CN105574366A - Application data protection method and apparatus and terminal - Google Patents

Application data protection method and apparatus and terminal Download PDF

Info

Publication number
CN105574366A
CN105574366A CN201510282931.XA CN201510282931A CN105574366A CN 105574366 A CN105574366 A CN 105574366A CN 201510282931 A CN201510282931 A CN 201510282931A CN 105574366 A CN105574366 A CN 105574366A
Authority
CN
China
Prior art keywords
data
application program
preset
application
match
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510282931.XA
Other languages
Chinese (zh)
Inventor
李兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510282931.XA priority Critical patent/CN105574366A/en
Publication of CN105574366A publication Critical patent/CN105574366A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

Embodiments of the invention disclose an application data protection method and apparatus and a terminal. The data protection method comprises the steps of when an access request for a target application is detected, receiving a decryption key for access; matching the decryption key with an encryption key preset in a target application; if the matching fails, hiding privacy data in the target application; and outputting an access interface of the target application that does not contain the privacy data. According to the application data protection method and apparatus and the terminal, the privacy data of the application is protected, the privacy data is prevented from being leaked, and the information security is improved.

Description

A kind of data guard method of application program, device and terminal
Technical field
The present invention relates to communication technical field, particularly relate to a kind of data guard method of application program, device and terminal.
Background technology
Nowadays along with the development of intelligent terminal, also get more and more using the data produced in the process of the various application programs on intelligent terminal, the safety of data and privacy also become more and more important, and such as user does not wish to be known the data messages such as note, message registration, photo and chat record by other people usually.In prior art, often through the safety adopting screen locking password to ensure data.But, sometimes need between relatives and friends to open screen locking password, or after lost mobile phone, screen locking password is cracked, the data message now on intelligent terminal has just been exposed under risk, easily cause the leakage of personal data, bring extreme influence to work and life.
Summary of the invention
The embodiment of the present invention provides a kind of data guard method of application program, device and terminal, can data message better in protection application program.
First aspect present invention provides the method for a kind of application data protection, comprising:
When the request of access to destination application being detected, receive the decruption key for accessing;
Encryption key preset with described destination application for described decruption key is mated;
If it fails to match, hide the private data in described destination application;
Export the access interface not comprising the described destination application of private data.
Wherein, if the match is successful, output packet is containing the access interface of the described destination application of private data.
Wherein, described decruption key is the icon of described destination application moves generation target motion track along terminal screen; Described preset encryption key is preset motion track.
Wherein, described encryption key preset with described destination application for described decruption key to be mated, comprising: the similarity calculating described target motion track and described preset motion track; If described similarity reaches pre-set threshold value, then the match is successful; Otherwise it fails to match.
Wherein, described decruption key is the target character of input; Described preset encryption key is preset character.
Wherein, described encryption key preset with described destination application for described decruption key to be mated, comprising: described target character and described preset character are contrasted; If the two is identical, then the match is successful; Otherwise it fails to match.
Wherein, described private data comprises privacy information and privacy function.
Second aspect present invention provides the method for a kind of application data protection, comprising:
Receiver module, for when the request of access to destination application being detected, receives the decruption key for accessing;
Matching module, for mating encryption key preset with described destination application for described decruption key;
Hide module, for hiding the private data in described destination application when it fails to match;
Output module, for exporting the access interface of the described destination application not comprising private data.
Wherein, when the match is successful, described output module output packet is containing the access interface of the described destination application of private data.
Wherein, described decruption key is the icon of described destination application moves generation target motion track along terminal screen; Described preset encryption key is preset motion track.
Wherein, described matching module calculates the similarity of described target motion track and described preset motion track; If described similarity reaches pre-set threshold value, then the match is successful; Otherwise it fails to match.
Wherein, described decruption key is the target character of input; Described preset encryption key is preset character.
Wherein, described target character and described preset character contrast by described matching module; If the two is identical, then the match is successful; Otherwise it fails to match.
Wherein, described private data comprises privacy information and privacy function.
Third aspect present invention provides a kind of terminal, comprises the data protecting device of application program described above.
Implement the embodiment of the present invention, there is following beneficial effect:
In the embodiment of the present invention; when the request of access to destination application being detected; by receiving the decruption key of application program; and mate with encryption key; the private data of hide application program when mating unsuccessful, exports the application program access interface not comprising private data, thus protects the private data in application program; prevent leaking data, improve security.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The method flow diagram that Fig. 1 protects for a kind of application data provided in the embodiment of the present invention.
