CN106650419A - Application encryption method and apparatus for terminal, and mobile terminal - Google Patents

Application encryption method and apparatus for terminal, and mobile terminal Download PDF

Info

Publication number
CN106650419A
CN106650419A CN201710005464.5A CN201710005464A CN106650419A CN 106650419 A CN106650419 A CN 106650419A CN 201710005464 A CN201710005464 A CN 201710005464A CN 106650419 A CN106650419 A CN 106650419A
Authority
CN
China
Prior art keywords
application program
encryption data
encryption
terminal
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710005464.5A
Other languages
Chinese (zh)
Inventor
崔博涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710005464.5A priority Critical patent/CN106650419A/en
Publication of CN106650419A publication Critical patent/CN106650419A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

An embodiment of the invention provides an application encryption method for a terminal. The method comprises the steps of judging whether precedent encryption data of a first application exists in the terminal or not when the installation of the first application is finished; and if the precedent encryption data of the first application exists, encrypting the first application by adopting the precedent encryption data. According to the method, when the first application is added with the encryption data, the terminal stores the encryption data; after the first application is uninstalled, the terminal still reserves the encryption data; and when it is detected that the first application is installed again, the first application is encrypted by adopting the precedently reserved encryption data of the first application, so that the security of the first application is ensured.

Description

A kind of application program encryption method of terminal, device and mobile terminal
Technical field
The application is related to field of terminal technology, the application program encryption method of more particularly to a kind of terminal, a kind of terminal Application program encryption device and a kind of mobile terminal.
Background technology
With the development of mobile terminal, the function of the application program in mobile terminal is more and more.Wherein it is no lack of some to relate to And the application program of privacy of user, personal property.
In order to increase the security of application program, password can be added to application program using application locks.Using journey Sequence lock is a kind of application program protected to application program addition password.It is provided with the application program needs of application locks Just can be opened after the correct password of user input.
Arranging application locks to application program can improve security, but still suffer from certain leak.Such as, will arrange After the application program of application locks is deleted, if reinstall the application program.The application program reinstalled is not set Application locks are put, i.e., need not input password can just open the application program.
The content of the invention
In view of the above problems, it is proposed that the embodiment of the present application overcomes the problems referred to above or at least in part to provide one kind The movement of a kind of application program encryption method of the terminal for solving the above problems, a kind of application program encryption device of terminal and one kind Terminal.
In order to solve the above problems, the embodiment of the present application discloses a kind of application program encryption method of terminal, including:
When the first application program installation, judge in terminal with the presence or absence of the first encryption of first application program Data;
If there is the first encryption data of first application program, using the first encryption data for described the One application program is encrypted.
Preferably, the application program has attribute;Described method also includes:
If there is no the first encryption data of first application program, lookup has same with first application program One or more second application programs of attribute;
Judge whether to be configured with encryption data to second application program;
If so, then using the encryption data of second application program first application program is encrypted.
Preferably, encryption data storage encryption information table in the terminal.
Preferably, also include:
When there is no the first encryption data of first application program in terminal, the encryption behaviour that receive user is submitted to Make, and encryption data is extracted from the cryptographic operation;
Add the encryption data for first application program in the encryption information table.
Preferably, also include:
Receive the cancellation cryptographic operation submitted to;
According to the cancellation cryptographic operation, delete existing for first application program in the encryption information table Encryption data.
Preferably, also include:
When the first application program unloaded time preset time threshold is exceeded, the pin in the encryption information table Existing encryption data is deleted to first application program.
Preferably, the encryption data includes:Character string information, finger print information, touch track information, touch pressure information In at least one.
The embodiment of the present application also discloses a kind of application program encryption device of terminal, including:
First judge module, for when the first application program installation, judging to whether there is described first in terminal The first encryption data of application program;
First encrypting module, if for the first encryption data that there is first application program, using described first Encryption data is encrypted for first application program.
Preferably, the application program has attribute;Described device also includes:
Searching modul, if for the first encryption data that there is no first application program, searching should with described first There are one or more second application programs of same attribute with program;
Second judge module, to judge whether to be configured with encryption data to second application program;
Second encrypting module, if for being configured with encryption data to second application program, should using described second First application program is encrypted with the encryption data of program.
Preferably, encryption data storage encryption information table in the terminal.
Preferably, also include:
First operation receiver module, for when there is no the first encryption data of first application program in terminal, The cryptographic operation that receive user is submitted to, and extract encryption data from the cryptographic operation;
Encryption data add module, for adding for first application program addition is described in the encryption information table Ciphertext data.
Preferably, also include:
Second operation receiver module, for receiving the cancellation cryptographic operation submitted to;
First encryption data removing module, for according to the cancellation cryptographic operation, being directed in the encryption information table First application program deletes existing encryption data.
Preferably, also include:
Second encryption data removing module, for exceeding Preset Time threshold when the first application program unloaded time During value, existing encryption data is deleted for first application program in the encryption information table.
Preferably, the encryption data includes:Character string information, finger print information, touch track information, touch pressure information In at least one.
The embodiment of the present application also discloses a kind of mobile terminal, including processor and memory,
