[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105631250A - Method and device for obtaining image information of users illegally accessing to application programs - Google Patents

Method and device for obtaining image information of users illegally accessing to application programs Download PDF

Info

Publication number
CN105631250A
CN105631250A CN201510958959.0A CN201510958959A CN105631250A CN 105631250 A CN105631250 A CN 105631250A CN 201510958959 A CN201510958959 A CN 201510958959A CN 105631250 A CN105631250 A CN 105631250A
Authority
CN
China
Prior art keywords
user
latching operation
solution latching
application program
image information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510958959.0A
Other languages
Chinese (zh)
Inventor
纪纲
郭帅
刘刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510958959.0A priority Critical patent/CN105631250A/en
Publication of CN105631250A publication Critical patent/CN105631250A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a method and device for obtaining image information of users illegally accessing to application programs. The method comprises the following steps: receiving an unlocking operation carried out by a user for any application program in locking state in terminal equipment; judging whether the unlocking operation is illegal; and when the unlocking operation is illegal, starting a shooting function of the terminal equipment and executing a shooting operation so as to obtain the image information of the user. Through the method and device provided by the invention, the legality of the unlocking operation can be judged objectively, the wrong unlocking operations caused by incorrect operations of the users can be prevented from being judged as illegal unlocking operations, image basis is provided to subsequently prompt the illegal accessors for the legal users , and the legal users can process the privacy information of corresponding application programs according to the obtained prompt information, so that the user privacy disclosure risk is reduced, the using safety of the users is improved and the terminal using experience of the users is improved.

