CN105574437A - Method and device for protecting privacy information and electronic equipment - Google Patents

Method and device for protecting privacy information and electronic equipment Download PDF

Info

Publication number
CN105574437A
CN105574437A CN201511029363.9A CN201511029363A CN105574437A CN 105574437 A CN105574437 A CN 105574437A CN 201511029363 A CN201511029363 A CN 201511029363A CN 105574437 A CN105574437 A CN 105574437A
Authority
CN
China
Prior art keywords
user
application program
screen locking
system screen
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201511029363.9A
Other languages
Chinese (zh)
Other versions
CN105574437B (en
Inventor
潘琦
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201511029363.9A priority Critical patent/CN105574437B/en
Publication of CN105574437A publication Critical patent/CN105574437A/en
Priority to PCT/CN2016/113298 priority patent/WO2017114476A1/en
Application granted granted Critical
Publication of CN105574437B publication Critical patent/CN105574437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)

Abstract

The embodiment of the invention discloses a method and a device for protecting privacy information and electronic equipment. The method comprises the following steps: when a system is locked or started for the first time, receiving a system screen locking password, and if the received system screen locking password is the same as any system screen locking password in a preset system screen locking password set, entering the system according to a user scene mapped by the received system screen locking password; if the user scene is a single-instance scene, receiving an application program lock password input by a user for accessing the application program; and if the input application program lock password is the same as any application program lock password in the preset application program lock password set, opening the access to the application program according to the user account mapped by the input application program lock password. By applying the method and the device, the safety of the private information can be improved.