The memory is used for the program that storage performs the application program encryption method of described terminal;
The processor is configurable for performing the program stored in the memory.
The embodiment of the present application includes advantages below:
In the embodiment of the present application, when encryption data is added to the first application program, terminal can store encryption data. After one application program is unloaded, terminal still retains encryption data.When detecting the first application program and installing again, then adopt The encryption data of the first reservation of the first application program is encrypted to the first application program.That is it is provided with application program After first application program of lock is unloaded, terminal still stores the encryption data of application locks.Apply when installing first again During program, the encryption data of the application locks before terminal employing arranges application locks to the first application program, so as to protect Demonstrate,prove the security of the first application program.
Description of the drawings
The step of Fig. 1 is a kind of application program encryption method embodiment 1 of terminal of the application flow chart;
The step of Fig. 2 is a kind of application program encryption method embodiment 2 of terminal of the application flow chart;
The step of Fig. 3 is a kind of application program encryption method embodiment 3 of terminal of the application flow chart;
The step of Fig. 4 is a kind of application program encryption method embodiment 4 of terminal of the application flow chart;
The step of Fig. 5 is a kind of application program encryption method embodiment 5 of terminal of the application flow chart;
Fig. 6 is a kind of structured flowchart of the application program encryption device embodiment 1 of terminal of the application;
Fig. 7 is a kind of structured flowchart of the application program encryption device embodiment 2 of terminal of the application;
Fig. 8 is the block diagram of the part-structure of the mobile phone related to the terminal of the embodiment of the present application offer.
Specific embodiment
It is understandable to enable the above-mentioned purpose of the application, feature and advantage to become apparent from, it is below in conjunction with the accompanying drawings and concrete real Apply mode to be described in further detail the application.
One of core idea of the embodiment of the present application be provided with the application program of application locks it is unloaded after, eventually End still stores the encryption data of application locks.Application program when the application program is installed again, before terminal employing The encryption data of lock arranges application locks to the application program, so as to ensure the security of application program.
With reference to Fig. 1, show the application a kind of terminal application program encryption method embodiment 1 the step of flow chart, Specifically may include steps of:
Step 101, when the first application program installation, judges in terminal with the presence or absence of first application program First encryption data;
In the embodiment of the present application, user can configure application locks using encryption data to the first application program.Arrange After first application program of application locks is unloaded, terminal still stores the encryption of the application locks of the first application program Data.When the first application program installation again, terminal can find the first encryption data of the first application program.
Application locks are a kind of cipher modes to application program.When user start be provided with application program application During program, terminal generates checking interface, and user needs that in checking interface input encryption data application program could be started.
Encryption data can store encryption information table in the terminal.When the first application program installation, terminal exists Search whether that there is the first encryption data of the first application program in encryption information table.
The encryption data can include:Character string information (for example, abc123), finger print information (the fingerprint letter of user Breath), touch track information (in the touch track of terminal screen input), the touch pressure information (pressure of pressing terminal screen Value).
Step 102, if there is the first encryption data of first application program, using the first encryption data pin First application program is encrypted.
If the first encryption data with the first application program in terminal, again should to first using first encryption data With program, application locks are set.
If formerly encryption data is character string information, being arranged with program to first using this character string information again should Use procedure lock.For example, if formerly encryption data is abc123, the first application program is arranged using abc123 apply journey again Sequence is locked.If formerly encryption data is finger print information, the first application program is arranged using this finger print information apply journey again Sequence is locked.If formerly encryption data is touch track information, again the first application program is set using this touch track information Put application locks.If formerly encryption data is touch pressure information, again should to first using this touch pressure information With program, application locks are set.
In the embodiment of the present application, when encryption data is added to the first application program, terminal can store encryption data. After one application program is unloaded, terminal still retains encryption data.When detecting the first application program and installing again, then adopt The encryption data of the first reservation of the first application program is encrypted to the first application program.That is it is provided with application program After first application program of lock is unloaded, terminal still stores the encryption data of application locks.Apply when installing first again During program, the encryption data of the application locks before terminal employing arranges application locks to the first application program, so as to protect Demonstrate,prove the security of the first application program.
With reference to Fig. 2, show the application a kind of terminal application program encryption method embodiment 2 the step of flow chart, Specifically may include steps of:
Step 201, when application program installation, judges to whether there is the application journey in the encryption information table of terminal The first encryption data of sequence.
In the embodiment of the present application, user can configure application locks using encryption data to the first application program.Arrange After first application program of application locks is unloaded, terminal still stores the encryption of the application locks of the first application program Data.When the first application program installation again, terminal can find the first encryption data of the first application program.
Application locks are a kind of cipher modes to application program.When user start be provided with application program application During program, terminal generates checking interface, and user needs that in checking interface input encryption data application program could be started.
Encryption data can store encryption information table in the terminal.When the first application program installation, terminal exists Search whether that there is the first encryption data of the first application program in encryption information table.
Step 202, if there is the first encryption data of first application program, using the first encryption data pin First application program is encrypted.