Description

Obtain method and the device of the image information of the user of unauthorized access application program
Technical field
The present invention relates to field of computer technology, specifically, the present invention relates to the method for the image information of a kind of user obtaining unauthorized access application program and device.
Background technology
Along with the development in epoch, various terminal units have become requisite instrument in people's life, and various powerful terminal operating systems and end application continue to bring out, and bring for user and experience more easily. Along with improving constantly of end application safe class, end application can be encrypted locking according to the demand for security of self and privacy requirements by user, when user opens the end application through encryption lock, it is necessary to by corresponding unlocking manner, end application is unlocked. Along with the continuous enhancing of the sense of security of users and privacy aware, validated user wishes to know that whether having disabled user to attempt the demand of access application also strengthens therewith. But, in prior art when disabled user attempts the unlocking manner access application adopting mistake, validated user cannot get any information of unauthorized users to access application program.
Accordingly, it would be desirable to the scheme of the relevant information of a kind of user obtaining unauthorized access application program, when disabled user adopts the unlocking manner access application of mistake, the relevant information of unauthorized users to access application program can be got, and provide to validated user.
Summary of the invention
For overcoming above-mentioned technical problem or solving above-mentioned technical problem at least in part, special proposition techniques below scheme:
Embodiments of the invention propose the method for the image information of a kind of user obtaining unauthorized access application program, including:
Receive the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit;
Judge whether described solution latching operation is illegal solution latching operation;
When judging that described solution latching operation is illegal solution latching operation, start the shoot function of described terminal unit and perform shooting operation, to obtain the image information of described user.
Preferably, receive the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit, including:
Receive the solution latching operation unlocking interface input of the user's arbitrary application program by being in the lock state in terminal unit.
Wherein, the implementation of described solution latching operation includes but not limited to:
Numeral combination;
Numeral and monogram;
Numeral and letter, symbol combination;
Gesture password;
Fingerprint recognition.
Preferably, receive the solution latching operation unlocking interface input of the user's arbitrary application program by being in the lock state in terminal unit, specifically include:
The screen of described terminal unit is shown the unblock interface being associated with predetermined application scenarios of the arbitrary application program being in the lock state;
Receive the solution latching operation that described user is matched with described predetermined application scenarios by the input of described unblock interface.
Preferably, it is judged that whether described solution latching operation is illegal solution latching operation, specifically includes:
Judge whether described solution latching operation mates with corresponding verification operation;
If judging, described solution latching operation does not mate with described verification operation, it is determined that occur to unlock the unmatched number of times of operation demonstration for described application program in effective time region;
When occurring the unblock unmatched number of times of operation demonstration to reach pre-determined number threshold value for described application program in effective time region, it is judged that the solution latching operation of described application program is illegal solution latching operation by described user.
Preferably, the method also includes:
If judging, described solution latching operation does not mate with described verification operation, updates and occurs to unlock the unmatched number of times of operation demonstration for described application program in effective time region.
Preferably, start the shoot function of described terminal unit and perform shooting operation, including:
Start the preposition shoot function of described terminal unit and perform shooting operation.
Preferably, the method also includes:
When judging that described solution latching operation is legal solution latching operation, it is determined that the front of described legal solution latching operation once unlocks whether operation is illegal solution latching operation;
If the front of described legal solution latching operation once unlocks operation for illegal solution latching operation, generate and show the information for notifying described illegal solution latching operation.
Another embodiment of the present invention proposes the device of the image information of a kind of user obtaining unauthorized access application program, including:
Receiver module, for receiving the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit;
Judge module, is used for judging whether described solution latching operation is illegal solution latching operation;
Acquisition module, for when judging that described solution latching operation is illegal solution latching operation, starting the shoot function of described terminal unit and perform shooting operation, to obtain the image information of described user.
Preferably, described receiver module includes:
Receive unit, for receiving the solution latching operation unlocking interface input of the user's arbitrary application program by being in the lock state in terminal unit.
Wherein, the implementation of described solution latching operation includes but not limited to:
Numeral combination;
Numeral and monogram;
Numeral and letter, symbol combination;
Gesture password;
Fingerprint recognition.
Preferably, described reception unit specifically includes:
Show subelement, for showing the unblock interface being associated with predetermined application scenarios of the arbitrary application program being in the lock state on the screen of described terminal unit;
Receive subelement, for receiving the solution latching operation that described user is matched with described predetermined application scenarios by the input of described unblock interface.
Preferably, described judge module specifically includes:
First judging unit, is used for judging whether described solution latching operation mates with corresponding verification operation;
Determine unit, if for judging that described solution latching operation does not mate with described verification operation, it is determined that occur to unlock the unmatched number of times of operation demonstration for described application program in effective time region;
Second judging unit, for when occurring the unblock unmatched number of times of operation demonstration to reach pre-determined number threshold value for described application program, it is judged that the solution latching operation of described application program is illegal solution latching operation by described user in effective time region.
Preferably, this device also includes:
More new module, if for judging that described solution latching operation does not mate with described verification operation, updates and occurs to unlock the unmatched number of times of operation demonstration for described application program in effective time region.
Preferably, described acquisition module includes:
Shooting unit, for starting the preposition shoot function of described terminal unit and performing shooting operation.
Preferably, this device also includes:
Determine module, for when judging that described solution latching operation is legal solution latching operation, it is determined that the front of described legal solution latching operation once unlocks whether operation is illegal solution latching operation;
