21 努比亚技术有限公司 Secure access method, apparatus, and terminal, storage medium
CN108932086A (en) * 2017-05-23 2018-12-04 腾讯科技(深圳)有限公司 Display methods, device and the storage medium of application interface

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005661A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with data and menu hidden function and its enciphering hiding method
CN102045450A (en) * 2011-01-12 2011-05-04 深圳桑菲消费通信有限公司 Method for protecting mobile phone information security
CN103313238A (en) * 2013-06-20 2013-09-18 天翼电信终端有限公司 Safety system and safety protection method for mobile terminal
CN104008348A (en) * 2014-04-17 2014-08-27 小米科技有限责任公司 Application program control method, application program control device and terminal
CN104217172A (en) * 2013-06-03 2014-12-17 腾讯科技(深圳)有限公司 Privacy content checking method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7941405B2 (en) * 2007-03-30 2011-05-10 Data Center Technologies Password protection for file backups
CN101350717B (en) * 2007-07-18 2011-04-27 ***通信集团公司 Method and system for logging on third party server through instant communication software
CN101478595A (en) * 2008-09-08 2009-07-08 广东南方信息安全产业基地有限公司 Mobile communication terminal data protection method
CN104252605B (en) * 2014-09-17 2017-03-15 南京信息工程大学 A kind of file transparent encrypting and deciphering system of Android platform and method
CN104539627B (en) * 2015-01-16 2017-02-22 努比亚技术有限公司 Safety access method, device and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005661A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with data and menu hidden function and its enciphering hiding method
CN102045450A (en) * 2011-01-12 2011-05-04 深圳桑菲消费通信有限公司 Method for protecting mobile phone information security
CN104217172A (en) * 2013-06-03 2014-12-17 腾讯科技(深圳)有限公司 Privacy content checking method and device
CN103313238A (en) * 2013-06-20 2013-09-18 天翼电信终端有限公司 Safety system and safety protection method for mobile terminal
CN104008348A (en) * 2014-04-17 2014-08-27 小米科技有限责任公司 Application program control method, application program control device and terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016112712A1 (en) * 2015-01-16 2016-07-21 努比亚技术有限公司 Secure access method, apparatus, and terminal, storage medium
CN105787335A (en) * 2016-02-25 2016-07-20 东莞盛世科技电子实业有限公司 Switching control method and device for password input interface
CN105787335B (en) * 2016-02-25 2019-06-18 东莞盛世科技电子实业有限公司 Interface for password input method for handover control and device
CN105704143A (en) * 2016-03-17 2016-06-22 珠海格力电器股份有限公司 Method and apparatus for processing playing resources
CN108932086A (en) * 2017-05-23 2018-12-04 腾讯科技(深圳)有限公司 Display methods, device and the storage medium of application interface
US11176228B2 (en) 2017-05-23 2021-11-16 Tencent Technology (Shenzhen) Company Limited Application interface display method, apparatus, and terminal, and storage medium

Also Published As

Publication number Publication date
WO2016112712A1 (en) 2016-07-21
CN104539627B (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN105205370B (en) Mobile terminal safety means of defence and mobile terminal, security system and methods for using them
US20170063827A1 (en) Data obfuscation method and service using unique seeds
CN105847305A (en) Safe processing and accessing method of cloud resource
CN104751538B (en) The implementation method and gate control system of a kind of opening gate
CN102509055A (en) Mobile terminal and method for hiding programs of mobile terminal
CN106488452A (en) A kind of mobile terminal safety access authentication method of combination fingerprint
CN103457922A (en) Electronic authentication client-side system, processing method, electronic authentication system and method
CN104539627A (en) Safety access method, device and terminal
CN102542449A (en) Wireless communication device and payment authentication method
CN106778138A (en) The control method and device of software license limit
CN107295024A (en) It is a kind of to realize the method that web front end is landed safely and accessed
CN103617005A (en) Access method, device and system for intelligent card
CN107733636A (en) Authentication method and Verification System
CN112905965B (en) Financial big data processing system based on block chain
Strobl et al. Connected cars—Threats, vulnerabilities and their impact
CN104144411A (en) Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal
CN105208045A (en) Identity authentication method, equipment and system
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN107358097A (en) A kind of method and system in open environment Computer protecting information safety
CN104883341A (en) Application management device, terminal and application management method
CN112464213A (en) Operating system access control method, device, equipment and storage medium
KR101635278B1 (en) Multi-factor authentication with dynamic handshake quick-response code
US20220295280A1 (en) Online validation service secures access to devices connected wirelessly to a secure secondary intelligent router module, which is connected via a wireless connection to a Primary Wired/Wireless Router/Modem
US20210111885A1 (en) Electronic access control multi-factor authentication using centralized hardware secured credential system and methods of use thereof
CN113591053A (en) Method and system for identifying general mobile equipment based on biological information

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant after: Nubian Technologies Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant before: Shenzhen ZTE Mobile Tech Co., Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant