Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application program accessing method and device

An application and user technology, applied in the field of information security, can solve problems such as malicious acquisition of user information, and achieve the effect of preventing malicious access to applications and ensuring security.

Active Publication Date: 2013-10-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, applications (such as browsers, readers, or game programs, etc.) that do not provide a password authentication process themselves can be opened at will, so that user information in such applications may be obtained maliciously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program accessing method and device
  • Application program accessing method and device
  • Application program accessing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] see figure 1 , a method of accessing an application that includes:

[0049] Step 101: Monitor the application programs installed on the user equipment;

[0050] Step 102: When it is monitored that the user requests to access the application program, determine whether the requested application program is encrypted;

[0051] Step 103: When the requested application is encrypted, request the user to input verification information, and verify whether the verification information is correct;

[0052] Step 104: When the verification information is correct, run the requested application program and present the running result;

[0053] Step 105: When the verification information is incorrect, perform a protection operation on the application program requested for access.

[0054] The beneficial effect brought by the technical solution provided by the embodiment of the present invention is: when the user requests to access the application program, verify the verification info...

Embodiment 2

[0056] see figure 2 , a method for accessing an application program, the execution subject of the method is a user device, further, the method may be implemented by a client application program (such as a program lock) installed on the user device, wherein the user device may include But not limited to mobile phones, tablet computers or PDA (Personal Digital Assistant, personal digital assistant) and other devices, specifically include the following:

[0057] Step 201: Determine the corresponding relationship between the application program and the encryption level, and save the corresponding relationship, wherein the encryption level is used to indicate whether the application program is encrypted, which may specifically include: unencrypted, encrypted, hidden, or encrypted and hidden;

[0058]When this step is specifically implemented, it may include:

[0059] Receive a request from the user to access the program lock, wherein the program lock is used to manage the applica...

Embodiment 3

[0093] see image 3 , an apparatus for accessing an application program, comprising: a monitoring module 301, a first determination module 302, a verification module 303, a first execution module 304, and a second execution module 305;

[0094] A monitoring module 301, configured to monitor the application programs installed on the user equipment;

[0095] The first determination module 302 is configured to determine whether the requested application program is encrypted when monitoring the user's request for access to the application program;

[0096] A verification module 303, configured to request the user to input verification information when the requested application program is encrypted, and verify whether the verification information is correct;

[0097] The first executing module 304 is configured to run the requested application program and present the running result when the verification information is correct;

[0098] The second execution module 305 is configure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a method and an apparatus for accessing an application, which relate to the technical field of information security. The method comprises: monitoring an application installed on a user equipment; when it is detected that a user requests to access an application, determining whether the application whose access is requested is encrypted; when the application whose access is requested is encrypted, requesting the user to input authentication information, and authenticating whether the authentication information is correct; when the authentication information is correct, running the application whose access is requested, and presenting a running result; and when the authentication information is incorrect, executing a protection operation for the application whose access is requested. In this way, a malicious access to the application by someone can be effectively prevented, thereby effectively ensuring the security of user information in the application.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for accessing application programs. Background technique [0002] User devices such as mobile phones, tablet computers, or PDAs (Personal Digital Assistants) are tools frequently used by modern people for information exchange or note-taking. play an increasingly important role. [0003] Usually, the personal information recorded and stored by the user device usually needs to be presented by pre-installed applications. For example, the user's web browsing records need to be displayed by running the installed browser client, and the user's book reading records need to be run The installed browser client is used to display information such as the user's game level or equipment, which needs to be displayed by running the corresponding game program client, and so on. [0004] In the prior art, applications that do not provide a password authenticatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/50
CPCG06F17/30G06F21/629G06F21/31G06F16/23G06F16/1794G06F16/00G06F21/50
Inventor 王庆罗章虎黄泽丰郭浩然肖权浩袁宜霞宋家顺李朋涛戴云峰詹勋昌林春优
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products