Display module, if once unlocking operation for illegal solution latching operation for the front of described legal solution latching operation, generating and showing the information for notifying described illegal solution latching operation.
Another embodiment of the present invention proposes a kind of terminal unit, including the device of image information of the user of aforesaid acquisition unauthorized access application program.
In embodiments of the invention, propose method and the device of the image information of a kind of user obtaining unauthorized access application program, when the situation of unlocking manner access application occurring disabled user to adopt mistake, according to when occurring the unblock unmatched number of times of operation demonstration to reach pre-determined number threshold value for application program in effective time region, can determine whether that the solution latching operation of user's application programs is illegal solution latching operation, whether illegal objectively and accurately judge to solve latching operation, avoid that false release operation that user produces because of operational error is misjudged breaks as illegal solution latching operation, meanwhile, by starting the shoot function of terminal unit and performing shooting operation and can get the image information of unauthorized users to access application program, unauthorized access person that may be present is pointed out to provide image foundation for follow-up to validated user. subsequently, when validated user is operated into application program by correct unblock, if correct the front of latching operation that solve once unlocks operation for illegal solution latching operation, generate and show for notifying the information of illegal solution latching operation, the potential safety hazard information that can exist to validated user prompting application program in the way of visual in image in time, further, the privacy information of corresponding application programs can be processed in time by validated user according to the information got, and reducing the risk that privacy of user is revealed, improve the use safety of user, thus improve the terminal experience of user.
Aspect and advantage that the present invention adds will part provide in the following description, and these will become apparent from the description below, or is recognized by the practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or that add aspect and advantage will be apparent from easy to understand from the following description of the accompanying drawings of embodiments, wherein:
Fig. 1 is the flow chart of the method for the image information of the user obtaining unauthorized access application program of an embodiment in the present invention;
Fig. 2 is the flow chart of the method for the image information of the user obtaining unauthorized access application program of a preferred embodiment in the present invention;
Fig. 3 is the exemplary plot that in the present invention, in another preferred embodiment, functional condition is put;
Fig. 4 is image viewing exemplary plot in another embodiment in the present invention;
Fig. 5 is the structural representation of the device of the image information of the user obtaining unauthorized access application program of another embodiment in the present invention;
Fig. 6 is the structural representation of the device of the image information of the user obtaining unauthorized access application program of another preferred embodiment in the present invention.
Detailed description of the invention
Being described below in detail embodiments of the invention, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of same or like function from start to finish. The embodiment described below with reference to accompanying drawing is illustrative of, and is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, and singulative used herein " ", " one ", " described " and " being somebody's turn to do " may also comprise plural form. Should be further understood that, the wording " including " used in the description of the present invention refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existence or adds other features one or more, integer, step, operation, element, assembly and/or their group. It should be understood that when we claim element to be " connected " or during " coupled " to another element, it can be directly connected or coupled to other elements, or can also there is intermediary element. Additionally, " connection " used herein or " coupling " can include wireless connections or wireless couple. Wording "and/or" used herein includes one or more list the whole of item or any cell being associated and combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technical term and scientific terminology), have with the those of ordinary skill in art of the present invention be commonly understood by identical meaning. It should also be understood that, those terms of definition in such as general dictionary, should be understood that there is the meaning consistent with the meaning in the context of prior art, and unless by specific definitions as here, otherwise will not explain by idealization or excessively formal implication.
Fig. 1 is the flow chart of the method for the image information of the user obtaining unauthorized access application program of an embodiment in the present invention.
Step S110: receive the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit; Step S120: judge to solve whether latching operation is illegal solution latching operation; Step S130: when judging that solving latching operation is illegal solution latching operation, starts the shoot function of terminal unit and performs shooting operation, to obtain the image information of user.
In embodiments of the invention, the method proposing the image information of a kind of user obtaining unauthorized access application program, when the situation of unlocking manner access application occurring disabled user to adopt mistake, according to when occurring the unblock unmatched number of times of operation demonstration to reach pre-determined number threshold value for application program in effective time region, can determine whether that the solution latching operation of user's application programs is illegal solution latching operation, whether illegal objectively and accurately judge to solve latching operation, it is to avoid false release operation that user produces because of operational error is misjudged breaks as illegal solution latching operation; Meanwhile, by starting the shoot function of terminal unit and performing shooting operation and can get the image information of unauthorized users to access application program, unauthorized access person that may be present is pointed out to provide image foundation for follow-up to validated user. Subsequently, when validated user is operated into application program by correct unblock, if correct the front of latching operation that solve once unlocks operation for illegal solution latching operation, generate and show for notifying the information of illegal solution latching operation, the potential safety hazard information that can exist to validated user prompting application program in the way of visual in image in time; Further, the privacy information of corresponding application programs can be processed in time by validated user according to the information got, and reducing the risk that privacy of user is revealed, improve the use safety of user, thus improve the terminal experience of user.
Step S110: receive the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit.
Wherein, the implementation solving latching operation includes but not limited to:
Numeral combination;
Numeral and monogram;
Numeral and letter, symbol combination;
Gesture password;
Fingerprint recognition.
Such as, in terminal unit, when the activation trigger action of the user APP1 to being in the lock state being detected, the screen of terminal unit is shown the unblock interface of APP1, is subsequently received user in unlocking interface, performs the solution latching operation of input " 5 ", " 4 ", " 5 ", " 3 " and " 1 " successively.
Preferably (with reference to Fig. 1), step S110 includes step S111 (not shown). Step S111: receive the solution latching operation unlocking interface input of the user's arbitrary application program by being in the lock state in terminal unit.
Such as, in terminal unit, when the activation trigger action of the user APP1 to being in the lock state being detected, the screen of terminal unit is shown the gesture password of APP1 unlocks interface, receive the solution latching operation that user unlocks the gesture password of interface input at gesture password.
More preferably (with reference to Fig. 1), the step solving latching operation unlocking interface input receiving the user's arbitrary application program by being in the lock state in terminal unit includes step S1111 (not shown) and step S1112 (not shown). Step S1111: show the unblock interface being associated with predetermined application scenarios of the arbitrary application program being in the lock state on the screen of terminal unit; Step S1112: receive user by unlocking the solution latching operation that interface input matches with predetermined application scenarios.
Such as, in terminal unit, the predetermined application scenarios being associated with application A PP1 unblock interface is computer, when the activation trigger action of the user APP1 to being in the lock state being detected, the unblock interface showing APP1 on the screen of terminal unit is computer inputting interface, receive subsequently user by the solution latching operation that computer inputting interface performs successively include clicking character " 5 ", "+", " 5 ", "=" and "+".
Step S120: judge to solve whether latching operation is illegal solution latching operation.
Such as, it is judged that receive user input gesture password with corresponding verify gesture password do not mate time, it is judged that the solution latching operation of user is illegal solution latching operation.
In a preferred embodiment, as shown in Figure 2, it is judged that unlock the step whether operation is illegal solution latching operation and include step S221, step S222 and step S223. Step S221: judge to solve whether latching operation mates with corresponding verification operation; Step S222: solving latching operation does not mate with verification operation if judging, it is determined that occur to unlock the unmatched number of times of operation demonstration for application program in effective time region; Step S223: when occurring the unblock unmatched number of times of operation demonstration to reach pre-determined number threshold value for application program in effective time region, it is judged that the solution latching operation of user's application programs is illegal solution latching operation.
Wherein, step S2221 (not shown) is also included in step S222. Step S2221: solving latching operation does not mate with verification operation, updates and occurs to unlock the unmatched number of times of operation demonstration for application program in effective time region if judging.
Such as, the predetermined application scenarios being associated with application A PP1 unblock interface is computer, and predetermined effective time region is 3 minutes, and is predefined in 3 minutes and occurs the unblock unmatched frequency threshold value of operation demonstration to be 2 for application A PP1, when the activation trigger action of the user APP1 to being in the lock state being detected, the unblock interface showing APP1 on the screen of terminal unit is computer inputting interface, receive user and include click character " 5 " in " 2015-12-1613:14:00 " moment by what computer inputting interface sequentially input, "+" and "+" solution latching operation, judge to include clicking character " 5 ", "+" and "+" solve latching operation do not mate with the unblock verification operation of APP1, that then records user's input solves latching operation and the time " 2015-12-1613:14:00 " solving latching operation that the unmatched number of times of verification operation is 1 and user's input error, user continues through the input of computer inputting interface and includes clicking character " 5 ", " 6 " and "=" solution latching operation, can determine whether that the latching operation that solves of user's this time input does not mate with the unblock verification operation of APP1, user's this time unblock operating time " 2015-12-1613:15:00 " of input and the time difference of " 2015-12-1613:14:00 " time can be obtained less than 3 minutes, update the solution latching operation of user's input within the effective time region be " 2015-12-1613:14:00 " with starting point 3 minutes and the unmatched number of times of verification operation subsequently for 2, and the time " 2015-12-1613:15:00 " of record user this time input error solution latching operation, according to user from starting point for the effective time region of " 2015-12-1613:14:00 " for application A PP1 occur unlock the unmatched number of times of operation demonstration reach pre-determined number threshold value 2, can determine whether that the user application programs APP1 solution latching operation in " 2015-12-1613:15:00 " moment is illegal solution latching operation.
Step S130: when judging that solving latching operation is illegal solution latching operation, starts the shoot function of terminal unit and performs shooting operation, to obtain the image information of user.
Such as, when the solution latching operation judging user is illegal solution latching operation, starts the camera application of terminal unit and perform shooting operation, to obtain the image information of user.
In a preferred embodiment, step S130 also includes step S131 (not shown). Step S131: start the preposition shoot function of terminal unit and perform shooting operation.
Such as, when judging that user application programs APP1 is when the solution latching operation in " 2015-12-1613:15:00 " moment is illegal solution latching operation, start the shoot function of the front-facing camera of terminal unit and perform shooting operation, to obtain the image information of user.
In a preferred embodiment, the method also includes step S140 (not shown) and step S150 (not shown). Step S140: when judging that solving latching operation is legal solution latching operation, it is determined that the front of legal solution latching operation once unlocks whether operation is illegal solution latching operation; Step S150: if the front of legal solution latching operation once unlocks operation for illegal solution latching operation, generate and show the information for notifying illegal solution latching operation.
Such as, when user includes clicking the solution latching operation of character " 5 ", "+" and "=" subsequently by unlocking interface input, can determine whether the solution latching operation of user's this time input verification operation coupling corresponding with APP1, can determine whether that this solution latching operation of user is legal solution latching operation, the program opening APP1 enters the page, operating time according to user's this time legal solution latching operation is " 2015-12-1613:16:00 ", can determine that user once unlocks operation at the front of " 2015-12-1613:16:00 " moment legal solution latching operation, namely user's solution latching operation in " 2015-12-1613:15:00 " moment is illegal solution latching operation, subsequently, generate the information for notifying the illegal solution latching operation in " 2015-12-1613:15:00 " moment, and be shown in the program displays interface of APP1, information such as " 2015-12-1613:15:00, disabled user is likely to peep your application A PP1, please check picture ".