Description

A kind of method, device and electronic equipment protecting privacy information
Technical field
The present invention relates to computer information safety technique, particularly relate to a kind of method, device and the electronic equipment of protecting privacy information.
Background technology
Along with the development of compunication and Internet technology, the application of electronic equipment is more and more general, such as, intelligent mobile phone, personal digital assistant, palm PC and desktop computer obtain to be applied more and more widely, and along with the continuous expansion of applied business, the types of applications program (APP, Application) of installing in the electronic device also gets more and more, in order to meet user to the multifarious demand of business.Wherein, some application programs are privacy application program, such as, and address list application program, short message application program, Web bank's application program, social application program, chat application etc., for this kind of privacy application program, user undesirably other users browses to relevant privacy information.Such as, but because electronic equipment may because of some unavoidable causes, when using privacy application program, relatives, friend are around user; Or, brought at will leaf through by relatives, friend; Or, may be obtained by other users unintentionally after the loss., thus cause the leakage of private information of user, make the security of user privacy information lower.
In order to promote the security of user privacy information, need to take suitable safeguard measure, with the inconvenience avoiding the leakage of privacy information to bring to user to the privacy application program in electronic equipment and the privacy information relevant to this privacy application program.At present, conventional mode adopts application locks to protect accessed privacy application program.When user needs access privacy application program, system ejects interface for password input, just can access this privacy application program after needing user correctly to input password.Other mode is system password lock, and only have when after the input of correct coded lock, user just can enter system, access program.
A requirement source in addition needs in same user the scene simultaneously using two of same application program (or multiple) examples.Such as a certain social software, same user has multiple account, and one may be used for comparatively public social life, and another one account is used for the social life of comparatively secret.For these application scenarioss, there are two example/many case technologies.Wherein, two example/many case technologies to refer in operating system that same application can operationally be carved and are run by Multi-instance simultaneously, and do not clash mutually between Multi-instance.Like this, utilize two example many case technologies, a user can be allowed to use different Account Logon same application simultaneously, the account logging in this application program maps an example, make under different scenes, user can select different Account Logon application programs, corresponding different privacy use-cases.Such as, the general information (non-privacy information) that example (account) only relates to this application program uses alternately, and the information (privacy information) that another example relates to this application program more privacy uses.
But this method for protecting privacy, if user for privacy object open two example many examples, but do not wish that other users know that he/her has multiple account simultaneously, and simultaneously at the two examples/many examples using this use program, due to once open two example many examples, the desktop of electronic equipment will there will be the icon of two (many) this application programs individual, different examples is started by different icon entrances in order to allow user, other users can be known, and this user uses multiple account at the same time, thus know that this user is using multiple account, user can not be protected better to wish to use more reconditely the demand of these privacy accounts.For example, in relatives, the friend scene around user, in system, can not show two example/many examples be unlocked, just present an example (such as desktop only has a program icon entrance) to user, this example corresponds to regular account and logs in; And for the scene that user stays alone; then two (multiple) examples are simultaneously by user's visible (two program icon entrances appear in such as desktop); allow user to use regular account and secret Account Logon simultaneously, thus protect its privacy better.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method, device and the electronic equipment of protecting privacy information, promotes the security of privacy information.
For achieving the above object, embodiments of the invention adopt following technical scheme:
First aspect, the embodiment of the present invention provides a kind of method protecting privacy information, comprising:
When system screen locking or initiating switchup, receiving system screen locking password, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system;
If user's scene is single example scenario, receive the application program lock cipher of user's access application input;
If the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input opens the access to described application program.
Optionally, after described receiving system screen locking password, if receive described system screen locking password identical with arbitrary system screen locking password in the system screen locking code-set pre-set before, the method can also comprise:
Judge whether system opens secret protection, if so, if perform the described described system screen locking password the received step identical with arbitrary system screen locking password in the system screen locking code-set pre-set;
If not, judge that whether the described system screen locking password received is identical with the non-intimacy protection system login password pre-set, if so, enter the system of non-secret protection; If not, user is pointed out to re-enter the system entering non-secret protection.
Optionally, interface is set by the privacy of system or the hiding Entry Interface that pre-sets arranges described unlatching secret protection.
Optionally, the hiding Entry Interface by pre-setting arranges described unlatching secret protection and comprises:
The character that pre-sets is inputted to arrange described unlatching secret protection in the third party application interface pre-set.
Optionally, describedly in the third party application interface pre-set, input the character pre-set comprise:
Dialing application program is set and dials the special number pre-set, or, be arranged in calculator application the special character inputting and pre-set.
Optionally, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input is opened and is comprised the access of described application program:
If the application program lock cipher of described input is identical with the single case application programs lock cipher in the application locks code-set pre-set, the user account mapped according to single example scenario opens the access to described application program, hides the content of two example/many examples.
Optionally, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input is opened and is comprised the access of described application program:
If the application program lock cipher of described input is identical with the two examples/multiple case application programs lock cipher in the application locks code-set pre-set, the user account mapped according to two example/many example scenario opens the access to described application program, shows people of unread information to user.
Optionally, described method also comprises:
If user's scene is two example/many example scenario, receive the request of user's access application;
When user accesses described application program first time after system screen locking unlocks, prompting user inputs application program lock cipher, and when user inputs correct, the Multi-instance that system will allow user to access described application program.
Second aspect, the embodiment of the present invention provides a kind of device protecting privacy information, comprising: user's scene enters module, password acceptance module and single example login module, wherein,
User's scene enters module, for when system screen locking or initiating switchup, receiving system screen locking password, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system;
Password acceptance module, if user's scene is single example scenario, receives the application program lock cipher of user's access application input;
Single example login module, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input opens the access to described application program.
Optionally, described user's scene enters module and comprises: system screen locking password acceptance unit, privacy open judging unit and user's scene enters unit, wherein,
Password acceptance unit, for when system screen locking or initiating switchup, receiving system screen locking password;
Privacy opens judging unit, for judging whether system opens secret protection, if so, notifies that user's scene enters unit;
If not, judge that whether the described system screen locking password received is identical with the non-intimacy protection system login password pre-set, if so, enter the system of non-secret protection; If not, user is pointed out to re-enter the system entering non-secret protection;
User's scene enters unit, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system.
Optionally, interface is set by the privacy of system or the hiding Entry Interface that pre-sets arranges described unlatching secret protection.
Optionally, the hiding Entry Interface by pre-setting arranges described unlatching secret protection and comprises:
The character that pre-sets is inputted to arrange described unlatching secret protection in the third party application interface pre-set.
Optionally, describedly in the third party application interface pre-set, input the character pre-set comprise:
Dialing application program is set and dials the special number pre-set, or, be arranged in calculator application the special character inputting and pre-set.
Optionally, described single example login module comprises: single case application programs lock cipher judging unit and single instance access unit, wherein,
Single case application programs lock cipher judging unit, if the application program lock cipher of described input is identical with the single case application programs lock cipher in the application locks code-set pre-set, advice note instance access unit;
Single instance access unit, the user account for mapping according to single example scenario opens the access to described application program, hides the content of two example/many examples.
Optionally, described single example login module also comprises: two case application programs lock cipher judging unit and two instance access unit, wherein,
Two case application programs lock cipher judging unit, if the application program lock cipher of described input is identical with the two examples/multiple case application programs lock cipher in the application locks code-set pre-set, the two instance access unit of notice;
Two instance access unit, the user account for mapping according to two example/many example scenario opens the access to described application program, shows people of unread information to user.
Optionally, described device also comprises:
Two example login module, if user's scene is two example/many example scenario, receives the request of user's access application;
When user accesses described application program first time after system screen locking unlocks, prompting user inputs application program lock cipher, and when user inputs correct, the Multi-instance that system will allow user to access described application program.
The third aspect, the embodiment of the present invention provides a kind of electronic equipment, and described electronic equipment comprises: housing, processor, storer, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processor and storer are arranged on circuit boards; Power circuit, for powering for each circuit of above-mentioned electronic equipment or device; Storer is used for stores executable programs code; Processor runs the program corresponding with executable program code by reading the executable program code stored in storer, for performing the method for aforementioned arbitrary described protection privacy information.
The method of the protection privacy information that the embodiment of the present invention provides, device and electronic equipment, coupling system screen locking password, and/or, application program lock cipher realizes different entrances and presents different user's scenes, do not wish that other users see or know user for privacy object and oneself use multiple account at the same time, the fact of Multi-instance, different entrances is utilized to input corresponding system screen locking password, and/or, application program lock cipher, thus when user needs, can switch between different instances scene in user's scene, the protection of data and the protection of privacy can be realized well, the privacy information of user can be protected well, privacy information security is high, effectively can meet the demand of user to privacy information security.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the method flow schematic diagram of embodiment of the present invention protection privacy information;
Fig. 2 is the apparatus structure schematic diagram of embodiment of the present invention protection privacy information;
Fig. 3 is the structural representation of an electronic equipment of the present invention embodiment.
Embodiment
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in detail.
Should be clear and definite, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Fig. 1 is the method flow schematic diagram of embodiment of the present invention protection privacy information.See Fig. 1, the method comprises:
Step 11, when system screen locking or initiating switchup, receiving system screen locking password, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system;
In this step, restart after user's shutdown, or, when performing unblock after user carries out system screen locking to electronic equipment, system screen locking password box is provided at system interface, after user inputs corresponding system screen locking password in system screen locking password box, trigger the operating process of carrying out system screen locking unblock or entering system.
In the embodiment of the present invention; except the system screen locking code-set pre-set; also be provided with non-intimacy protection system login password; system screen locking code-set respective user scene; the corresponding non-secret protection scene of non-intimacy protection system login password; system screen locking code-set includes two or more system screen locking passwords, and each system screen locking password maps user's scene.That is; scene comprises: user's scene and non-secret protection scene; wherein; user's scene comprises: single example scenario and two example/many example scenario; system screen locking code-set comprises two system screen locking passwords; one system screen locking password maps single example scenario, and another system screen locking password maps two example/many example scenario, and namely system screen locking code-set comprises single instance system screen locking password and two example/many instance systems screen locking password.Like this, when user is in the different scene in user's scene, current scene can be changed by the mode of system screen locking, such as, user is when other users are on the scene, in order to promote the security of privacy information, avoid other users to know this user and there are two accounts, two examples of two of a current privacy pattern account/many example scenario can be carried out system screen locking, then, input single instance system screen locking password of corresponding single example scenario again, single example scenario of system is entered after carrying out system screen locking unblock, thus can effectively prevent from other users to know this user there are two accounts, and after other users leave, again by single example scenario of current privacy pattern is carried out system screen locking, then, two examples/many instance systems screen locking password of the corresponding two example/many example scenario of input again, after carrying out system screen locking unblock, two examples/many example scenario of system can be entered, different examples is started by the different icons entrance of the same application shown, thus use same program by different account, such as, after entering two examples/many example scenario of system, for micro-letter, user can see two micro-letter icons simultaneously, two micro-reliable examples can be started simultaneously, thus log in two micro-letter accounts, and can the user independently in letter account micro-with two communicate respectively.Like this, can be entered the system of secret protection by system screen locking, user enters the system of secret protection by different system screen locking passwords, and this system screen locking can be untied by different system screen locking passwords.
In the embodiment of the present invention, user enters system by single instance system screen locking password, for micro-letter, and only display micro-reliable example, i.e. a single example scenario; Enter system by two example/many instance systems screen locking password, show two micro-reliable examples, i.e. two example scenario simultaneously.
In the embodiment of the present invention, as an embodiment, after entering two example/many example scenario, at desktop, for each privacy application program of opening two example, two icons of this privacy application program can be shown, and for the application program do not arranged, show an application icon.
As an embodiment, after described receiving system screen locking password, if receive described system screen locking password identical with arbitrary system screen locking password in the system screen locking code-set pre-set before, the method can also comprise:
Judge whether system opens secret protection, if so, if perform the described described system screen locking password the received step identical with arbitrary system screen locking password in the system screen locking code-set pre-set;
If not, judge that whether the described system screen locking password received is identical with the non-intimacy protection system login password pre-set, if so, enter the system of non-secret protection; If not, user is pointed out to re-enter the system entering non-secret protection.
In this step, user can arrange whether open secret protection in advance in the electronic device, if user is provided with unlatching secret protection, just needs the user's scene with secret protection entered to judge to user, and single example scenario or two example/many example scenario can be entered; If user does not arrange secret protection or closes secret protection, then conventionally flow process processes, namely judge that whether the described system screen locking password received is identical with the non-intimacy protection system login password pre-set, if so, enter the system of non-secret protection; If not, user is pointed out to re-enter the system entering non-secret protection.Such as; for entering in the system of non-secret protection; content association corresponding to two example/many example scenario all the time can be visible by any user; wherein; content association is the entrance for providing user to enter two example/many example scenario, comprising: the historical record (Recent) etc. of desktop icons, notifications, recently use application program.Again such as, again unlock after application program is lockable, or system to enter after system screen locking screen-unblocking again, desktop icons, notifications, use the content association such as the historical record of application program all can be visible by user recently.
In the embodiment of the present invention, as an embodiment, arrange and whether open secret protection and interface can be set by the privacy of system and arrange.Such as; enter after privacy arranges interface; open privacy protection mode; first system judges whether user is provided with the system screen locking code-set of user's scene with secret protection; if do not arranged; prompting user is arranged, and single example scenario arranges single instance system screen locking password, and two example/many example scenario arrange two example/many instance systems screen locking password.
As an embodiment, system screen locking code-set is saved in SQLite database.
As another embodiment; do not wish that other users can arrange interface by the privacy of inquiry system in order to solve user for privacy object; thus know that oneself uses the fact of multiple account, Multi-instance at the same time; except interface being set by the privacy of system and carrying out secret protection and arrange, can also be arranged by the hiding Entry Interface pre-set.Such as, user can represent On/Off secret protection by inputting the character pre-set in the third party application interface pre-set.Wherein, the character pre-set is inputted in the third party application interface pre-set, can be dial by arranging dialing application program the special number pre-set, or, by inputting the special character pre-set in calculator application, if before screen locking, the dialing application program preset dialed the special number pre-set, or in calculator application, inputted the special character pre-set, once specific combination is detected, then can be mapped as the action that above-mentioned privacy is opened or privacy is closed.
Step 12, if user's scene is single example scenario, receives the application program lock cipher of user's access application input;
In this step, in single example scenario, the corresponding application icon of each application program, corresponding one or more application locks (AppLocker) password of each application icon, each application locks (password) maps a certain use scenes of this application program, such as single example use scenes or two/many examples use scenes.
In mobile electronic device; application locks (password) technology normally in order to protect the privacy of user to use; refer in (operation) system; making user when accessing protected application program by special mode, needing just can correctly access this application program by inputting the modes such as special password, password.In the embodiment of the present invention, utilize application program lock cipher to refer to if this application program opens two example/many examples support, user, by arranging different application program lock ciphers, can enter the different use scenes of this application program.Under single example use scenes, the access of the just example of this application program that user opens; Under two example/many examples use scenes, what user opened is the access rights of this application program two/Multi-instance, and now, system will allow user to access two/Multi-instance of this program simultaneously.Such as desktop can there is two/multiple icon of this application program, allow user to access simultaneously.
In the embodiment of the present invention, as an embodiment, the method can also comprise:
If user's scene is two example/many example scenario, receive the request of user's access application;
When user accesses described application program first time after system screen locking unlocks, prompting user inputs application program lock cipher, and when user inputs correct, the Multi-instance that system will allow user to access described application program.
In this step, if user enters two example/many example scenario, for micro-letter, two micro-letter icons appear in desktop, two micro-reliable examples simultaneously can by system finding, and user clicks one of them micro-letter icon, then enter the account that this micro-letter icon is corresponding; User clicks another micro-letter icon, then enter the account that this another micro-letter icon is corresponding.
Step 13, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input opens the access to described application program.
In this step, the arbitrary application program lock cipher in application locks code-set maps an example of this application program, comprises single example and two example/many examples.
As an embodiment, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input is opened and is comprised the access of described application program:
If the application program lock cipher of described input is identical with the single case application programs lock cipher in the application locks code-set pre-set, the user account mapped according to single example scenario opens the access to described application program, hides the content of two example/many examples.
In this step, in secret protection scene (user's scene), if enter single example scenario, such as, for micro-letter, single example of corresponding micro-letter account can by system finding, user can be corresponding with this micro-letter account example mutual, the content of two example/many examples is hidden, such as, by using the historical record entrance of application program recently, desktop icons entrance, notifications entrance or be hidden by the entrance of sharing of third party application, but this pair of example/many example still can run or be in running status, this pair of information that example/many examples receive is not demonstrated, such as, the incoming call of privacy will be related to, letter is set to not respond (such as, not jingle bell, do not show, do not vibrate).And after user to be opened two example/many examples and enters two example/many example scenario by some mode, all before this time two example/many examples receive and the information be not demonstrated can be presented on fast in two example/many example scenario, and rerun new example without the need to user.
As another embodiment, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input is opened and is comprised the access of described application program:
If the application program lock cipher of described input is identical with the two examples/multiple case application programs lock cipher in the application locks code-set pre-set, the user account mapped according to two example/many example scenario opens the access to described application program, shows people of unread information to user.
In this step, if user enters two example/many example scenario, then user can access two example/many examples.Such as, can access two example, wherein, an example maps the regular account of user in this application program, and another example maps the privacy account of user in this application program, and two accounts are separate, are independent of each other, and can run simultaneously.Like this; two example/many example scenario can be started by single case application programs icon of desktop presentation; thus can effectively avoid at the two case application programs icon of desktop presentation; this user has many accounts to avoid other users to know; thus the privacy information of available protecting user, promote the security of privacy information.
In the embodiment of the present invention, enter the scene of secret protection by arranging application locks (AppLocker), each application program is protected by AppLocker, and this AppLocker can be opened by different passwords.
In the embodiment of the present invention, as another embodiment, any time, once application program or system are pinned again, such as, user presses power key and puts out screen, even if be in two example scenario before, corresponding desktop has two micro-letter icons, and when again needing user to unlock, system also only presents a micro-letter icon.Scene default is like this exactly the scene to secret protection.
In the embodiment of the present invention, coupling system screen locking password and/or, application program lock cipher realizes different entrances and presents different user's scenes, do not wish that other users see or know user for privacy object and oneself use the fact of multiple account, Multi-instance at the same time, utilize different entrances input corresponding system screen locking password and/or, application program lock cipher, when a certain entrance unties this lock, is merely able to the restrict access untiing one of them example; Another entrance then can untie the restrict access of two (many) individual examples; thus when user needs; can switch between different instances scene in user's scene; the protection of data and the protection of privacy can be realized well; the privacy information of user can be protected well; privacy information security is high, effectively can meet the demand of user to privacy information security.Further; the method of the embodiment of the present invention can extend to the deeper secret protection demand of user in two (many) examples use scenes; make system screen locking password and/or; application program lock cipher is equivalent to the restriction from originally untiing merely for application content access; extend to and also can untie and sightless restriction visible for two (many) examples Multi-instance content, namely add the secret protection whether having Multi-instance simultaneously to run for this application program.
Fig. 2 is the apparatus structure schematic diagram of embodiment of the present invention protection privacy information.See Fig. 2, this device comprises: user's scene enters module 21, password acceptance module 22 and single example login module 23, wherein,
User's scene enters module 21, for when system screen locking or initiating switchup, receiving system screen locking password, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system;
In the embodiment of the present invention; scene comprises: user's scene and non-secret protection scene; wherein; user's scene comprises: single example scenario and two example/many example scenario; system screen locking code-set comprises two system screen locking passwords; one system screen locking password maps single example scenario, and another system screen locking password maps two example/many example scenario, and namely system screen locking code-set comprises single instance system screen locking password and two example/many instance systems screen locking password.
As an embodiment, user's scene enters module 21 and comprises: system screen locking password acceptance unit, privacy open judging unit and user's scene enters unit (not shown), wherein,
Password acceptance unit, for when system screen locking or initiating switchup, receiving system screen locking password;
Privacy opens judging unit, for judging whether system opens secret protection, if so, notifies that user's scene enters unit;
If not, judge that whether the described system screen locking password received is identical with the non-intimacy protection system login password pre-set, if so, enter the system of non-secret protection; If not, user is pointed out to re-enter the system entering non-secret protection;
User's scene enters unit, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system.
In the embodiment of the present invention, as an embodiment, interface can be set by the privacy of system or the hiding Entry Interface that pre-sets arranges described unlatching secret protection.
In the embodiment of the present invention, as an embodiment, described unlatching secret protection is set by the hiding Entry Interface pre-set and comprises:
The character that pre-sets is inputted to arrange described unlatching secret protection in the third party application interface pre-set.
In the embodiment of the present invention, as an embodiment, describedly in the third party application interface pre-set, input the character pre-set comprise:
Dialing application program is set and dials the special number pre-set, or, be arranged in calculator application the special character inputting and pre-set.
Password acceptance module 22, if user's scene is single example scenario, receives the application program lock cipher of user's access application input;
In the embodiment of the present invention, in single example scenario, the corresponding application icon of each application program, the corresponding one or more application program lock cipher of each application icon, each application program lock cipher maps an example scenario of this application program.
Single example login module 23, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input opens the access to described application program.
In the embodiment of the present invention, as an embodiment, single example login module 23 comprises: single case application programs lock cipher judging unit and single instance access unit (not shown), wherein,
Single case application programs lock cipher judging unit, if the application program lock cipher of described input is identical with the single case application programs lock cipher in the application locks code-set pre-set, advice note instance access unit;
Single instance access unit, the user account for mapping according to single example scenario opens the access to described application program, hides the content of two example/many examples.
As another embodiment, single example login module 23 also comprises: two case application programs lock cipher judging unit and two instance access unit, wherein,
Two case application programs lock cipher judging unit, if the application program lock cipher of described input is identical with the two examples/multiple case application programs lock cipher in the application locks code-set pre-set, the two instance access unit of notice;
Two instance access unit, the user account for mapping according to two example/many example scenario opens the access to described application program, shows people of unread information to user.
As an embodiment, this device also comprises:
Two example login module 24, if user's scene is two example/many example scenario, receives the request of user's access application;
When user accesses described application program first time after system screen locking unlocks, prompting user inputs application program lock cipher, and when user inputs correct, the Multi-instance that system will allow user to access described application program.
The embodiment of the present invention also provides a kind of electronic equipment, and described electronic equipment comprises the device described in aforementioned any embodiment.
Fig. 3 is the structural representation of an electronic equipment of the present invention embodiment, the flow process of Fig. 1-2 illustrated embodiment of the present invention can be realized, as shown in Figure 3, above-mentioned electronic equipment can comprise: housing 31, processor 32, storer 33, circuit board 34 and power circuit 35, wherein, circuit board 34 is placed in the interior volume that housing 31 surrounds, and processor 32 and storer 33 are arranged on circuit board 34; Power circuit 35, for powering for each circuit of above-mentioned electronic equipment or device; Storer 33 is for stores executable programs code; Processor 32 runs the program corresponding with executable program code, for performing the method for the protection privacy information described in aforementioned any embodiment by reading the executable program code stored in storer 33.
The step that the concrete implementation of processor 32 pairs of above-mentioned steps and processor 32 perform further by running executable program code, see the description of Fig. 1-2 illustrated embodiment of the present invention, can not repeat them here.
This electronic equipment exists in a variety of forms, includes but not limited to:
(1) mobile communication equipment: the feature of this kind equipment possesses mobile communication function, and to provide speech, data communication for main target.This Terminal Type comprises: smart mobile phone (such as iPhone), multimedia handset, functional mobile phone, and low-end mobile phone etc.
(2) super mobile personal computer equipment: this kind equipment belongs to the category of personal computer, has calculating and processing capacity, generally also possesses mobile Internet access characteristic.This Terminal Type comprises: PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device: this kind equipment can show and play multimedia content.This kind equipment comprises: audio frequency, video player (such as iPod), handheld device, e-book, and intelligent toy and portable car-mounted navigator.
(4) server: the equipment that calculation services is provided, the formation of server comprises processor, hard disk, internal memory, system bus etc., server and general computer architecture similar, but owing to needing to provide highly reliable service, therefore require higher in processing power, stability, reliability, security, extensibility, manageability etc.
(5) other have the electronic equipment of data interaction function.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.