If the first encryption data with the first application program in terminal, again should to first using first encryption data With program, application locks are set.
Step 203, if there is no the first encryption data of first application program, searches and first application program One or more second application programs with same attribute;
The attribute of application program can be a kind of classification information.For example, divided by the function of application program.Taobao should With program, Jingdone district store application program, their function is all shopping, then their attribute is shopping class.Wechat application program, QQ application programs, their function is all communication, then their attribute is communication class.
If being not stored in the first encryption data of the first application program in terminal, terminal is searched with the first application program Second application program of attribute.
Step 204, judges whether to be configured with encryption data to second application program;
Second application program configuration encryption data is referred to, the second application program is provided with using encryption data is applied journey Sequence is locked.
When the second application program of the attribute with the first application program is found, judge whether using encryption data pair Second application program is provided with application locks.
Step 205, if being configured with encryption data to second application program, adding using second application program Ciphertext data is encrypted to first application program.
Application locks are provided with to the second application program according to encryption data, then using the encryption of the second application program Data arrange application locks to the first application program, so as to realize that the first application program is encrypted.For example, if second applies journey The encryption data of sequence is def123, then def123 is arranged into application locks to the first application program as encryption data.
With reference to Fig. 3, show the application a kind of terminal application program encryption method embodiment 3 the step of flow chart, Specifically may include steps of:
Step 301, when the first application program installation, judges in the encryption information table of terminal with the presence or absence of described the The first encryption data of one application program.
In the embodiment of the present application, user can configure application locks using encryption data to the first application program.Arrange After first application program of application locks is unloaded, terminal still stores the encryption of the application locks of the first application program Data.When the first application program installation again, terminal can find the first encryption data of the first application program.
Application locks are a kind of cipher modes to application program.When user start be provided with application program application During program, terminal generates checking interface, and user needs that in checking interface input encryption data application program could be started.
Encryption data can store encryption information table in the terminal.When the first application program installation, terminal exists Search whether that there is the first encryption data of the first application program in encryption information table.
The encryption data can include:Character string information (for example, abc123), finger print information (the fingerprint letter of user Breath), touch track information (in the touch track of terminal screen input), the touch pressure information (pressure of pressing terminal screen Value).
Step 302, if there is the first encryption data of first application program, using the first encryption data pin First application program is encrypted.
If the first encryption data with the first application program in terminal, again should to first using first encryption data With program, application locks are set.
Step 303, when there is no the first encryption data of first application program in terminal, what receive user was submitted to Cryptographic operation, and extract encryption data from the cryptographic operation;
If not having the first encryption data of the first application program in terminal, illustrate formerly not to the first application program Application locks were set.The first application program to being formerly not provided with application locks, terminal can be with receive user pin The cryptographic operation that first application program is submitted to, and extraction encryption data is encrypted to the first application program from cryptographic operation Process.
Step 304, the encryption data is added in the encryption information table for first application program.
The encryption data of application program recorded in encryption information table.So as to when the first application program is installed again, Encryption data can be extracted from encryption information table to be encrypted the first application program.
With reference to Fig. 4, show the application a kind of terminal application program encryption method embodiment 4 the step of flow chart, Specifically may include steps of:
Step 401, when the first application program installation, judges in the encryption information table of terminal with the presence or absence of described the The first encryption data of one application program.
In the embodiment of the present application, user can configure application locks using encryption data to the first application program.Arrange After first application program of application locks is unloaded, terminal still stores the encryption of the application locks of the first application program Data.When the first application program installation again, terminal can find the first encryption data of the first application program.
Application locks are a kind of cipher modes to application program.When user start be provided with application program application During program, terminal generates checking interface, and user needs that in checking interface input encryption data application program could be started.
Encryption data can store encryption information table in the terminal.When the first application program installation, terminal exists Search whether that there is the first encryption data of the first application program in encryption information table.
The encryption data can include:Character string information (for example, abc123), finger print information (the fingerprint letter of user Breath), touch track information (in the touch track of terminal screen input), the touch pressure information (pressure of pressing terminal screen Value).
Step 402, if there is the first encryption data of first application program, using the first encryption data pin First application program is encrypted.
If the first encryption data with the first application program in terminal, again should to first using first encryption data With program, application locks are set.
Step 403, receives the cancellation cryptographic operation submitted to;
The cancellation cryptographic operation of first application program submission of the terminal receive user for having encrypted.Grasp according to encryption is cancelled Make, delete the encryption data of the first application program, namely the application locks for removing the first application program.
Step 404, according to the cancellation cryptographic operation, deletes in the encryption information table for first application program Except existing encryption data.
Terminal deletes the encryption data for cancelling the first application program that cryptographic operation is specified in encryption information table.This In application embodiment, user can actively delete in encryption information table and answer the first encryption data for using program.Journey is applied when first Sequence is unloaded, and after reinstalling, terminal will not be encrypted again to first application program.
With reference to Fig. 5, show the application a kind of terminal application program encryption method embodiment 5 the step of flow chart, Specifically may include steps of:
Step 501, when the first application program installation, judges in the encryption information table of terminal with the presence or absence of described the The first encryption data of one application program.
In the embodiment of the present application, user can configure application locks using encryption data to the first application program.Arrange After first application program of application locks is unloaded, terminal still stores the encryption of the application locks of the first application program Data.When the first application program installation again, terminal can find the first encryption data of the first application program.
Application locks are a kind of cipher modes to application program.When user start be provided with application program application During program, terminal generates checking interface, and user needs that in checking interface input encryption data application program could be started.
Encryption data can store encryption information table in the terminal.When the first application program installation, terminal exists Search whether that there is the first encryption data of the first application program in encryption information table.
The encryption data can include:Character string information (for example, abc123), finger print information (the fingerprint letter of user Breath), touch track information (in the touch track of terminal screen input), the touch pressure information (pressure of pressing terminal screen Value).
Step 502, if there is the first encryption data of first application program, using the first encryption data pin First application program is encrypted.
If the first encryption data with the first application program in terminal, again should to first using first encryption data With program, application locks are set.
Step 503, when the first application program unloaded time preset time threshold is exceeded, in described plus secret letter Existing encryption data is deleted in breath table for first application program.
After the first application program with application locks is unloaded, terminal detect the first application program it is unloaded when Between whether exceed preset time threshold.If exceeding preset time threshold, the first application program is deleted in encryption information table Encryption data.When the first application program is unloaded, after reinstalling, terminal will not be encrypted again to the first application program.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it to be all expressed as a series of action group Close, but those skilled in the art should know, and the embodiment of the present application is not limited by described sequence of movement, because according to According to the embodiment of the present application, some steps can adopt other orders or while carry out.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, involved action not necessarily the application is implemented Example is necessary.
With reference to Fig. 6, a kind of structured flowchart of the application program encryption device embodiment 1 of terminal of the application is shown, had Body can be included such as lower module:
First judge module 601, for when the first application program installation, judging in terminal with the presence or absence of described the The first encryption data of one application program;
First encrypting module 602, if for the first encryption data that there is first application program, using it is described First encryption data is encrypted for first application program.
In the embodiment of the present application, encryption data storage encryption information table in the terminal.
In the embodiment of the present application, when encryption data is added to the first application program, terminal can store encryption data. After one application program is unloaded, terminal still retains encryption data.When detecting the first application program and installing again, then adopt The encryption data of the first reservation of the first application program is encrypted to the first application program.That is it is provided with application program After first application program of lock is unloaded, terminal still stores the encryption data of application locks.Apply when installing first again During program, the encryption data of the application locks before terminal employing arranges application locks to the first application program, so as to protect Demonstrate,prove the security of the first application program.
With reference to Fig. 7, a kind of structured flowchart of the application program encryption device embodiment 2 of terminal of the application is shown, had Body can be included such as lower module:
First judge module 701, for when the first application program installation, judging in terminal with the presence or absence of described the The first encryption data of one application program;
First encrypting module 702, if for the first encryption data that there is first application program, using it is described First encryption data is encrypted for first application program.
Searching modul 703, if for the first encryption data that there is no first application program, searching and described first Application program has one or more second application programs of same attribute;
Second judge module 704, to judge whether to be configured with encryption data to second application program;
Second encrypting module 705, if for being configured with encryption data to second application program, using described second The encryption data of application program is encrypted to first application program.
In the embodiment of the present application, encryption data storage encryption information table in the terminal.
In the embodiment of the present application, described device can also include:
First operation receiver module, for when there is no the first encryption data of first application program in terminal, The cryptographic operation that receive user is submitted to, and extract encryption data from the cryptographic operation;
Encryption data add module, for adding for first application program addition is described in the encryption information table Ciphertext data.
In the embodiment of the present application, described device can also include:
Second operation receiver module, for receiving the cancellation cryptographic operation submitted to;
First encryption data removing module, for according to the cancellation cryptographic operation, being directed in the encryption information table First application program deletes existing encryption data.
In the embodiment of the present application, described device can also include:
Second encryption data removing module, for exceeding Preset Time threshold when the first application program unloaded time During value, existing encryption data is deleted for first application program in the encryption information table.
In the embodiment of the present application, the encryption data can include:Character string information, finger print information, touch track letter Breath, touch pressure information.
For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, it is related Part is illustrated referring to the part of embodiment of the method.