In a concrete application scenarios, in terminal unit, the function setting interface that user is provided by terminal unit, open and pre-set the function of " the capturing intruder " of application program " wechat ", as shown in Figure 3, when user being detected to the activation trigger action of " wechat " that be in the lock state, the screen of terminal unit is shown the unblock interface of " wechat ", receive the solution latching operation that user inputted in " 2015-12-1615:40:00 " moment subsequently, the solution latching operation that inputs in " 2015-12-1615:40:00 " moment according to the user checking solution latching operation predetermined with " wechat " mates, can determine that user's solution latching operation in " 2015-12-1615:40:00 " moment is legal solution latching operation, if user is illegal solution latching operation at front operation such as the user's solution latching operation in " 2015-12-1615:35:00 " moment that once unlocks of the legal solution latching operation in " 2015-12-1615:40:00 " moment, subsequently, generate and show the information such as " 2015-12-1615:35:00 for notifying the illegal solution latching operation in " 2015-12-1615:35:00 " moment, disabled user is likely to peep your wechat ", after user clicks this information, the function of " the capturing intruder " of " wechat " can be shown with the image information after the compression of the disabled user captured to user with the list mode that the time is order, as shown in Figure 4, when user clicks any image information, the original image information of disabled user corresponding to this image information can be checked.
Fig. 5 is the structural representation of the device of the image information of the user obtaining unauthorized access application program of another embodiment in the present invention.
Receiver module 510 receives the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit; Judge module 520 judges to solve whether latching operation is illegal solution latching operation; When judging that solving latching operation is illegal solution latching operation, acquisition module 530 starts the shoot function of terminal unit and performs shooting operation, to obtain the image information of user.
In embodiments of the invention, propose the device of the image information of a kind of user obtaining unauthorized access application program, when the situation of unlocking manner access application occurring disabled user to adopt mistake, according to when occurring the unblock unmatched number of times of operation demonstration to reach pre-determined number threshold value for application program in effective time region, can determine whether that the solution latching operation of user's application programs is illegal solution latching operation, whether illegal objectively and accurately judge to solve latching operation, it is to avoid false release operation that user produces because of operational error is misjudged breaks as illegal solution latching operation; Meanwhile, by starting the shoot function of terminal unit and performing shooting operation and can get the image information of unauthorized users to access application program, unauthorized access person that may be present is pointed out to provide image foundation for follow-up to validated user. Subsequently, when validated user is operated into application program by correct unblock, if correct the front of latching operation that solve once unlocks operation for illegal solution latching operation, generate and show for notifying the information of illegal solution latching operation, the potential safety hazard information that can exist to validated user prompting application program in the way of visual in image in time; Further, the privacy information of corresponding application programs can be processed in time by validated user according to the information got, and reducing the risk that privacy of user is revealed, improve the use safety of user, thus improve the terminal experience of user.
Receiver module 510 receives the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit.
Wherein, the implementation solving latching operation includes but not limited to:
Numeral combination;
Numeral and monogram;
Numeral and letter, symbol combination;
Gesture password;
Fingerprint recognition.
Such as, in terminal unit, when the activation trigger action of the user APP1 to being in the lock state being detected, the screen of terminal unit is shown the unblock interface of APP1, is subsequently received user in unlocking interface, performs the solution latching operation of input " 5 ", " 4 ", " 5 ", " 3 " and " 1 " successively.
Preferably (with reference to Fig. 5), receiver module includes receiving unit (not shown). Receive unit and receive the solution latching operation unlocking interface input of the user's arbitrary application program by being in the lock state in terminal unit.
Such as, in terminal unit, when the activation trigger action of the user APP1 to being in the lock state being detected, the screen of terminal unit is shown the gesture password of APP1 unlocks interface, receive the solution latching operation that user unlocks the gesture password of interface input at gesture password.
More preferably (with reference to Fig. 5), receive unit and include showing subelement (not shown) and receiving subelement (not shown). Show that the unblock interface being associated with predetermined application scenarios of the arbitrary application program being in the lock state shown by subelement on the screen of terminal unit; Receive subelement and receive user by unlocking the solution latching operation that interface input matches with predetermined application scenarios.
Such as, in terminal unit, the predetermined application scenarios being associated with application A PP1 unblock interface is computer, when the activation trigger action of the user APP1 to being in the lock state being detected, the unblock interface showing APP1 on the screen of terminal unit is computer inputting interface, receive subsequently user by the solution latching operation that computer inputting interface performs successively include clicking character " 5 ", "+", " 5 ", "=" and "+".
Judge module 520 judges to solve whether latching operation is illegal solution latching operation.
Such as, it is judged that receive user input gesture password with corresponding verify gesture password do not mate time, it is judged that the solution latching operation of user is illegal solution latching operation.
In a preferred embodiment, as shown in Figure 6, it is judged that module includes the first judging unit 621, determines unit 622 and the second judging unit 623. First judging unit 621 judges to solve whether latching operation mates with corresponding verification operation; If judging, solving latching operation does not mate with verification operation, it is determined that unit 622 is determined in effective time region for the application program generation unblock unmatched number of times of operation demonstration; When occurring the unblock unmatched number of times of operation demonstration to reach pre-determined number threshold value for application program in effective time region, the second judging unit 623 judges that the solution latching operation of user's application programs is illegal solution latching operation.
Preferably, this device also includes more new module (not shown). If judging, solving latching operation does not mate with verification operation, and more new module updates and occurs to unlock the unmatched number of times of operation demonstration for application program in effective time region.
Such as, the predetermined application scenarios being associated with application A PP1 unblock interface is computer, and predetermined effective time region is 3 minutes, and is predefined in 3 minutes and occurs the unblock unmatched frequency threshold value of operation demonstration to be 2 for application A PP1, when the activation trigger action of the user APP1 to being in the lock state being detected, the unblock interface showing APP1 on the screen of terminal unit is computer inputting interface, receive user and include click character " 5 " in " 2015-12-1613:14:00 " moment by what computer inputting interface sequentially input, "+" and "+" solution latching operation, judge to include clicking character " 5 ", "+" and "+" solve latching operation do not mate with the unblock verification operation of APP1, that then records user's input solves latching operation and the time " 2015-12-1613:14:00 " solving latching operation that the unmatched number of times of verification operation is 1 and user's input error, user continues through the input of computer inputting interface and includes clicking character " 5 ", " 6 " and "=" solution latching operation, can determine whether that the latching operation that solves of user's this time input does not mate with the unblock verification operation of APP1, user's this time unblock operating time " 2015-12-1613:15:00 " of input and the time difference of " 2015-12-1613:14:00 " time can be obtained less than 3 minutes, update the solution latching operation of user's input within the effective time region be " 2015-12-1613:14:00 " with starting point 3 minutes and the unmatched number of times of verification operation subsequently for 2, and the time " 2015-12-1613:15:00 " of record user this time input error solution latching operation, according to user from starting point for the effective time region of " 2015-12-1613:14:00 " for application A PP1 occur unlock the unmatched number of times of operation demonstration reach pre-determined number threshold value 2, can determine whether that the user application programs APP1 solution latching operation in " 2015-12-1613:15:00 " moment is illegal solution latching operation.