Claims (10)

1. protect a method for privacy information, it is characterized in that, the method comprises:
When system screen locking or initiating switchup, receiving system screen locking password, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system;
If user's scene is single example scenario, receive the application program lock cipher of user's access application input;
If the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input opens the access to described application program.
2. method according to claim 1, it is characterized in that, after described receiving system screen locking password, if receive described system screen locking password identical with arbitrary system screen locking password in the system screen locking code-set pre-set before, the method can also comprise:
Judge whether system opens secret protection, if so, if perform the described described system screen locking password the received step identical with arbitrary system screen locking password in the system screen locking code-set pre-set;
If not, judge that whether the described system screen locking password received is identical with the non-intimacy protection system login password pre-set, if so, enter the system of non-secret protection; If not, user is pointed out to re-enter the system entering non-secret protection.
3. method according to claim 2, is characterized in that, arranges interface or the hiding Entry Interface that pre-sets arranges described unlatching secret protection by the privacy of system.
4. method according to claim 3, is characterized in that, arranges described unlatching secret protection comprise by the hiding Entry Interface pre-set:
The character that pre-sets is inputted to arrange described unlatching secret protection in the third party application interface pre-set.
5. method according to claim 4, is characterized in that, describedly in the third party application interface pre-set, inputs the character pre-set comprise:
Dialing application program is set and dials the special number pre-set, or, be arranged in calculator application the special character inputting and pre-set.
6. the method according to any one of claim 1 to 5, it is characterized in that, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input is opened and is comprised the access of described application program:
If the application program lock cipher of described input is identical with the single case application programs lock cipher in the application locks code-set pre-set, the user account mapped according to single example scenario opens the access to described application program, hides the content of two example/many examples.
7. the method according to any one of claim 1 to 5, it is characterized in that, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input is opened and is comprised the access of described application program:
If the application program lock cipher of described input is identical with the two examples/multiple case application programs lock cipher in the application locks code-set pre-set, the user account mapped according to two example/many example scenario opens the access to described application program, shows people of unread information to user.
8. the method according to any one of claim 1 to 5, is characterized in that, described method also comprises:
If user's scene is two example/many example scenario, receive the request of user's access application;
When user accesses described application program first time after system screen locking unlocks, prompting user inputs application program lock cipher, and when user inputs correct, the Multi-instance that system will allow user to access described application program.
9. protect a device for privacy information, it is characterized in that, this device comprises: user's scene enters module, password acceptance module and single example login module, wherein,
User's scene enters module, for when system screen locking or initiating switchup, receiving system screen locking password, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system;
Password acceptance module, if user's scene is single example scenario, receives the application program lock cipher of user's access application input;
Single example login module, if the application program lock cipher of described input is identical with arbitrary application program lock cipher in the application locks code-set pre-set, the user account mapped according to the application program lock cipher of described input opens the access to described application program.
10. device according to claim 9, is characterized in that, described user's scene enters module and comprises: system screen locking password acceptance unit, privacy open judging unit and user's scene enters unit, wherein,
Password acceptance unit, for when system screen locking or initiating switchup, receiving system screen locking password;
Privacy opens judging unit, for judging whether system opens secret protection, if so, notifies that user's scene enters unit;
If not, judge that whether the described system screen locking password received is identical with the non-intimacy protection system login password pre-set, if so, enter the system of non-secret protection; If not, user is pointed out to re-enter the system entering non-secret protection;
User's scene enters unit, if the described system screen locking password received is identical with arbitrary system screen locking password in the system screen locking code-set pre-set, the user's scene mapped according to the described system screen locking password received enters system.
CN201511029363.9A 2015-12-31 2015-12-31 Method and device for protecting privacy information and electronic equipment Active CN105574437B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201511029363.9A CN105574437B (en) 2015-12-31 2015-12-31 Method and device for protecting privacy information and electronic equipment
PCT/CN2016/113298 WO2017114476A1 (en) 2015-12-31 2016-12-29 Method and device for protecting privacy information and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511029363.9A CN105574437B (en) 2015-12-31 2015-12-31 Method and device for protecting privacy information and electronic equipment