The embodiment of the present application additionally provides mobile terminal, as shown in fig. 7, for convenience of description, illustrate only and the application The related part of embodiment, particular technique details is not disclosed, and refer to the embodiment of the present application method part.The terminal can be Including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), the arbitrarily terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 8 is illustrated that the block diagram of the part-structure of the mobile phone related to the terminal of the embodiment of the present application offer.With reference to figure 8, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 810, memory 820, input block 830, display unit 840, Sensor 850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880 and The grade part of power supply 890.It will be understood by those skilled in the art that the handset structure illustrated in Fig. 8 does not constitute the restriction to mobile phone, Part more more or less of than diagram can be included, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 8:
RF circuits 810 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, process to processor 880;In addition, up data is activation will be designed to base station.Generally, RF circuits 810 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 810 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can be using arbitrary communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 820 can be used to store software program and module, and processor 880 is stored in memory 820 by operation Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 820 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone Data (such as voice data, phone directory etc.) etc..Additionally, memory 820 can include high-speed random access memory, can be with Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states Part.
Input block 830 can be used for the numeral or character information of receives input, and produce with the user of mobile phone arrange with And the key signals input that function control is relevant.Specifically, input block 830 may include that contact panel 831 and other inputs set Standby 832.Contact panel 831, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user uses The operation of any suitable object such as finger, stylus or annex on contact panel 831 or near contact panel 831), and root Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 831 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 880, and the order sent of receiving processor 880 and can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 831.Except contact panel 831, input Unit 830 can also include other input equipments 832.Specifically, other input equipments 832 can include but is not limited to secondary or physical bond One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 840 can be used for show by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 840 may include display floater 841, optionally, can adopt liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 841.Further, contact panel 831 can cover display floater 841, when contact panel 831 detect it is thereon or attached After near touch operation, processor 880 is sent to determine the type of touch event, with preprocessor 880 according to touch event Type corresponding visual output is provided on display floater 841.Although in fig. 8, contact panel 831 and display floater 841 Be as two independent parts realizing input and the input function of mobile phone, but in some embodiments it is possible to by touch-control Panel 831 and display floater 841 be integrated and input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjusting the brightness of display floater 841, proximity transducer can close display floater 841 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of accelerometer sensor Size, size and the direction of gravity is can detect that when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be described here.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data for receiving conversion can be transferred to loudspeaker 861 by road 860, and by loudspeaker 861 sound is converted to Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860 Be changed to voice data, then after voice data output processor 880 is processed, Jing RF circuits 810 to be sent to such as another mobile phone, Or voice data is exported to memory 820 so as to further process.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 870 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 8 shows WiFi module 870, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 880 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module that are stored in memory 820, and call and be stored in memory 820 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 880 can be wrapped Include one or more processing units;Preferably, processor 880 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated in processor 880.
Mobile phone also includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system is logically contiguous with processor 880, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be described here.
In the embodiment of the present application, the processor 880 included by the terminal also has following functions:
When the first application program installation, judge in terminal with the presence or absence of the first encryption of first application program Data;
If there is the first encryption data of first application program, using the first encryption data for described the One application program is encrypted.
Processor 880 included by the terminal also has following functions:
If there is no the first encryption data of first application program, lookup has same with first application program One or more second application programs of attribute;
Judge whether to be configured with encryption data to second application program;
If so, then using the encryption data of second application program first application program is encrypted.
Processor 880 included by the terminal also has following functions:
When there is no the first encryption data of first application program in terminal, the encryption behaviour that receive user is submitted to Make, and encryption data is extracted from the cryptographic operation;
Add the encryption data for first application program in the encryption information table.
Processor 880 included by the terminal also has following functions:
Receive the cancellation cryptographic operation submitted to;
According to the cancellation cryptographic operation, delete existing for first application program in the encryption information table Encryption data.
Processor 880 included by the terminal also has following functions:
When the first application program unloaded time preset time threshold is exceeded, the pin in the encryption information table Existing encryption data is deleted to first application program.
Each embodiment in this specification is described by the way of progressive, what each embodiment was stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.
Those skilled in the art are it should be appreciated that the embodiment of the embodiment of the present application can be provided as method, device or calculate Machine program product.Therefore, the embodiment of the present application can using complete hardware embodiment, complete software embodiment or with reference to software and The form of the embodiment of hardware aspect.And, the embodiment of the present application can using wherein include computer at one or more can With in the computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of program code The form of the computer program of enforcement.