The process flow diagram of another embodiment of method that Fig. 2 protects for a kind of application data provided in the embodiment of the present invention.
The process flow diagram of the another embodiment of method that Fig. 3 protects for a kind of application data provided in the embodiment of the present invention.
The structural representation of a kind of application data protective device that Fig. 4 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The process flow diagram of the method that Fig. 1 protects for a kind of application data provided in the embodiment of the present invention.In the embodiment of the present invention, application program is loaded on intelligent terminal, and intelligent terminal can be the electronic installations such as smart mobile phone, computer, panel computer or E-book reader.Application program can be note, phone, photograph, contact person etc.The method comprises the following steps S101-step S105.
In step S101, when the request of access to destination application being detected, receive the decruption key for accessing.
Concrete, whether clickedly by the icon detecting application program can judge request of access.
Concrete, whether user can decide in its sole discretion and be encrypted certain application program, such as, if user worries that the message registration of oneself is known by other people, then can be encrypted this application program of phone separately.On cipher mode, the mode that character is encrypted can be adopted, the mode that gesture is encrypted can also be adopted.It will be appreciated by persons skilled in the art that and can also adopt other cipher modes, such as recognition of face encryption, Voice Encryption and encrypting fingerprint etc., the present invention is not as limit.
When application program to be visited is encrypted, as request of access detected, user can be pointed out to input encryption key, as ejected the inputting interface of input character or inputting the nine grids etc. of gesture.It will be appreciated by persons skilled in the art that also can not point out input, whether direct-detection has input decruption key for further protected data safety.Corresponding to different cipher modes, manner of decryption now also can have multiple, such as character deciphering, gesture deciphering etc.It will be appreciated by persons skilled in the art that corresponding to cipher modes different in step S101, can adopt other manner of decryption in this step, such as recognition of face deciphering, sound deciphering and fingerprint deciphering etc., the present invention is not as limit.
In step s 102, encryption key preset with described destination application for described decruption key is mated.
Concrete, after have received the decruption key to described destination application, described decruption key is mated with encryption key.The method of coupling can have multiple, such as when key is character style, then judges that whether character is identical; When key be gesture or other forms time, then judge whether the similarity of character exceedes certain threshold value.
In step s 103, judge that whether coupling is successful.
Wherein, if it fails to match, then enter in step S104; If the match is successful, then enter in step S105.
In step S104, hide the private data in described destination application.
Concrete, when it fails to match, the decruption key now inputted does not mate encryption key, shows that current is not legal access, is now hidden by the private data in described destination application.Concrete, described private data comprises privacy information and privacy function.Privacy information refers to the data of not wishing by other people see, can be photo, video etc.Privacy function refers to the function of some application programs of not wishing by other people use, the querying the balance of such as Web bank, the function such as to transfer accounts.It will be appreciated by persons skilled in the art that private data can be arranged voluntarily by user, can identify by adding privacy mark for information or function, information or the function such as with privacy mark are privacy information or privacy function.Especially, the data that the privacy function of application program produces also are private data.Wherein, the data of vanishing target application program can be hide partial data wherein, the i.e. partial function of hide application program or the partial information of hide application program, limited subscriber uses the function of application program part or the partial information of restricting user access application program.
In other embodiments, the private data in destination application can be multiple, can arrange different encryption keys respectively for different private datas.
In step S105, export the access interface not comprising the described destination application of private data.
Concrete, when it fails to match, after concealing private data, export the access interface not comprising the described destination application of private data.Like this, still can see the access interface of application program, realize the basic function of this application program, but private data wherein cannot be had access to, thus achieve the protection to private data.
In step s 106, output packet is containing the access interface of the described destination application of private data.
Concrete, when the match is successful, show it is now legal access, can access this application program normally, therefore output packet is containing the access interface of the described destination application of private data.
Above-mentioned known; the data guard method of the application program in the embodiment of the present invention; by receiving the decruption key of application program; and mate with encryption key; the private data of hide application program when mating unsuccessful, exports the application program access interface not comprising private data, thus protects the private data in application program; prevent leaking data, improve security.
The process flow diagram of another embodiment of method that Fig. 2 protects for a kind of application data provided in the embodiment of the present invention.The method comprises the following steps S201-S206.
In step s 201, when the request of access to destination application being detected, the icon receiving described destination application moves the target motion track of generation along terminal screen.
In present embodiment, decruption key is the icon of application program moves generation motion track along terminal screen, and user is by clicking the icon of this application program and the mode dragged produces target motion track.Existing track manner of decryption is generally user and directly clicks with finger on screen and slide, and is to adopt to click and the icon dragging application program slides in present embodiment, thus further adds the security of strong encryption keys.
In step S202, calculate the similarity of target motion track and preset motion track.
In present embodiment, encryption key is default track.Wherein, when user's application programs is encrypted, user can be allowed to pre-set track, can be clicked with finger on screen by user and slide, preserving this track be preset motion track.After receiving the target motion track in decruption key, calculate the similarity of target motion track and preset motion track.It will be appreciated by persons skilled in the art that the calculating of similarity can by matching, long-pending grading mode, the present invention is not as limit.
In step S203, judge whether described similarity reaches predetermined threshold value.
Concrete, threshold value can by user's sets itself, and threshold value is higher, then the target motion track precise requirements in decruption key will be high.If similarity does not reach predetermined threshold value, then enter step S204; If similarity reaches predetermined threshold value, then enter step S206.
In step S204, hide the private data in described destination application.
In step S205, export the access interface not comprising the described destination application of private data.
In step S206, output packet is containing the access interface of the described destination application of private data.
S204-S206 in the present embodiment is identical with the step of the S104-S106 in a upper embodiment, is not repeated herein.
Above-mentioned known; the data guard method of the application program in the embodiment of the present invention; be decruption key by receiving the icon moving track of application program; and mate with the preset motion track in encryption key; the private data of hide application program when mating unsuccessful, exports the application program access interface not comprising private data, thus protects the private data in application program; prevent leaking data, improve security.
The process flow diagram of the another embodiment of method that Fig. 3 protects for a kind of application data provided in the embodiment of the present invention.The method comprises the following steps S301-S306.
In step S301, when the request of access to destination application being detected, receive the target character of input.
In present embodiment, decruption key is character, and wherein, character can be numeral, letter, symbol etc., and user passes through inputting interface input character as target character.
In step s 302, described target character and described preset character are contrasted.
In present embodiment, encryption key is preset character.Wherein, when user's application programs is encrypted, user can be allowed to pre-enter character, user is by inputting interface input character, and preserving this character is preset character.After receiving the target character in decruption key, described target character and described preset character are contrasted.
In step S303, whether both judgements are identical.
Concrete, if both are not identical, show that key does not mate, then enter step S304; If both are identical, show key match, then enter step S306.
In step s 304, the private data in described destination application is hidden
In step S305, export the access interface not comprising the described destination application of private data.
In step S306, output packet is containing the access interface of the described destination application of private data.
S304-S306 in the present embodiment is identical with the step of the S104-S106 in a upper embodiment, is not repeated herein.
Above-mentioned known; the data guard method of the application program in the embodiment of the present invention; the target character inputted by reception is decruption key; and mate with the preset character in encryption key; the private data of hide application program when mating unsuccessful, exports the application program access interface not comprising private data, thus protects the private data in application program; prevent leaking data, improve security.
Refer to Fig. 4, be depicted as the structural representation of the data protecting device of a kind of application program that the embodiment of the present invention provides.The data protecting device of this application program is positioned on intelligent terminal, and intelligent terminal can be the electronic installations such as smart mobile phone, computer, panel computer or E-book reader, and the present invention is not as limit.This data protecting device comprises receiver module 401, matching module 402, hides module 403 and output module 404.
Receiver module 401, for when the request of access to destination application being detected, receives the decruption key for accessing.
Concrete, whether clickedly by the icon detecting application program can judge request of access.
Concrete, whether user can decide in its sole discretion and be encrypted certain application program, such as, if user worries that the message registration of oneself is known by other people, then can be encrypted this application program of phone separately.On cipher mode, the mode that character is encrypted can be adopted, the mode that gesture is encrypted can also be adopted.It will be appreciated by persons skilled in the art that and can also adopt other cipher modes, such as recognition of face encryption, Voice Encryption and encrypting fingerprint etc., the present invention is not as limit.
When application program to be visited is encrypted, as request of access detected, user can be pointed out to input encryption key, as ejected the inputting interface of input character or inputting the nine grids etc. of gesture.It will be appreciated by persons skilled in the art that also can not point out input, whether direct-detection has input decruption key for further protected data safety.Corresponding to different cipher modes, manner of decryption now also can have multiple, such as character deciphering, gesture deciphering etc.It will be appreciated by persons skilled in the art that corresponding to different cipher modes, can adopt other manner of decryption in this step, such as recognition of face deciphering, sound deciphering and fingerprint deciphering etc., the present invention is not as limit.
When adopting the mode of gesture encryption and decryption, receiver module 401 is when the request of access to destination application being detected, and the icon receiving described destination application moves the target motion track of generation along terminal screen.In present embodiment, decruption key is the icon of application program moves generation motion track along terminal screen, and user is by clicking the icon of this application program and the mode dragged produces target motion track.Existing track manner of decryption is generally user and directly clicks with finger on screen and slide, and is to adopt to click and the icon dragging application program slides in present embodiment, thus further adds the security of strong encryption keys.
When adopting the mode of character encryption and decryption, receiver module 401, when the request of access to destination application being detected, receives the target character of input.In present embodiment, decruption key is the icon of application program moves generation motion track along terminal screen, and user is by clicking the icon of this application program and the mode dragged produces target motion track.
Matching module 402 is for mating encryption key preset with described destination application for described decruption key.
Concrete, after receiver module 401 have received the decruption key to described destination application, described decruption key mates with encryption key by matching module 402.Whether the method for coupling can have multiple, identical or similar both such as judging.
When adopting the mode of gesture encryption and decryption, matching module 402 judges whether to mate with the similarity of preset motion track by calculating target motion track.In present embodiment, encryption key is default track.Wherein, when user's application programs is encrypted, user can be allowed to pre-set track, can be clicked with finger on screen by user and slide, preserving this track be preset motion track.Receive the target motion track in decruption key at receiver module 401 after, matching module 402 calculates the similarity of target motion track and preset motion track.It will be appreciated by persons skilled in the art that the calculating of similarity can by matching, long-pending grading mode, the present invention is not as limit.Concrete, threshold value can by user's sets itself, and threshold value is higher, then the target motion track precise requirements in decruption key will be high.If similarity does not reach predetermined threshold value, then show that it fails to match; If similarity reaches predetermined threshold value, then show that the match is successful.
When adopting the mode of character encryption and decryption, matching module 402 is by carrying out contrast to judge whether mating with described preset character by described target character.In present embodiment, encryption key is preset character.Wherein, when user's application programs is encrypted, user can be allowed to pre-enter character, user is by inputting interface input character, and preserving this character is preset character.Receive the target character in decruption key at receiver module 401 after, described target character and described preset character contrast by matching module 402, and whether both judgements are identical.Concrete, if both are not identical, then show that it fails to match; If both are identical, then show that the match is successful.
Hide module 403 for hiding the private data in described destination application when it fails to match.
Concrete, when it fails to match, the decruption key now inputted does not mate encryption key, shows that current is not legal access, now hides module 403 and is hidden by the private data in described destination application.Concrete, described private data comprises privacy information and privacy function.Privacy information refers to the data of not wishing by other people see, can be photo, video etc.Privacy function refers to the function of some application programs of not wishing by other people use, the querying the balance of such as Web bank, the function such as to transfer accounts.It will be appreciated by persons skilled in the art that private data can be arranged voluntarily by user, can identify by adding privacy mark for information or function, information or the function such as with privacy mark are privacy information or privacy function.Especially, the data that the privacy function of application program produces also are private data.Wherein, the data of vanishing target application program can be hide partial data wherein, the i.e. partial function of hide application program or the partial information of hide application program, limited subscriber uses the function of application program part or the partial information of restricting user access application program.
In other embodiments, the private data in destination application can be multiple, can arrange different encryption keys respectively for different private datas.
Output module 404 is for exporting the access interface of the described destination application not comprising private data.
Concrete, when it fails to match, after hiding module 403 conceals private data, output module 404 exports the access interface of the described destination application not comprising private data.Like this, still can see the access interface of application program, realize the basic function of this application program, but private data wherein cannot be had access to, thus achieve the protection to private data.
Output module 404 is also for the access interface of the output packet when the match is successful containing the described destination application of private data.
Concrete, when the match is successful, show it is now legal access, can access this application program normally, now output module 404 output packet is containing the access interface of the described destination application of private data.
Above-mentioned known; the data protecting device of the application program in the embodiment of the present invention; by receiving the decruption key of application program; and mate with encryption key; the private data of hide application program when mating unsuccessful, exports the application program access interface not comprising private data, thus protects the data in application program; prevent leaking data, improve security.
The embodiment of the invention also discloses a kind of terminal, this terminal can comprise data protecting device, and the 26S Proteasome Structure and Function of this data protecting device see the related description in embodiment in Fig. 4, can be not repeated herein.Be understandable that, the terminal of the embodiment of the present invention, also can be applied in the method shown in Fig. 1-Fig. 3 any embodiment.
Above-mentioned known; terminal in the embodiment of the present invention; by receiving the decruption key of application program; and mate with encryption key; the private data of hide application program when mating unsuccessful, exports the application program access interface not comprising private data, thus protects the private data in application program; prevent leaking data, improve security.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (15)

