CN104866752B - A kind of application guard method and user terminal - Google Patents

A kind of application guard method and user terminal Download PDF

Info

Publication number
CN104866752B
CN104866752B CN201510239540.XA CN201510239540A CN104866752B CN 104866752 B CN104866752 B CN 104866752B CN 201510239540 A CN201510239540 A CN 201510239540A CN 104866752 B CN104866752 B CN 104866752B
Authority
CN
China
Prior art keywords
information
application
privacy
verified
prompt message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510239540.XA
Other languages
Chinese (zh)
Other versions
CN104866752A (en
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510239540.XA priority Critical patent/CN104866752B/en
Publication of CN104866752A publication Critical patent/CN104866752A/en
Application granted granted Critical
Publication of CN104866752B publication Critical patent/CN104866752B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of application guard method and user terminals, wherein this method includes:Operating instruction of the detection for intended application;The operating instruction is responded, judges that the intended application whether there is associated privacy application;If in the presence of the first prompt message is exported, first prompt message is for prompting user to carry out authentication;The information to be verified for responding the first prompt message input is received, and the information to be verified is verified;When the information to be verified is consistent with the first default verification information, the privacy application is run.Using the embodiment of the present invention, the safety of application can be improved, effectively ensures the application privacy of user.

Description

A kind of application guard method and user terminal
Technical field
The present invention relates to Internet technical field more particularly to a kind of application guard method and user terminals.
Background technology
Currently, mobile phone has been increasingly becoming an indispensable part during everyone lives, and that is installed inside mobile phone answers With also more and more.And mobile phone is borrowed by the people of surrounding or the case where oneself show oneself handset content to other people it is again very much, This is just inevitably seen the application privacy oneself being not desired to as known to other people by other people, although having had various application locks at present Application is encrypted, ensureing, which only oneself could enter application, checks relevant information, but if the strong curiosity of layman The heart requires in the case of opening, and still can cause how-do-you-do.
Invention content
The embodiment of the invention discloses a kind of application guard method and user terminals, can improve the safety of application, have Effect ground ensures the application privacy of user.
First aspect of the embodiment of the present invention disclose it is a kind of apply guard method, including:
Operating instruction of the detection for intended application;
The operating instruction is responded, judges that the intended application whether there is associated privacy application;
If in the presence of the first prompt message is exported, first prompt message is for prompting user to carry out authentication;
The information to be verified for responding the first prompt message input is received, and the information to be verified is verified;
When the information to be verified is consistent with the first default verification information, the privacy application is run.
Wherein, it is described the information to be verified is verified after, further include:
When the information to be verified is consistent with the second default verification information, the intended application is run.
Wherein, before the detection is for the operating instruction of intended application, further include:
Establish the incidence relation of the intended application and privacy application.
Wherein, the incidence relation of the intended application and privacy application is established, including:
Receive the association request for the intended application and privacy application;
The association request is responded, exports the second prompt message, second prompt message is for prompting user setting body Part verification information;
Receive the authentication information for responding the second prompt message input;
The authentication information is stored as the described first default verification information, and establish the intended application with it is described The incidence relation of privacy application.
Wherein, when the intended application there are multiple associated privacies in application,
The information to be verified is consistent with the first default verification information, including:
The information to be verified is with the multiple privacy using any one in corresponding multiple first default verification informations It is a consistent;Wherein, the multiple first default verification information is corresponded with the application of the multiple privacy;
The operation privacy application, including:
Operation privacy application corresponding with the first default verification information of the information to be verified unanimously.
Second aspect of the embodiment of the present invention discloses a kind of user terminal, including:
Detection module, for detecting the operating instruction for intended application;
Judgment module judges that the intended application whether there is associated privacy application for responding the operating instruction;
Output module exports the first prompt message, first prompt for working as in the presence of the judgment module is judged as Information is for prompting user to carry out authentication;
Receiving module, for receiving the information to be verified for responding the first prompt message input;
Authentication module, for being verified to the information to be verified;
Module is run, for when the information to be verified is consistent with the first default verification information, running the privacy and answering With.
Wherein, the operation module is additionally operable to when the information to be verified is consistent with the second default verification information, operation The intended application.
Wherein, the user terminal further includes:
Module is established, the incidence relation for establishing the intended application and privacy application.
Wherein, the module of establishing includes:
Receiving unit, for receiving the association request for the intended application and privacy application;
Output unit exports the second prompt message, second prompt message is for carrying for responding the association request Show user setting authentication information;
Receiving unit, for receiving the authentication information for responding the second prompt message input;
Storage unit, for the authentication information to be stored as the described first default verification information;
Unit is established, the incidence relation for establishing the intended application and privacy application.
Wherein, when the intended application there are multiple associated privacies in application,
The operation module is specifically used for applying corresponding multiple first with the multiple privacy when the information to be verified In default verification information any one it is consistent when, operation is corresponding with the first default verification information of the information to be verified unanimously Privacy application;Wherein, the multiple first default verification information is corresponded with the application of the multiple privacy.