The embodiment of the present application is with reference to the method according to the embodiment of the present application, terminal device (system) and computer program The flow chart and/or block diagram of product is describing.It should be understood that can be by computer program instructions flowchart and/or block diagram In each flow process and/or square frame and flow chart and/or the flow process in block diagram and/or square frame combination.These can be provided Computer program instructions to all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing terminals set Standby processor is producing a machine so that held by the processor of computer or other programmable data processing terminal equipments Capable instruction is produced for realizing in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames The device of the function of specifying.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing terminal equipments In the computer-readable memory for working in a specific way so that the instruction being stored in the computer-readable memory produces bag The manufacture of command device is included, the command device is realized in one side of one flow process of flow chart or multiple flow processs and/or block diagram The function of specifying in frame or multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing terminal equipments so that On computer or other programmable terminal equipments perform series of operation steps to produce computer implemented process, so as to The instruction performed on computer or other programmable terminal equipments is provided for realizing in one flow process of flow chart or multiple flow processs And/or specify in one square frame of block diagram or multiple square frames function the step of.
Although having been described for the preferred embodiment of the embodiment of the present application, those skilled in the art once know base This creative concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to Including preferred embodiment and fall into having altered and changing for the embodiment of the present application scope.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.And, term " including ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that a series of process, method, article or terminal device including key elements is not only wrapped Those key elements are included, but also including other key elements being not expressly set out, or also include for this process, method, article Or the key element that terminal device is intrinsic.In the absence of more restrictions, by wanting that sentence "including a ..." is limited Element, it is not excluded that also there is other identical element in the process including the key element, method, article or terminal device.
Application program encryption method above to a kind of terminal provided herein, a kind of encryption of the application program of terminal Device and a kind of mobile terminal, are described in detail, principle and embodiment party of the specific case to the application used herein Formula is set forth, and the explanation of above example is only intended to help and understands the present processes and its core concept;Meanwhile, it is right In one of ordinary skill in the art, according to the thought of the application, change is had in specific embodiments and applications Part, in sum, this specification content should not be construed as the restriction to the application.
The embodiment of the present application discloses the application program encryption method of A1, a kind of terminal, including:
When the first application program installation, judge in terminal with the presence or absence of the first encryption of first application program Data;
If there is the first encryption data of first application program, using the first encryption data for described the One application program is encrypted.
A2, the method as described in A1, the application program has attribute;Described method also includes:
If there is no the first encryption data of first application program, lookup has same with first application program One or more second application programs of attribute;
Judge whether to be configured with encryption data to second application program;
If so, then using the encryption data of second application program first application program is encrypted.
A3, the method as described in A1, encryption data storage encryption information table in the terminal.
A4, the method as described in A3, also include:
When there is no the first encryption data of first application program in terminal, the encryption behaviour that receive user is submitted to Make, and encryption data is extracted from the cryptographic operation;
Add the encryption data for first application program in the encryption information table.
A5, the method as described in A3, also include:
Receive the cancellation cryptographic operation submitted to;
According to the cancellation cryptographic operation, delete existing for first application program in the encryption information table Encryption data.
A6, the method as described in A3, also include:
When the first application program unloaded time preset time threshold is exceeded, the pin in the encryption information table Existing encryption data is deleted to first application program.
A7, the method as described in A1, the encryption data includes:Character string information, finger print information, touch track information, At least one in touch pressure information.
The embodiment of the present application also discloses the application program encryption device of B8, a kind of terminal, including:
First judge module, for when the first application program installation, judging to whether there is described first in terminal The first encryption data of application program;
First encrypting module, if for the first encryption data that there is first application program, using described first Encryption data is encrypted for first application program.
B9, the device as described in B8, the application program has attribute;Described device also includes:
Searching modul, if for the first encryption data that there is no first application program, searching should with described first There are one or more second application programs of same attribute with program;
Second judge module, to judge whether to be configured with encryption data to second application program;
Second encrypting module, if for being configured with encryption data to second application program, should using described second First application program is encrypted with the encryption data of program.
B10, the device as described in B8, encryption data storage encryption information table in the terminal.
B11, the device as described in B10, also include:
First operation receiver module, for when there is no the first encryption data of first application program in terminal, The cryptographic operation that receive user is submitted to, and extract encryption data from the cryptographic operation;
Encryption data add module, for adding for first application program addition is described in the encryption information table Ciphertext data.
B12, the device as described in B10, also include:
Second operation receiver module, for receiving the cancellation cryptographic operation submitted to;
First encryption data removing module, for according to the cancellation cryptographic operation, being directed in the encryption information table First application program deletes existing encryption data.
B13, the device as described in B10, also include:
Second encryption data removing module, for exceeding Preset Time threshold when the first application program unloaded time During value, existing encryption data is deleted for first application program in the encryption information table.
B14, the device as described in B8, the encryption data includes:Character string information, finger print information, touch track information, At least one in touch pressure information.
The embodiment of the present application also discloses C15, a kind of mobile terminal, including processor and memory,
The memory is used for the program of the application program encryption method of the terminal described in storage execution A1 to A7;
The processor is configurable for performing the program stored in the memory.

Claims (10)

1. the application program encryption method of a kind of terminal, it is characterised in that include:
When the first application program installation, judge in terminal with the presence or absence of the first encryption number of first application program According to;
If there is the first encryption data of first application program, should for described first using the first encryption data It is encrypted with program.
2. method according to claim 1, it is characterised in that the application program has attribute;Described method is also wrapped Include:
If there is no the first encryption data of first application program, lookup has same attribute with first application program One or more second application programs;
Judge whether to be configured with encryption data to second application program;
If so, then using the encryption data of second application program first application program is encrypted.
3. method according to claim 1, it is characterised in that encryption data storage encryption information in the terminal Table.
4. method according to claim 3, it is characterised in that also include:
When there is no the first encryption data of first application program in terminal, the cryptographic operation that receive user is submitted to, and Encryption data is extracted from the cryptographic operation;
Add the encryption data for first application program in the encryption information table.
5. method according to claim 3, it is characterised in that also include:
Receive the cancellation cryptographic operation submitted to;
According to the cancellation cryptographic operation, existing encryption is deleted for first application program in the encryption information table Data.
6. method according to claim 3, it is characterised in that also include:
When the first application program unloaded time preset time threshold is exceeded, institute is directed in the encryption information table State the first application program and delete existing encryption data.
7. method according to claim 1, it is characterised in that the encryption data includes:Character string information, fingerprint letter At least one in breath, touch track information, touch pressure information.
8. the application program encryption device of a kind of terminal, it is characterised in that include:
First judge module, for when the first application program installation, judging in terminal with the presence or absence of the described first application The first encryption data of program;
First encrypting module, if for the first encryption data that there is first application program, using the first encryption Data are encrypted for first application program.
9. device according to claim 8, it is characterised in that the application program has attribute;Described device is also wrapped Include:
Searching modul, if for the first encryption data that there is no first application program, lookup applies journey with described first Sequence has one or more second application programs of same attribute;
Second judge module, to judge whether to be configured with encryption data to second application program;
Second encrypting module, if for being configured with encryption data to second application program, using described second journey is applied The encryption data of sequence is encrypted to first application program.
10. a kind of mobile terminal, it is characterised in that including processor and memory,
The memory is used to store the program of right of execution 1 to the application program encryption method of the terminal described in power 7;
The processor is configurable for performing the program stored in the memory.
CN201710005464.5A 2017-01-04 2017-01-04 Application encryption method and apparatus for terminal, and mobile terminal Pending CN106650419A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710005464.5A CN106650419A (en) 2017-01-04 2017-01-04 Application encryption method and apparatus for terminal, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710005464.5A CN106650419A (en) 2017-01-04 2017-01-04 Application encryption method and apparatus for terminal, and mobile terminal

Publications (1)

Publication Number Publication Date
CN106650419A true CN106650419A (en) 2017-05-10

Family

ID=58842540

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710005464.5A Pending CN106650419A (en) 2017-01-04 2017-01-04 Application encryption method and apparatus for terminal, and mobile terminal

Country Status (1)

Country Link
CN (1) CN106650419A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960914A (en) * 2017-12-26 2019-07-02 航天信息股份有限公司 A kind of verification method and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090204648A1 (en) * 2008-02-11 2009-08-13 Steven Francie Best Tracking metadata for files to automate selective backup of applications and their associated data
CN101661545A (en) * 2009-09-22 2010-03-03 江汉大学 Anti-pirate method and device for software capable of unloading and reinstalling
CN103763181A (en) * 2014-01-24 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Automatic attribute setting device and method
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN105677513A (en) * 2016-01-04 2016-06-15 北京小米移动软件有限公司 Method and device for restoring backup data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090204648A1 (en) * 2008-02-11 2009-08-13 Steven Francie Best Tracking metadata for files to automate selective backup of applications and their associated data
CN101661545A (en) * 2009-09-22 2010-03-03 江汉大学 Anti-pirate method and device for software capable of unloading and reinstalling
CN103763181A (en) * 2014-01-24 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Automatic attribute setting device and method
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN105677513A (en) * 2016-01-04 2016-06-15 北京小米移动软件有限公司 Method and device for restoring backup data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960914A (en) * 2017-12-26 2019-07-02 航天信息股份有限公司 A kind of verification method and equipment

Similar Documents

Publication Publication Date Title
CN103616981B (en) application processing method, device and mobile terminal
CN104424431B (en) A kind of method and device resetting virtual machine user modification logging
CN104978115A (en) Content display method and device
CN105912919B (en) A kind of unlocked by fingerprint method and terminal
CN106921791A (en) The storage and inspection method of a kind of multimedia file, device and mobile terminal
CN106341809B (en) A kind of data transmission method and equipment
CN106550361B (en) Data transmission method, equipment and computer readable storage medium
CN104134043B (en) Content is hidden, separates method, device and the terminal hidden
CN107590397A (en) A kind of method and apparatus for showing embedded webpage
CN106658354A (en) Data transmission method and equipment
CN107219951A (en) Touch screen control method, device, storage medium and terminal device
CN105045372A (en) Method and equipment controlling wearable device
CN103246847B (en) A kind of method and apparatus of macrovirus killing
CN106936516A (en) Display screen dispaly state control method, storage medium and terminal
CN106909854A (en) Picture management method, device and mobile terminal
CN106817489A (en) The reminding method and mobile terminal of message
CN106874045A (en) A kind of startup method of application program, device and mobile terminal
CN105553718A (en) Method and device for displaying guidance information
CN106970761A (en) Control method and device for the electronic installation with full frame fingerprint recognition
CN104239752A (en) Method and apparatus for protecting private information during using of browser
CN107450810A (en) operation processing method and device
CN106055615A (en) Method, device and system for obtaining music information
CN106650419A (en) Application encryption method and apparatus for terminal, and mobile terminal
CN109242493A (en) A kind of method of payment and device based on block chain
CN105260219B (en) A kind of method for downloading software and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170808

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510