When judging that solving latching operation is illegal solution latching operation, acquisition module 530 starts the shoot function of terminal unit and performs shooting operation, to obtain the image information of user.
Such as, when the solution latching operation judging user is illegal solution latching operation, starts the camera application of terminal unit and perform shooting operation, to obtain the image information of user.
In a preferred embodiment, acquisition module 530 includes shooting unit (not shown). Shoot the preposition shoot function of unit starting terminal unit and perform shooting operation.
Such as, when judging that user application programs APP1 is when the solution latching operation in " 2015-12-1613:15:00 " moment is illegal solution latching operation, start the shoot function of the front-facing camera of terminal unit and perform shooting operation, to obtain the image information of user.
In a preferred embodiment, this device also includes determining module (not shown) and display module (not shown). When judging that solving latching operation is legal solution latching operation, it is determined that module determines that the front of legal solution latching operation once unlocks whether operation is illegal solution latching operation; If the front of legal solution latching operation once unlocks operation for illegal solution latching operation, display module generates and shows the information for notifying illegal solution latching operation.
Such as, when user includes clicking the solution latching operation of character " 5 ", "+" and "=" subsequently by unlocking interface input, can determine whether the solution latching operation of user's this time input verification operation coupling corresponding with APP1, can determine whether that this solution latching operation of user is legal solution latching operation, the program opening APP1 enters the page, operating time according to user's this time legal solution latching operation is " 2015-12-1613:16:00 ", can determine that user once unlocks operation at the front of " 2015-12-1613:16:00 " moment legal solution latching operation, namely user's solution latching operation in " 2015-12-1613:15:00 " moment is illegal solution latching operation, subsequently, generate the information for notifying the illegal solution latching operation in " 2015-12-1613:15:00 " moment, and be shown in the program displays interface of APP1, information such as " 2015-12-1613:15:00, disabled user is likely to peep your application A PP1, please check picture ".
In a concrete application scenarios, in terminal unit, the function setting interface that user is provided by terminal unit, open and pre-set the function of " the capturing intruder " of application program " wechat ", as shown in Figure 3, when user being detected to the activation trigger action of " wechat " that be in the lock state, the screen of terminal unit is shown the unblock interface of " wechat ", receive the solution latching operation that user inputted in " 2015-12-1615:40:00 " moment subsequently, the solution latching operation that inputs in " 2015-12-1615:40:00 " moment according to the user checking solution latching operation predetermined with " wechat " mates, can determine that user's solution latching operation in " 2015-12-1615:40:00 " moment is legal solution latching operation, if user is illegal solution latching operation at front operation such as the user's solution latching operation in " 2015-12-1615:35:00 " moment that once unlocks of the legal solution latching operation in " 2015-12-1615:40:00 " moment, subsequently, generate and show the information such as " 2015-12-1615:35:00 for notifying the illegal solution latching operation in " 2015-12-1615:35:00 " moment, disabled user is likely to peep your wechat ", after user clicks this information, the function of " the capturing intruder " of " wechat " can be shown with the image information after the compression of the disabled user captured to user with the list mode that the time is order, as shown in Figure 4, when user clicks any image information, the original image information of disabled user corresponding to this image information can be checked.
Those skilled in the art of the present technique are appreciated that the present invention includes the one or more equipment relating to perform in operation described herein. these equipment can specialized designs and manufacture for required purpose, or the known device in general purpose computer can also be included. these equipment have storage computer program within it, and these computer programs optionally activate or reconstruct. such computer program can be stored in equipment (such as, computer) in computer-readable recording medium or be stored in and be suitable to storage e-command and be coupled to any kind of medium of bus respectively, described computer-readable medium includes but not limited to that any kind of dish (includes floppy disk, hard disk, CD, CD-ROM, and magneto-optic disk), ROM (Read-OnlyMemory, read only memory), RAM (RandomAccessMemory, memorizer immediately), EPROM (ErasableProgrammableRead-OnlyMemory, Erarable Programmable Read only Memory), EEPROM (ElectricallyErasableProgrammableRead-OnlyMemory, EEPROM), flash memory, magnetic card or light card. it is, computer-readable recording medium include by equipment (such as, computer) with can read form storage or transmission information any medium.
Those skilled in the art of the present technique are appreciated that, it is possible to the calculation machine programmed instruction combination to the frame in each frame realizing in these structure charts and/or block diagram and/or flow graph and these structure charts and/or block diagram and/or flow graph of using tricks. Those skilled in the art of the present technique are appreciated that, the processor that these computer program instructions can be supplied to general purpose computer, special purpose computer or other programmable data processing methods realizes, and performs the scheme specified in the frame of structure chart disclosed by the invention and/or block diagram and/or flow graph or multiple frame thereby through the processor of computer or other programmable data processing methods.
Those skilled in the art of the present technique are appreciated that the step in the various operations discussed in the present invention, method, flow process, measure, scheme can be replaced, change, combine or delete. Further, have the various operations discussed in the present invention, method, other steps in flow process, measure, scheme can also be replaced, changed, reset, decomposed, combined or deleted. Further, of the prior art have with the present invention disclosed in various operations, method, the step in flow process, measure, scheme can also be replaced, changed, reset, decomposed, combined or deleted.
The above is only the some embodiments of the present invention; it should be pointed out that, for those skilled in the art, under the premise without departing from the principles of the invention; can also making some improvements and modifications, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (10)