Implement the embodiment of the present invention, has the advantages that:
By detection for the operating instruction of intended application, and the operating instruction is responded, judges that intended application whether there is Associated privacy application, and if it exists, the first prompt message of output, to prompt user to carry out authentication, when receiving response the When the information to be verified of one prompt message input, which is verified, and when the information to be verified is pre- with first If verification information is consistent, the privacy application is run, since the privacy installed in user terminal is applied in not running to user It is invisible, the intended application by running the privacy association is needed, and after authentication passes through, the privacy could be run and answered With, thus the safety of application can be improved, effectively ensure the application privacy of user.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of flow diagram using guard method provided in an embodiment of the present invention;
Fig. 2 is another flow diagram for applying guard method provided in an embodiment of the present invention;
Fig. 3 is another flow diagram for applying guard method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another terminal provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of another terminal provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of another terminal provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that the described embodiments are merely a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of application guard method and user terminals, can improve the safety of application, have Effect ground ensures the application privacy of user.It is described in detail separately below.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram using guard method disclosed by the embodiments of the present invention.Such as Fig. 1 institutes Show, this may comprise steps of using guard method:
S101, detection are directed to the operating instruction of intended application.
In the embodiment of the present invention, the above method can be applied to including but not limited to mobile phone, tablet computer, palm PC etc. User terminal.
In the embodiment of the present invention, intended application may include having been installed in user terminal and having applied journey to user is visible Sequence can include but is not limited to QQ, wechat, PPS etc.;User is can include but is not limited to for the operating instruction of intended application Double-click the operation option etc. in the shortcut icon of intended application or the right-click menu of user's selection target application.
S102, the operating instruction is responded, judges that the intended application whether there is associated privacy application.If so, going to step Rapid S103;Otherwise, step S106 is gone to.
It, can be by mounted portion in user terminal in order to protect the application privacy of terminal user in the embodiment of the present invention Divide specific application as the accole application of user's specified application (i.e. privacy application) to be protected, wherein in user terminal The privacy of installation is applied in not running, invisible to user;User can be closed to access with it by accessing accole application The privacy application of connection.
Correspondingly, in embodiments of the present invention, it when user terminal receives the operating instruction for intended application, such as uses Family terminal detects that shortcut icon of the user by double click intended application, user terminal may determine that the intended application With the presence or absence of associated privacy application;If intended application thens follow the steps S103 there are associated privacy application;Otherwise, it executes Step S106.
S103, the first prompt message of output, first prompt message is for prompting user to carry out authentication.
In the embodiment of the present invention, the verification by the privacy application associated with it of accole application access can be pre-set Information, when user wants through accole application access privacy associated with it in application, needing to input information progress to be verified Authentication, and after authentication passes through, privacy application associated with it could be accessed.
Correspondingly, in embodiments of the present invention, when user terminal judges intended application, there are privacy applications associated with it When (i.e. the intended application belongs to accole application), user terminal can export prompt message (the first prompt message), with prompt User carries out authentication.
S104, the information to be verified for responding first prompt message input is received, and the information to be verified is verified.
In the embodiment of the present invention, when user terminal receives the information to be verified of the first prompt message of user response input When, pre-set verification information (the first verification information) can be obtained, and by first verification information to input by user Information to be verified is verified.
S105, when information to be verified is consistent with the first default verification information, run the privacy application.
It, can be with when user terminal determines that information to be verified is consistent with the first default verification information in the embodiment of the present invention Operation and the associated privacy application of the intended application.
In the embodiment of the present invention, which may include but be not limited to password to be verified, finger print information to be verified, waits for Verify in shape of face information, iris information to be verified, retinal information to be verified and voiceprint to be verified any one and Several combinations.
In the embodiment of the present invention, which may include but unlimited It is regarded in default verification password, default verification finger print information, default verification shape of face information, default verification iris information, default verification Any one in nethike embrane information and default verification voiceprint and several combinations.
Specifically, the first above-mentioned default verification information may include that fingerprint string information and each fingerprint are corresponding defeated The angle of incidence;So correspondingly, verify whether information to be verified is consistent with default verification information to may comprise steps of:
Verify whether fingerprint string is identical as the fingerprint string that default verification information includes, and the input time of identical fingerprints Whether difference is respectively less than preset value, if verification fingerprint string is identical as the fingerprint string that default verification information includes, and identical finger The difference of the input time of line is respectively less than preset value, then it is consistent with default verification information to verify information to be verified;Conversely, It verifies information to be verified and default verification information is inconsistent.
In the embodiment of the present invention, when information to be verified and inconsistent the first default verification information, user terminal can be transported Row intended application, alternatively, prompt user authentication information mistake, application operation failure.
S106, the intended application is run.
In the embodiment of the present invention, when user terminal detects the operating instruction for intended application, and judge that the target is answered In application, user terminal can respond the operating instruction, the intended application is run with there is no associated privacy.
As it can be seen that in the method flow described in Fig. 1, by the way that privacy is arranged using the incidence relation with intended application, and Corresponding verification information is set, when detecting the operating instruction for intended application, and determines intended application there are associated hidden Private is in application, can prompt user to carry out authentication, and after authentication passes through, run the associated privacy of the intended application Using since the privacy installed in user terminal is applied invisible to user in not running, needing to answer by running the privacy With associated intended application, and after authentication passes through, the privacy application could be run, thus the safety of application can be improved Property, effectively ensure the application privacy of user.
Referring to Fig. 2, Fig. 2 is another flow diagram for applying guard method disclosed by the embodiments of the present invention.Such as Fig. 2 Shown, this may comprise steps of using guard method:
S201, detection are directed to the operating instruction of intended application.
In the embodiment of the present invention, the above method can be applied to including but not limited to mobile phone, tablet computer, palm PC etc. User terminal.
In the embodiment of the present invention, intended application may include having been installed in user terminal and having applied journey to user is visible Sequence can include but is not limited to QQ, wechat, PPS etc.;User is can include but is not limited to for the operating instruction of intended application Double-click the operation option etc. in the shortcut icon of intended application or the right-click menu of user's selection target application.
S202, the operating instruction is responded, judges that the intended application whether there is associated privacy application.If so, going to step Rapid S203;Otherwise, step S207 is gone to.
It, can be by mounted portion in user terminal in order to protect the application privacy of terminal user in the embodiment of the present invention Divide specific application as the accole application of user's specified application (i.e. privacy application) to be protected, wherein in user terminal The privacy of installation is applied in not running, invisible to user;User can be closed to access with it by accessing accole application The privacy application of connection.
Correspondingly, in embodiments of the present invention, it when user terminal receives the operating instruction for intended application, such as uses Family terminal detects that shortcut icon of the user by double click intended application, user terminal may determine that the intended application With the presence or absence of associated privacy application;If intended application thens follow the steps S203 there are associated privacy application;Otherwise, it executes Step S207.
S203, the first prompt message of output, first prompt message is for prompting user to carry out authentication.
In the embodiment of the present invention, the verification by the privacy application associated with it of accole application access can be pre-set Information (the first default verification information), when user wants through accole application access privacy associated with it in application, needing It inputs information to be verified and carries out authentication, and after authentication passes through, privacy application associated with it could be accessed.
In the embodiment of the present invention, for there are the accole application that associated privacy is applied, access can also be pre-set The verification information (the second default verification information) of accole application, when user desires access to the accole in application, being also required to It inputs information to be verified and carries out authentication, and after authentication passes through, the intended application could be accessed.
Correspondingly, in embodiments of the present invention, when user terminal judges intended application, there are privacy applications associated with it When (i.e. the intended application belongs to accole application), user terminal can export prompt message (the first prompt message), with prompt User carries out authentication.
S204, the information to be verified for responding first prompt message input is received, and the information to be verified is verified.
In the embodiment of the present invention, when user terminal receives the information to be verified of the first prompt message of user response input When, pre-set verification information can be obtained, and verified to information to be verified input by user by the verification information.
In the embodiment of the present invention, when information to be verified is consistent with the first default verification information, step S205 is executed;When waiting for When verification information is consistent with the second default verification information, step S206 is executed.
S205, when information to be verified is consistent with the first default verification information, run the privacy application.
It, can be with when user terminal determines that information to be verified is consistent with the first default verification information in the embodiment of the present invention Operation and the associated privacy application of the intended application.
S206, when information to be verified is consistent with the second default verification information, run the intended application.
It, can be with when user terminal determines that information to be verified is consistent with the second default verification information in the embodiment of the present invention Run the intended application.
Wherein, in above-mentioned steps S205 and step S206, user terminal determines information to be verified and the first default verification The whether consistent specific implementation of information (or second default verification information) may refer to the associated description in above-mentioned steps S105, this Details are not described herein for inventive embodiments.
In the embodiment of the present invention, when user terminal determines that information to be verified and the first default verification information and second are pre- If verification information is inconsistent, user terminal can prompt user authentication information mistake, application operation failure.
S207, the intended application is run
In the embodiment of the present invention, when user terminal detects the operating instruction for intended application, and judge that the target is answered In application, user terminal can respond the operating instruction, the intended application is run with there is no associated privacy.
As it can be seen that in the method flow described in Fig. 2, for there are the accole applications that associated privacy is applied, respectively Pre-set the verification information (the first default verification information) by the associated privacy application of the accole application access, Yi Jifang The verification information (the second default verification information) for asking accole application, when detecting the operating instruction for intended application, and The intended application is determined there are associated privacy in application, user can be prompted to carry out authentication, and to be tested when receiving Demonstrate,prove information it is consistent with the first default verification information when, run the associated privacy application of the intended application, it is to be verified when what is received When information is consistent with the second default verification information, the intended application is run, on the one hand, avoid the random access target of disabled user Using or the associated privacy application of intended application;On the other hand, it is strongly required to inform password in specific user (such as relatives and friends) In the case of, it can be by inputting the to be verified information consistent with the second default verification information, control terminal runs the target and answers With further improving the safety of application, effectively ensured the application privacy of user.
Referring to Fig. 3, Fig. 3 is a kind of flow diagram using guard method disclosed by the embodiments of the present invention.Such as Fig. 3 institutes Show, this may comprise steps of using guard method:
S301, the incidence relation for establishing intended application and privacy application.
In the embodiment of the present invention, the above method can be applied to including but not limited to mobile phone, tablet computer, palm PC etc. User terminal.
It, can be by mounted portion in user terminal in order to protect the application privacy of terminal user in the embodiment of the present invention Divide specific application as the accole application of user's specified application (i.e. privacy application) to be protected, wherein in user terminal The privacy of installation is applied in not running, invisible to user;User can be closed to access with it by accessing accole application The privacy application of connection.
In the embodiment of the present invention, intended application may include having been installed in user terminal and having applied journey to user is visible Sequence can include but is not limited to QQ, wechat, PPS etc..
In a kind of optional embodiment, the incidence relation of intended application and privacy application is established, may include following Step:
Step 11 receives the association request applied with privacy for intended application;
Step 12 responds the association request, exports the second prompt message, second prompt message, for prompting user to set Set authentication information;
Step 13 receives the authentication information for responding second prompt message input;
The authentication information is stored as the first default verification information by step 14, and is established intended application and answered with privacy Incidence relation.
In this embodiment, a specific function button, user can be set in the installation interface that privacy is applied The association request that intended application and privacy are applied can be established to user terminal requests by the function button, alternatively, can be Increase an option established with the incidence relation of intended application in the right-click menu of the privacy that installation is complete application, user can be with By selecting the option to establish the association request that intended application is applied with privacy to user terminal requests.
For example, with privacy apply be " footpath between fields footpath between fields ", intended application (accole application) be " QQ " for, when user is in hand In machine when installation application " footpath between fields footpath between fields ", can by the specific function button that is arranged in installation interface, such as " association " or " according to It is attached " etc., and select to be used as intended application using " QQ " (" QQ " is mounted application in mobile phone), it is sent to mobile phone and is directed to " footpath between fields The association request on footpath between fields " and " QQ ".
Again for example, it is applied as " broadcasting soon " with privacy, intended application is for " QQ ", user installs in the terminal " fast Broadcast " and " QQ " after, user can be by clicking the shortcut icon of application " broadcasting soon " by mouse right button, in right-click menu " association " or " depending on " option is selected, and intended application will be determined as using " QQ ", is sent to PC machine for " broadcasting soon " and " QQ " Association request.
In this embodiment, after user terminal receives the association request for intended application and privacy application, The association request can be responded, prompt message (the second prompt message), to prompt user setting authentication information, the body are exported Part verification information is user by access target application, to access the verification information with the associated privacy application of the intended application; When user terminal receives the authentication information of user response second prompt message input, which is deposited Storage is the first default verification information, and establishes the incidence relation of intended application and privacy application.Wherein, when establish intended application with Privacy application incidence relation after, user terminal can hide the privacy application, i.e. the privacy is applied in not running, to Family is invisible.
Further, as an alternative embodiment, in embodiments of the present invention, user terminal responds association request Second prompt message of output is in addition to that can prompt user setting for by access target application, to access and the intended application Except the verification information of associated privacy application, user setting can also be prompted for the verification information of access target application;When It, can be by the former (for being answered by access target when receiving the authentication information of the second prompt message of user response input With to access the verification information with the associated privacy application of the intended application) it is stored as the first default verification information, by the latter (verification information for access target application) is stored as the second default verification information, and establishes what intended application was applied in privacy Incidence relation.
S302, detection are directed to the operating instruction of intended application.
In the embodiment of the present invention, user's double-click intended application can include but is not limited to for the operating instruction of intended application Shortcut icon or the application of user's selection target right-click menu in operation option etc..
S303, the operating instruction is responded, judges that the intended application whether there is associated privacy application.If so, going to step Rapid S304;Otherwise, step S307 is gone to.
In the embodiment of the present invention, when user terminal receives the operating instruction for intended application, as user terminal is examined Shortcut icon of the user by double click intended application is measured, user terminal may determine that the intended application whether there is Associated privacy application;If intended application thens follow the steps S303 there are associated privacy application;Otherwise, step S307 is executed.
S304, the first prompt message of output, first prompt message is for prompting user to carry out authentication.
In the embodiment of the present invention, when user terminal judges intended application, there are privacies associated with it to apply (i.e. target Using belonging to accole application) when, user terminal can export prompt message (the first prompt message), to prompt user to carry out body Part verification.
S305, the information to be verified for responding first prompt message input is received, and the information to be verified is verified.
In the embodiment of the present invention, when user terminal receives the information to be verified of the first prompt message of user response input When, pre-set verification information can be obtained, and verified to information to be verified input by user by the verification information.
S306, when information to be verified is consistent with the first default verification information, run the privacy application.
It, can be with when user terminal determines that information to be verified is consistent with the first default verification information in the embodiment of the present invention Operation and the associated privacy application of the intended application.
Further, in embodiments of the present invention, if being also provided with the verification information (the applied for access target in advance Two default verification informations), then when user terminal determines that information to be verified is consistent with the second default verification information, this can be run Intended application.
In the embodiment of the present invention, when user terminal determines that information to be verified and the first default verification information and second are pre- If verification information is inconsistent, user terminal can prompt user authentication information mistake, application operation failure.
S307, the intended application is run.
In the embodiment of the present invention, when user terminal detects the operating instruction for intended application, and judge that the target is answered In application, user terminal can respond the operating instruction, the intended application is run with there is no associated privacy.
As an alternative embodiment, an intended application can be associated with multiple privacy applications, i.e. a target is answered The accole application that can be applied simultaneously as multiple privacies is used, in this case, the first default verification letter of user terminal storage When breath, the application for storing the first default verification information and privacy application corresponding with the first default verification information is needed to mark Know.
Correspondingly, in this embodiment, in above-mentioned steps S306 (or step S105 or step S205), information to be verified It is consistent with the first default verification information, may include:
Information to be verified is consistent using any one in corresponding multiple first default verification informations with multiple privacies;Its In, multiple first default verification information is corresponded with the application of multiple privacy.
In above-mentioned steps S306 (or step S105 or step S205), the privacy application is run, including:
Operation privacy application corresponding with the first default verification information of the information to be verified unanimously.
As an example it is assumed that the accole in user terminal using " QQ " while as application " footpath between fields footpath between fields " and " broadcasting soon " is answered With, and the pre-set verification information (the first default verification information) by " QQ " access " footpath between fields footpath between fields " is " 123456 ", is passed through The verification information (the first default verification information) of " QQ " access " broadcasting soon " is " 234567 ", then is directed to when user terminal detects When the operating instruction of " QQ ", user terminal may determine that " QQ " whether there is associated privacy application, since " QQ " has association Application " footpath between fields footpath between fields " and " broadcasting soon ", therefore, user terminal can export the first prompt message, to prompt user to input letter to be verified Breath;When receiving the information to be verified of user response first prompt message input, user terminal can be according to prestoring The first default verification information the information to be verified is verified, if the verification information is 123456, user terminal can be with " footpath between fields footpath between fields " is applied in operation, if the verification information is 234567, user terminal can run application " broadcasting soon ".
By above description as can be seen that in technical solution provided in an embodiment of the present invention, target is directed to by detection The operating instruction of application, and the operating instruction is responded, judge that intended application whether there is associated privacy application, and if it exists, defeated Go out the first prompt message, to prompt user to carry out authentication, when the letter to be verified for receiving response the first prompt message input When breath, which is verified, and when the information to be verified is consistent with the first default verification information, it is hidden to run this Private application is needed since the privacy installed in user terminal is applied invisible to user in not running by running the privacy The intended application of association, and after authentication passes through, the privacy application could be run, thus the safety of application can be improved Property, effectively ensure the application privacy of user.
The following is an embodiment of the apparatus of the present invention, and apparatus of the present invention embodiment belongs to same structure with the method for the present invention embodiment Think, for executing the method described in the method for the present invention embodiment.For convenience of description, apparatus of the present invention embodiment only show with The relevant part of apparatus of the present invention embodiment, particular technique details do not disclose, please refer to the description of the method for the present invention embodiment, It no longer repeats one by one herein.
Referring to Fig. 4, being a kind of structural schematic diagram of user terminal disclosed by the embodiments of the present invention.As shown in figure 4, the use Family terminal may include:
Detection module 401, for detecting the operating instruction for intended application;
Judgment module 402 judges that the intended application is answered with the presence or absence of associated privacy for responding the operating instruction With;
Output module 403 exports the first prompt message for working as in the presence of the judgment module 402 is judged as, and described the One prompt message is for prompting user to carry out authentication;
Receiving module 404, for receiving the information to be verified for responding the first prompt message input;
Authentication module 405, for being verified to the information to be verified;
Module 406 is run, for when the information to be verified is consistent with the first default verification information, running the privacy Using.
In an alternative embodiment, the operation module 406 can be also used for presetting with second when the information to be verified and test When card information is consistent, the intended application is run.
In an alternative embodiment, when the intended application there are multiple associated privacies in application,
The operation module 406 can be specifically used for when the information to be verified with the multiple privacy using corresponding In multiple first default verification informations any one it is consistent when, operation consistent with the information to be verified first, which is preset, to be verified The corresponding privacy application of information;Wherein, the multiple first default verification information is corresponded with the application of the multiple privacy.
Please refer to fig. 5, Fig. 5 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention.Wherein, User terminal shown in fig. 5 is that user terminal as shown in Figure 4 optimizes, and user terminal as shown in fig. 4 is compared, User terminal shown in fig. 5 can also include:
Module 407 is established, the incidence relation for establishing the intended application and privacy application.
It is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention also referring to Fig. 6, Fig. 6.Wherein, User terminal shown in fig. 6 is that user terminal as shown in Figure 5 optimizes, compared with user terminal shown in fig. 5, In user terminal shown in fig. 6, the module 407 of establishing may include:
Receiving unit 4071, for receiving the association request for the intended application and privacy application;
Output unit 4072 exports the second prompt message, second prompt message is used for responding the association request In prompt user setting authentication information;
Receiving unit 4073, for receiving the authentication information for responding the second prompt message input;
Storage unit 4074, for the authentication information to be stored as the described first default verification information;
Unit 4075 is established, the incidence relation for establishing the intended application and privacy application.
Referring to Fig. 7, Fig. 7 is the structural schematic diagram of another user terminal provided in the embodiment of the present invention.Such as Fig. 7 institutes Show, which includes:At least one processor, 701, such as CPU, user interface 703, memory 704 is at least one logical Believe bus 702.Wherein, communication bus 702 is for realizing the connection communication between these components.Wherein, user interface 703 can be with Including display screen (Display), optional user interface 703 can also include standard wireline interface and wireless interface.Memory 704 can be high-speed RAM memory, can also be non-labile memory (non-volatile memory), for example, at least One magnetic disk storage.Memory 704 optionally can also be at least one storage dress for being located remotely from aforementioned processor 701 It sets.Batch processing code is stored wherein in memory 704, and processor 701 calls the program code stored in memory 704, For performing the following operations:
Operating instruction of the detection for intended application;
The operating instruction is responded, judges that the intended application whether there is associated privacy application;
If in the presence of the first prompt message is exported, first prompt message is for prompting user to carry out authentication;
The information to be verified for responding the first prompt message input is received, and the information to be verified is verified;
When the information to be verified is consistent with the first default verification information, the privacy application is run.
In an alternative embodiment, processor 701 calls the program code stored in memory 704 to the information to be verified After being verified, following operation can also be performed:
When the information to be verified is consistent with the second default verification information, the intended application is run.
In an alternative embodiment, processor 701 calls the program code detection stored in memory 704 to be directed to intended application Operating instruction before, following operation can also be performed:
Establish the incidence relation of the intended application and privacy application.
In an alternative embodiment, processor 701 calls the program code stored in memory 704 detection to establish the target Using the incidence relation applied with the privacy, following operation can be specifically included:
Receive the association request for the intended application and privacy application;
The association request is responded, exports the second prompt message, second prompt message is for prompting user setting body Part verification information;
Receive the authentication information for responding the second prompt message input;
The authentication information is stored as the described first default verification information, and establish the intended application with it is described The incidence relation of privacy application.
In an alternative embodiment, when the intended application there are multiple associated privacies in application,
The information to be verified is consistent with the first default verification information, including:
The information to be verified is with the multiple privacy using any one in corresponding multiple first default verification informations It is a consistent;Wherein, the multiple first default verification information is corresponded with the application of the multiple privacy;
Processor 701 calls the program code that stores in memory 704 to run the privacy application, can specifically include with Lower operation:
Operation privacy application corresponding with the first default verification information of the information to be verified unanimously.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Must must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be It can be combined in any suitable manner in any one or more embodiments or example.In addition, without conflicting with each other, this field Technical staff can carry out the feature of different embodiments or examples described in this specification and different embodiments or examples In conjunction with and combination.
Those skilled in the art can be by different embodiments described in this specification and the feature of different embodiments It is combined.Module in all embodiments of the invention or unit can pass through universal integrated circuit, such as CPU (Central Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated Circuit, application-specific integrated circuit) it realizes.
Step in all embodiments of the invention method can be sequentially adjusted, merged and deleted according to actual needs; Module or unit in all embodiments of the invention device can be combined, divided and deleted according to actual needs.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, include according to involved function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (system of such as computer based system including processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicating, propagating or passing Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it His suitable method is handled electronically to obtain described program, is then stored in computer storage.
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, which includes the steps that one or a combination set of embodiment of the method when being executed.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also That each unit physically exists alone, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and when sold or used as an independent product, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the present invention System, those skilled in the art can be changed above-described embodiment, change, replace and become within the scope of the invention Type.
Above disclosed is only presently preferred embodiments of the present invention, cannot limit the right of the present invention with this certainly Range, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and according to right of the present invention Equivalent variations made by it is required that, still belong to the scope covered by the invention.

Claims (6)

1. a kind of applying guard method, which is characterized in that including:
Include the function button for initiating association request in the installation interface of privacy application, alternatively, in privacy application The right-click menu that installation is complete includes to initiate the option of association request;
By the function button or the option, the association request for intended application and privacy application is received;
The association request is responded, exports the second prompt message, second prompt message is for prompting user setting identity to test Demonstrate,prove information;
Receive the authentication information for responding the second prompt message input;The authentication information includes fingerprint string information And each fingerprint corresponding input time;
The authentication information is stored as the first default verification information, and establishes the intended application and the privacy application Incidence relation;
Operating instruction of the detection for intended application;
The operating instruction is responded, judges that the intended application whether there is associated privacy application;
If in the presence of the first prompt message is exported, first prompt message is for prompting user to carry out authentication;
The information to be verified for responding the first prompt message input is received, if the information to be verified is default with described first The fingerprint string that verification information includes is identical, and the difference of the input time of identical fingerprints is respectively less than preset value, it is determined that described Information to be verified is consistent with the described first default verification information;
When the information to be verified is consistent with the first default verification information, the privacy application is run.
2. according to the method described in claim 1, it is characterized in that, described receive responds waiting for for the first prompt message input After verification information, further include:
When the information to be verified is consistent with the second default verification information, the intended application is run.
3. according to the method described in claim 1, it is characterized in that, when there are multiple associated privacy applications for the intended application When,
The information to be verified is consistent with the described first default verification information, including:
The information to be verified and the multiple privacy using in corresponding multiple first default verification informations any one one It causes;Wherein, the multiple first default verification information is corresponded with the application of the multiple privacy;
The operation privacy application, including:
Operation privacy application corresponding with the first default verification information of the information to be verified unanimously.
4. a kind of user terminal, which is characterized in that including:
Receiving unit, for receiving the association request for intended application and privacy application by function button or option; The installation interface of privacy application includes the function button for initiating association request, alternatively, installing in privacy application At right-click menu include initiate association request option;
Output unit exports the second prompt message, second prompt message is used for prompting for responding the association request Authentication information is arranged in family;
The receiving unit is additionally operable to receive the authentication information for responding the second prompt message input;The identity is tested It includes fingerprint string information and each fingerprint corresponding input time to demonstrate,prove information;
Storage unit, for the authentication information to be stored as the first default verification information;
Unit is established, the incidence relation for establishing the intended application and privacy application;
Detection module, for detecting the operating instruction for intended application;
Judgment module judges that the intended application whether there is associated privacy application for responding the operating instruction;
Output module exports the first prompt message, first prompt message for working as in the presence of the judgment module is judged as For prompting user to carry out authentication;
Receiving module, for receiving the information to be verified for responding the first prompt message input;
Authentication module, if it is identical as the fingerprint string that the described first default verification information includes for the information to be verified, and And the difference of the input time of identical fingerprints is respectively less than preset value, it is determined that the information to be verified and the described first default verification Information is consistent;
Module is run, for when the information to be verified is consistent with the first default verification information, running the privacy application.
5. user terminal according to claim 4, which is characterized in that
The operation module is additionally operable to, when the information to be verified is consistent with the second default verification information, run the target Using.
6. user terminal according to claim 4, which is characterized in that when there are multiple associated privacies for the intended application In application,
The operation module is specifically used for when the information to be verified is default using corresponding multiple first with the multiple privacy In verification information any one it is consistent when, operation with the information to be verified unanimously the first default verification information it is corresponding hidden Private application;Wherein, the multiple first default verification information is corresponded with the application of the multiple privacy.
CN201510239540.XA 2015-05-12 2015-05-12 A kind of application guard method and user terminal Active CN104866752B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510239540.XA CN104866752B (en) 2015-05-12 2015-05-12 A kind of application guard method and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510239540.XA CN104866752B (en) 2015-05-12 2015-05-12 A kind of application guard method and user terminal

Publications (2)

Publication Number Publication Date
CN104866752A CN104866752A (en) 2015-08-26
CN104866752B true CN104866752B (en) 2018-09-04

Family

ID=53912575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510239540.XA Active CN104866752B (en) 2015-05-12 2015-05-12 A kind of application guard method and user terminal

Country Status (1)

Country Link
CN (1) CN104866752B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10908776B2 (en) 2015-09-29 2021-02-02 Huawei Technologies Co., Ltd. Human-computer interaction method of user terminal, apparatus, and user terminal
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
CN108460259B (en) * 2016-12-13 2022-12-02 中兴通讯股份有限公司 Information processing method and device and terminal
CN107480493B (en) * 2017-07-19 2020-05-05 Oppo广东移动通信有限公司 Information processing method and related product
CN107480491A (en) * 2017-07-19 2017-12-15 广东欧珀移动通信有限公司 Information processing method and related product
CN107451448A (en) * 2017-07-21 2017-12-08 广东欧珀移动通信有限公司 The application process and Related product of more bio-identification orders in terminal
CN107818783A (en) * 2017-09-12 2018-03-20 普强信息技术(北京)有限公司 A kind of mutual method and device of man-machine multi-modal on-vehicle safety sexual intercourse based on vocal print technology
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system
CN110750408B (en) * 2019-09-30 2021-03-26 湖南新云网科技有限公司 Method, device and apparatus for controlling USB debug mode switch, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8806190B1 (en) * 2010-04-19 2014-08-12 Amaani Munshi Method of transmission of encrypted documents from an email application
US8875163B2 (en) * 2012-05-01 2014-10-28 Qualcomm Innovation Center, Inc. Privacy application and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application

Also Published As

Publication number Publication date
CN104866752A (en) 2015-08-26

Similar Documents

Publication Publication Date Title
CN104866752B (en) A kind of application guard method and user terminal
CN108171025B (en) Method for realizing multi-user login mode, terminal and computer readable storage medium
CN107622203A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
CN105760737A (en) Control method for applications and terminal
CN106127009B (en) A kind of display methods and terminal of icon
WO2016177000A1 (en) Method for entering operating system desktop and mobile intelligent terminal
CN108460259B (en) Information processing method and device and terminal
CN108737638B (en) Application control method and device, mobile terminal and computer readable medium
CN106484231A (en) A kind of method and device of application hides
CN105701420B (en) A kind of management method and terminal of user data
WO2018107396A1 (en) Fingerprint recognition method and terminal device
CN107422976A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN107422860A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN105912896A (en) Application switching method and terminal
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN106203174A (en) Application information processing method and device and electronic equipment
CN110263515B (en) Opening method of encrypted application and terminal equipment
CN105005436A (en) Program processing method and mobile terminal
CN106203036A (en) The operation copy hidden method opened based on application and device more
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN106778344B (en) A kind of data permission control method and terminal
US20200285745A1 (en) Enhancing security of a touch screen device
CN106548347A (en) A kind of processing meanss of financial payment, method and terminal
CN106933666B (en) Method for calling information input program and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.