1. a data guard method for application program, is characterized in that, comprising:
When the request of access to destination application being detected, receive the decruption key for accessing;
Encryption key preset with described destination application for described decruption key is mated;
If it fails to match, hide the private data in described destination application;
Export the access interface not comprising the described destination application of private data.
2. the data guard method of application program as claimed in claim 1, is characterized in that, if the match is successful, output packet is containing the access interface of the described destination application of private data.
3. the data guard method of application program as claimed in claim 2, is characterized in that, described decruption key is the icon of described destination application moves generation target motion track along terminal screen; Described preset encryption key is preset motion track.
4. the data guard method of application program as claimed in claim 3, is characterized in that, is describedly mated by encryption key preset with described destination application for described decruption key, comprising:
Calculate the similarity of described target motion track and described preset motion track;
If described similarity reaches pre-set threshold value, then the match is successful; Otherwise it fails to match.
5. the data guard method of application program as claimed in claim 2, is characterized in that, described decruption key is the target character of input; Described preset encryption key is preset character.
6. the data guard method of application program as claimed in claim 5, is characterized in that, is describedly mated by encryption key preset with described destination application for described decruption key, comprising:
Described target character and described preset character are contrasted;
If the two is identical, then the match is successful; Otherwise it fails to match.
7. the data guard method of the application program as described in any one of claim 1-6, is characterized in that, described private data comprises privacy information and privacy function.
8. a data protecting device for application program, is characterized in that, comprising:
Receiver module, for when the request of access to destination application being detected, receives the decruption key for accessing;
Matching module, for mating encryption key preset with described destination application for described decruption key;
Hide module, for hiding the private data in described destination application when it fails to match;
Output module, for exporting the access interface of the described destination application not comprising private data.
9. the data protecting device of application program as claimed in claim 8, is characterized in that, when the match is successful, described output module output packet is containing the access interface of the described destination application of private data.
10. the data protecting device of application program as claimed in claim 9, is characterized in that, described decruption key is the icon of described destination application moves generation target motion track along terminal screen; Described preset encryption key is preset motion track.
The data protecting device of 11. application programs as claimed in claim 9, it is characterized in that, described matching module calculates the similarity of described target motion track and described preset motion track; If described similarity reaches pre-set threshold value, then the match is successful; Otherwise it fails to match.
The data protecting device of 12. application programs as claimed in claim 8, is characterized in that, described decruption key is the target character of input; Described preset encryption key is preset character.
The data protecting device of 13. application programs as claimed in claim 12, is characterized in that, described target character and described preset character contrast by described matching module; If the two is identical, then the match is successful; Otherwise it fails to match.
The data protecting device of 14. application programs as described in any one of claim 8-13, it is characterized in that, described private data comprises privacy information and privacy function.
15. 1 kinds of terminals, is characterized in that, comprise the data protecting device of the application program described in any one of the claims 8-14.
CN201510282931.XA 2015-05-28 2015-05-28 Application data protection method and apparatus and terminal Pending CN105574366A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510282931.XA CN105574366A (en) 2015-05-28 2015-05-28 Application data protection method and apparatus and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510282931.XA CN105574366A (en) 2015-05-28 2015-05-28 Application data protection method and apparatus and terminal

Publications (1)

Publication Number Publication Date
CN105574366A true CN105574366A (en) 2016-05-11

Family

ID=55884490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510282931.XA Pending CN105574366A (en) 2015-05-28 2015-05-28 Application data protection method and apparatus and terminal

Country Status (1)

Country Link
CN (1) CN105574366A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194236A (en) * 2017-05-24 2017-09-22 深圳天珑无线科技有限公司 One kind application decryption method and device
CN108011972A (en) * 2017-12-21 2018-05-08 联想(北京)有限公司 Data processing method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604223A (en) * 2009-04-20 2009-12-16 宇龙计算机通信科技(深圳)有限公司 A kind of unlock method of touch-screen, system and touch panel device
CN102467462A (en) * 2010-11-17 2012-05-23 中国移动通信集团公司 Method for protecting data stored in device and corresponding device
CN103051809A (en) * 2013-01-05 2013-04-17 深圳市中兴移动通信有限公司 Mobile terminal and file security method and device thereof
CN103955638A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Method and device for privacy protection
CN104156637A (en) * 2014-07-11 2014-11-19 北京奇虎科技有限公司 Method and device for protecting private contents in intelligent terminal
CN104376240A (en) * 2013-08-12 2015-02-25 联想(北京)有限公司 Method for processing information and electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604223A (en) * 2009-04-20 2009-12-16 宇龙计算机通信科技(深圳)有限公司 A kind of unlock method of touch-screen, system and touch panel device
CN102467462A (en) * 2010-11-17 2012-05-23 中国移动通信集团公司 Method for protecting data stored in device and corresponding device
CN103051809A (en) * 2013-01-05 2013-04-17 深圳市中兴移动通信有限公司 Mobile terminal and file security method and device thereof
CN104376240A (en) * 2013-08-12 2015-02-25 联想(北京)有限公司 Method for processing information and electronic equipment
CN103955638A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Method and device for privacy protection
CN104156637A (en) * 2014-07-11 2014-11-19 北京奇虎科技有限公司 Method and device for protecting private contents in intelligent terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194236A (en) * 2017-05-24 2017-09-22 深圳天珑无线科技有限公司 One kind application decryption method and device
CN108011972A (en) * 2017-12-21 2018-05-08 联想(北京)有限公司 Data processing method and system

Similar Documents

Publication Publication Date Title
CN104657674B (en) The insulation blocking system and method for private data in a kind of mobile phone
US20170193236A1 (en) Data security processing method and apparatus based on switch in dual system
JP2017531266A (en) Data protection based on user and gesture recognition
WO2016045469A1 (en) Information encryption method and mobile terminal
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN104954534B (en) Control method, device and the corresponding communication terminal of communication terminal
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN105205374A (en) Application program encrypting method and user terminal
CN104253805A (en) Browser and data protection method thereof
CN105447357A (en) Application processing method and terminal
CN103532960B (en) Decrypt device
CN104573440A (en) Data viewing method and device
CN103778363A (en) Mobile terminal and method for protecting application
CN105809000A (en) Information processing method and electronic device
CN105306202B (en) Auth method, device and server
WO2017028277A1 (en) Fingerprint recognition method and mobile terminal
CN106203176A (en) A kind of application encryption method and device
WO2016145624A1 (en) Information processing method and mobile terminal
CN105630855A (en) File sharing method, file sharing system and terminal
CN106709362A (en) File encryption method and device and file decryption method and device
CN105574366A (en) Application data protection method and apparatus and terminal
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN106372472A (en) Application operation method and application operation device
WO2017000343A1 (en) Fingerprint unlocking method and terminal
CN106161365B (en) Data processing method and device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160511

RJ01 Rejection of invention patent application after publication