1. the method for the image information of the user obtaining unauthorized access application program, it is characterised in that including:
Receive the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit;
Judge whether described solution latching operation is illegal solution latching operation;
When judging that described solution latching operation is illegal solution latching operation, start the shoot function of described terminal unit and perform shooting operation, to obtain the image information of described user.
2. the method for the image information of the user of acquisition unauthorized access application program according to claim 1, wherein, receives the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit, including:
Receive the solution latching operation unlocking interface input of the user's arbitrary application program by being in the lock state in terminal unit.
3. the method for the image information of the user of acquisition unauthorized access according to claim 2, described solution latching operation realizes especially by following any one:
Numeral combination;
Numeral and monogram;
Numeral and letter, symbol combination;
Gesture password;
Fingerprint recognition.
4. the method for the image information of the user of acquisition unauthorized access application program according to claim 2, receives the solution latching operation unlocking interface input of the user's arbitrary application program by being in the lock state in terminal unit, specifically includes:
The screen of described terminal unit is shown the unblock interface being associated with predetermined application scenarios of the arbitrary application program being in the lock state;
Receive the solution latching operation that described user is matched with described predetermined application scenarios by the input of described unblock interface.
5. the method for the image information of the user obtaining unauthorized access application program according to any one of claim 1-4, it is judged that whether described solution latching operation is illegal solution latching operation, specifically includes:
Judge whether described solution latching operation mates with corresponding verification operation;
If judging, described solution latching operation does not mate with described verification operation, it is determined that occur to unlock the unmatched number of times of operation demonstration for described application program in effective time region;
When occurring the unblock unmatched number of times of operation demonstration to reach pre-determined number threshold value for described application program in effective time region, it is judged that the solution latching operation of described application program is illegal solution latching operation by described user.
6. the device of the image information of the user obtaining unauthorized access application program, it is characterised in that including:
Receiver module, for receiving the solution latching operation of the user's arbitrary application program to being in the lock state in terminal unit;
Judge module, is used for judging whether described solution latching operation is illegal solution latching operation;
Acquisition module, for when judging that described solution latching operation is illegal solution latching operation, starting the shoot function of described terminal unit and perform shooting operation, to obtain the image information of described user.
7. the device of the image information of the user of acquisition unauthorized access application program according to claim 6, described receiver module includes:
Receive unit, for receiving the solution latching operation unlocking interface input of the user's arbitrary application program by being in the lock state in terminal unit.
8. the device of the image information of the user of acquisition unauthorized access according to claim 6, described solution latching operation realizes especially by following any one:
Numeral combination;
Numeral and monogram;
Numeral and letter, symbol combination;
Gesture password;
Fingerprint recognition.
9. the device of the image information of the user of acquisition unauthorized access application program according to claim 6, described reception unit specifically includes:
Show subelement, for showing the unblock interface being associated with predetermined application scenarios of the arbitrary application program being in the lock state on the screen of described terminal unit;
Receive subelement, for receiving the solution latching operation that described user is matched with described predetermined application scenarios by the input of described unblock interface.
10. a terminal unit, including the device of the image information of the user obtaining unauthorized access application program described in claim 6-9.
CN201510958959.0A 2015-12-18 2015-12-18 Method and device for obtaining image information of users illegally accessing to application programs Pending CN105631250A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510958959.0A CN105631250A (en) 2015-12-18 2015-12-18 Method and device for obtaining image information of users illegally accessing to application programs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510958959.0A CN105631250A (en) 2015-12-18 2015-12-18 Method and device for obtaining image information of users illegally accessing to application programs

Publications (1)

Publication Number Publication Date
CN105631250A true CN105631250A (en) 2016-06-01

Family

ID=56046178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510958959.0A Pending CN105631250A (en) 2015-12-18 2015-12-18 Method and device for obtaining image information of users illegally accessing to application programs

Country Status (1)

Country Link
CN (1) CN105631250A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019071810A1 (en) * 2017-10-11 2019-04-18 广州视源电子科技股份有限公司 Device unlocking control method, apparatus, device and storage medium
CN112419627A (en) * 2020-11-20 2021-02-26 深圳市捷诚技术服务有限公司 POS machine PIN input protection method and device, storage medium and POS machine

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119468A1 (en) * 2007-11-07 2009-05-07 Qualcomm Incorporated Systems, methods, and apparatuses for erasing memory on wireless devices
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN103728894A (en) * 2014-01-22 2014-04-16 广东欧珀移动通信有限公司 Remote control method and system of terminal device
CN104268453A (en) * 2014-09-24 2015-01-07 可牛网络技术(北京)有限公司 Method and device for application program safety management for terminal equipment, and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119468A1 (en) * 2007-11-07 2009-05-07 Qualcomm Incorporated Systems, methods, and apparatuses for erasing memory on wireless devices
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN103728894A (en) * 2014-01-22 2014-04-16 广东欧珀移动通信有限公司 Remote control method and system of terminal device
CN104268453A (en) * 2014-09-24 2015-01-07 可牛网络技术(北京)有限公司 Method and device for application program safety management for terminal equipment, and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019071810A1 (en) * 2017-10-11 2019-04-18 广州视源电子科技股份有限公司 Device unlocking control method, apparatus, device and storage medium
CN112419627A (en) * 2020-11-20 2021-02-26 深圳市捷诚技术服务有限公司 POS machine PIN input protection method and device, storage medium and POS machine

Similar Documents

Publication Publication Date Title
US9626815B2 (en) Method for unlocking electronic device, and apparatus therefor
US9384369B2 (en) Information processing method and electronic device
CN105760736B (en) The method and tripper of application program unlock
CN107026836B (en) Service implementation method and device
CN108171137B (en) Face recognition method and system
US20050229240A1 (en) Information processing apparatus, authentication processing program, and authentication storage apparatus
CN103761502A (en) Safety certification device and method
CN107145772B (en) Terminal equipment security control method and device and terminal equipment
KR101451639B1 (en) Identification and theft prevention system using one times random key, and method thereof
CN107977568B (en) MCU safety protection identity authentication device and method
CN105184133A (en) Authentication method and apparatus, and corresponding mobile terminal
CN110399708A (en) A kind of dual-identity authentication method, apparatus and electronic equipment
CN105138881A (en) Screen locking method and device
CN105631250A (en) Method and device for obtaining image information of users illegally accessing to application programs
JP2006209642A (en) Personal authentication device and method
US8151111B2 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
CN111222172A (en) Electronic signature method and system for mobile terminal based on face real-name authentication protection
CN107862192B (en) Login interface unlocking method and device, computer equipment and storage medium
CN107507308B (en) Information matching method and device and intelligent door lock
CN105809045A (en) Method and device for processing equipment systems during data reset
CN105530230A (en) Fingerprint authentication method, device and server
CN113536260A (en) Method and device for improving identity authentication security level based on biological characteristics
CN108563934B (en) Fingerprint unlocking method and device
CN110517393A (en) A kind of method for unlocking, device, equipment and the medium of ATM safety door

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160601