Publications (2)

Publication Number Publication Date
CN105574437A true CN105574437A (en) 2016-05-11
CN105574437B CN105574437B (en) 2019-03-19

Family

ID=55884551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511029363.9A Active CN105574437B (en) 2015-12-31 2015-12-31 Method and device for protecting privacy information and electronic equipment

Country Status (2)

Country Link
CN (1) CN105574437B (en)
WO (1) WO2017114476A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372530A (en) * 2016-08-29 2017-02-01 广东欧珀移动通信有限公司 Method for viewing privacy data and device
CN106874045A (en) * 2017-01-20 2017-06-20 北京奇虎科技有限公司 A kind of startup method of application program, device and mobile terminal
WO2017114391A1 (en) * 2015-12-31 2017-07-06 北京金山安全软件有限公司 Method, apparatus, and electronic device based on use of electronic device by multiple accounts
WO2017114476A1 (en) * 2015-12-31 2017-07-06 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic device
CN107133507A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy services system access method, device and mobile terminal
WO2017201692A1 (en) * 2016-05-25 2017-11-30 北京小米移动软件有限公司 Application encryption method and device
CN109219003A (en) * 2018-08-22 2019-01-15 Oppo广东移动通信有限公司 Information ciphering method, device, storage medium and electronic equipment
CN109583227A (en) * 2018-10-30 2019-04-05 中国科学院信息工程研究所 A kind of method for protecting privacy, apparatus and system
CN109725950A (en) * 2018-12-29 2019-05-07 武汉斗鱼网络科技有限公司 A kind of method, apparatus and storage medium for realizing the operation of client list example

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140033298A1 (en) * 2012-07-25 2014-01-30 Samsung Electronics Co., Ltd. User terminal apparatus and control method thereof
CN103761078A (en) * 2013-11-02 2014-04-30 希姆通信息技术(上海)有限公司 Unlocking method and system for intelligent terminal
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182662B (en) * 2014-08-22 2017-10-17 广东欧珀移动通信有限公司 Hiding and deployment method, system and the mobile terminal of hide application program
CN105574437B (en) * 2015-12-31 2019-03-19 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140033298A1 (en) * 2012-07-25 2014-01-30 Samsung Electronics Co., Ltd. User terminal apparatus and control method thereof
CN103761078A (en) * 2013-11-02 2014-04-30 希姆通信息技术(上海)有限公司 Unlocking method and system for intelligent terminal
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017114391A1 (en) * 2015-12-31 2017-07-06 北京金山安全软件有限公司 Method, apparatus, and electronic device based on use of electronic device by multiple accounts
WO2017114476A1 (en) * 2015-12-31 2017-07-06 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic device
WO2017201692A1 (en) * 2016-05-25 2017-11-30 北京小米移动软件有限公司 Application encryption method and device
CN106372530A (en) * 2016-08-29 2017-02-01 广东欧珀移动通信有限公司 Method for viewing privacy data and device
CN106874045A (en) * 2017-01-20 2017-06-20 北京奇虎科技有限公司 A kind of startup method of application program, device and mobile terminal
CN107133507A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy services system access method, device and mobile terminal
CN109219003A (en) * 2018-08-22 2019-01-15 Oppo广东移动通信有限公司 Information ciphering method, device, storage medium and electronic equipment
CN109583227A (en) * 2018-10-30 2019-04-05 中国科学院信息工程研究所 A kind of method for protecting privacy, apparatus and system
CN109583227B (en) * 2018-10-30 2020-08-07 中国科学院信息工程研究所 Privacy information protection method, device and system
CN109725950A (en) * 2018-12-29 2019-05-07 武汉斗鱼网络科技有限公司 A kind of method, apparatus and storage medium for realizing the operation of client list example

Also Published As

Publication number Publication date
CN105574437B (en) 2019-03-19
WO2017114476A1 (en) 2017-07-06

Similar Documents

Publication Publication Date Title
CN105574437A (en) Method and device for protecting privacy information and electronic equipment
US8762724B2 (en) Website authentication
Shi et al. Implicit authentication through learning user behavior
CN105701414A (en) Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment
US8433068B2 (en) Method and apparatus for communication based on pseudo-contact information
CN110651270B (en) Data access method and device
US10140445B2 (en) Information processing apparatus and information processing method
CN106534570A (en) Privacy protection method and device
US9563756B2 (en) Two phase password input mechanism
CN105701420B (en) A kind of management method and terminal of user data
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN107070785A (en) A kind of realize reads the method shared and its device
WO2018140172A1 (en) Determining computer ownership
BR112019019825A2 (en) system and method for providing user accounts
US7975309B2 (en) Systems and methods for securing data in an electronic apparatus
US20150310206A1 (en) Password management
CN105335631A (en) Method and device for configuring login information, and mobile terminal
CN106332000A (en) Terminal location information obtaining method and device
Otrok et al. Mobile phishing attack for Android platform
JP5163042B2 (en) Information processing apparatus, security countermeasure method, and computer program
CN103678969A (en) Lock releasing method of electronic device, and apparatus thereof
WO2021056767A1 (en) Information processing method, mobile terminal and computer storage medium
CN104036203A (en) Information security management method and information security management system
CN111030982B (en) Strong management and control method, system and storage medium for confidential files

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant