CN106709322A - Application encryption method and apparatus, and mobile terminal - Google Patents

Application encryption method and apparatus, and mobile terminal Download PDF

Info

Publication number
CN106709322A
CN106709322A CN201710005463.0A CN201710005463A CN106709322A CN 106709322 A CN106709322 A CN 106709322A CN 201710005463 A CN201710005463 A CN 201710005463A CN 106709322 A CN106709322 A CN 106709322A
Authority
CN
China
Prior art keywords
application program
encryption
encryption data
application
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710005463.0A
Other languages
Chinese (zh)
Inventor
崔博涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710005463.0A priority Critical patent/CN106709322A/en
Publication of CN106709322A publication Critical patent/CN106709322A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Stored Programmes (AREA)

Abstract

Embodiments of the invention provide an application encryption method and apparatus, and a mobile terminal. An application has attributes. The method comprises the steps of judging whether a first application is configured with first encrypted data or not; if yes, searching for one or more second applications with the same attributes as the first application; judging whether the second applications are configured with second encrypted data or not; and if not, performing encryption processing on the second applications. When the terminal configures the first encrypted data for the first application, the second applications with the same attributes as the first application are subjected to the encryption processing. Therefore, a user is assisted to encrypt the applications in the terminal more comprehensively, and the application security is improved.

Description

A kind of encryption method of application program, device and mobile terminal
Technical field
The application is related to field of terminal technology, more particularly to a kind of encryption method of application program, a kind of application program Encryption device and a kind of mobile terminal.
Background technology
With the development of mobile terminal, the function of the application program in mobile terminal is more and more.Wherein it is no lack of some to relate to And the application program of privacy of user, personal property.
In order to increase the security of application program, password can be added to application program using application locks.Using journey Sequence lock is a kind of application program protected to application program addition password.There is provided the application program of application locks needs Can be just opened after the correct password of user input.
At present, the mode that application program sets application locks is mainly:Need to set application program by user is selected The application program of lock, terminal sets to application program lock again.Often it is mounted with substantial amounts of application program due to terminal, and user May forget to set some important application programs (for example, being related to the application program of privacy of user, personal property) and apply Procedure lock so that these application programs cannot be effectively protected.
The content of the invention
In view of the above problems, it is proposed that the embodiment of the present application overcomes above mentioned problem or at least in part to provide one kind A kind of encryption method of the application program for solving the above problems, a kind of encryption device of application program and a kind of mobile terminal.
In order to solve the above problems, the embodiment of the present application discloses a kind of encryption method of application program, wherein, it is described to answer There is attribute with program;Described method includes:
Judge whether to be configured with the first encryption data to the first application program;
If so, then searching one or more second application programs that there is same attribute with first application program;
Judge whether to be configured with the second encryption data to second application program;
If it is not, being then encrypted to second application program.
Preferably, it is described to include the step of be encrypted to second application program:
First encryption data is added for second application program.
Preferably, it is described to include the step of be encrypted to second application program:
Encryption prompt message of the generation for second application program;
Receive the second encryption data returned for the encryption prompt message;
Second encryption data is added for second application program.
Preferably, it is described to judge whether that the step of being configured with the first encryption data to the first application program includes:
When first application program is activated, judge whether to be configured with first first to first application program Encryption data;
Or,
When the first application program installation, judge whether to be configured with first application program first One encryption data.
Preferably, encryption data storage encryption information table in the terminal.
Preferably, also include:
After being encrypted to second application program, corresponding encryption data is added to the encryption information In table.
The embodiment of the present application also discloses a kind of encryption method of application program, wherein, the application program has attribute; Described method includes:
Judge whether to be configured with the first encryption data to the first application program;
If it is not, then searching one or more second application programs that there is same attribute with first application program;
Judge whether to be configured with the second encryption data to second application program;
If so, being then encrypted to first application program.
Preferably, it is described to include the step of be encrypted to first application program:
Second encryption data is added for first application program.
Preferably, it is described to include the step of be encrypted to first application program:
Encryption prompt message of the generation for first application program;
Receive the first encryption data returned for the encryption prompt message;
First encryption data is added for first application program.
Preferably, it is described to judge whether that the step of being configured with the first encryption data to the first application program includes:
When first application program is activated, judge whether to be configured with first first to first application program Encryption data;
Or,
When the first application program installation, judge whether to be configured with first application program first One encryption data.
Preferably, encryption data storage encryption information table in the terminal.
Preferably, also include:
After being encrypted to first application program, corresponding encryption data is added to the encryption information In table.
The embodiment of the present application also discloses a kind of encryption method of application program, wherein, the application program has attribute; Described method includes:
When the first encryption data is configured to the first application program, lookup has same attribute with first application program One or more second application programs;
Judge whether to be configured with the second encryption data to second application program;
If it is not, being then encrypted to second application program.
Preferably, it is described to include the step of be encrypted to second application program:
First encryption data is added for second application program.
Preferably, it is described to include the step of be encrypted to second application program:
Encryption prompt message of the generation for second application program;
Receive the second encryption data returned for the encryption prompt message;
Second encryption data is added for second application program.
Preferably, encryption data storage encryption information table in the terminal.
Preferably, also include:
After being encrypted to second application program, corresponding encryption data is added to the encryption information In table.
The embodiment of the present application also discloses a kind of encryption device of application program, wherein, the application program has attribute; Described device includes:
First configuration determination module, for judging whether to be configured with the first encryption data to the first application program;
First searching modul, if for being configured with the first encryption data to the first application program, searching and described first Application program has one or more second application programs of same attribute;
Second configuration determination module, for judging whether to be configured with the second encryption data to second application program;
First encryption processing module, if for not being configured with the second encryption data to second application program, to institute The second application program is stated to be encrypted.
Preferably, first encryption processing module includes:
First encryption data adds submodule, for adding first encryption data for second application program.
Preferably, first encryption processing module includes:
Prompting generation submodule, for generating the encryption prompt message for second application program;
Encryption data returns to submodule, for receiving the second encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding second encryption data for second application program.
Preferably, the first configuration determination module includes:
Start judging submodule, for when first application program is activated, judging whether to be applied to described first Program is configured with the first first encryption data;
Or,
Judging submodule is installed, for when the first application program installation, judge whether should to described first The first first encryption data is configured with program.
Preferably, encryption data storage encryption information table in the terminal.
Preferably, also include:
First encryption data logging modle, for after being encrypted to second application program, by accordingly Encryption data is added in the encryption information table.
The embodiment of the present application also discloses a kind of encryption device of application program, wherein, the application program has attribute; Described device includes:
3rd configuration determination module, for judging whether to be configured with the first encryption data to the first application program;
Second searching modul, if for not being configured with the first encryption data to the first application program, searching and described One application program has one or more second application programs of same attribute;
4th configuration determination module, for judging whether to be configured with the second encryption data to second application program;
Second encryption processing module, if for being configured with the second encryption data to second application program, to described First application program is encrypted.
Preferably, second encryption processing module includes:
First encryption data adds submodule, for adding second encryption data for first application program.
Preferably, second encryption processing module includes:
Prompting generation submodule, for generating the encryption prompt message for first application program;
Encryption data returns to submodule, for receiving the first encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding first encryption data for first application program.
Preferably, the 3rd configuration determination module includes:
Start judging submodule, for when first application program is activated, judging whether to be applied to described first Program is configured with the first first encryption data;
Or,
Judging submodule is installed, for when the first application program installation, judge whether should to described first The first first encryption data is configured with program.
Preferably, encryption data storage encryption information table in the terminal.
Preferably, also include:
Second encryption data logging modle, for after being encrypted to first application program, by accordingly Encryption data is added in the encryption information table.
The embodiment of the present application also discloses a kind of encryption device of application program, wherein, the application program has attribute; Described device includes:
3rd searching modul, should with described first for when the first encryption data is configured to the first application program, searching There are one or more second application programs of same attribute with program;
5th configuration determination module, for judging whether to be configured with the second encryption data to second application program;
3rd encryption processing module, if for not being configured with the second encryption data to second application program, to institute The second application program is stated to be encrypted.
Preferably, the 3rd encryption processing module includes:
First encryption data adds submodule, for adding first encryption data for second application program.
Preferably, the 3rd encryption processing module includes:
Prompting generation submodule, for generating the encryption prompt message for second application program;
Encryption data returns to submodule, for receiving the second encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding second encryption data for second application program.
Preferably, encryption data storage encryption information table in the terminal.
Preferably, also include:
3rd encryption data logging modle, for after being encrypted to second application program, by accordingly Encryption data is added in the encryption information table.
The embodiment of the present application also discloses a kind of mobile terminal, including processor and memory,
The memory is used to store the program of the encryption method of the application program described in performing;
The processor is configurable for performing the program stored in the memory.
The embodiment of the present application includes advantages below:
In the embodiment of the present application, terminal is according to the configured application program of encryption data (there is provided application locks Application program) attribute, the other application programs to belonging to the attribute are encrypted.
When the application program of terminal-pair first is configured with the first encryption data, to the attribute phase of attribute and the first application program The second same application program is encrypted.So as to help user more fully to be encrypted to the application program in terminal, improve The security of application program.
Brief description of the drawings
The step of Fig. 1 is a kind of encryption method embodiment 1 of application program of the application flow chart;
The step of Fig. 2 is a kind of encryption method embodiment 2 of application program of the application flow chart;
The step of Fig. 3 is a kind of encryption method embodiment 3 of application program of the application flow chart;
Fig. 4 is a kind of structured flowchart of the encryption device embodiment 1 of application program of the application;
Fig. 5 is a kind of structured flowchart of the encryption device embodiment 2 of application program of the application;
Fig. 6 is a kind of structured flowchart of the encryption device embodiment 3 of application program of the application;
Fig. 7 is the block diagram of the part-structure of the mobile phone related to the terminal of the embodiment of the present application offer;
Fig. 8 is the block diagram of the part-structure of the mobile phone related to the terminal of the embodiment of the present application offer;
Fig. 9 is the block diagram of the part-structure of the mobile phone related to the terminal of the embodiment of the present application offer.
Specific embodiment
It is below in conjunction with the accompanying drawings and specific real to enable above-mentioned purpose, the feature and advantage of the application more obvious understandable Mode is applied to be described in further detail the application.
One of core idea of the embodiment of the present application is, category of the terminal according to the application program of configured encryption data Property, the other application programs to belonging to the attribute are encrypted.
Reference picture 1, show the application a kind of application program encryption method embodiment 1 the step of flow chart, wherein The application program has attribute;Methods described specifically may include steps of:
Step 101, judges whether to be configured with the first encryption data to the first application program;
In the embodiment of the present application, user can configure application locks using the first encryption data to the first application program. When user needs to start the first application program, terminal generation checking interface.User needs to be encrypted in checking interface input first Data could start the first application program.
In the embodiment of the present application, can judge whether to match somebody with somebody the first application program when the first application program is activated It is equipped with the first first encryption data.Can also, in the first application program installation, judge whether to apply journey to first Sequence is configured with the first first encryption data.
Step 102, if being configured with the first encryption data to the first application program, searches and has with first application program There are one or more second application programs of same attribute;
The attribute of application program can be a kind of classification information.For example, being divided by the function of application program.Taobao should With program, Jingdone district store application program, their function is all shopping, then their attribute is shopping class.Wechat application program, QQ application programs, their function is all communication, then their attribute is communication class.
If being configured with the first encryption data (i.e. the first application program is provided with application locks) to the first application program, Search the second application program of the attribute with the first application program.
Step 103, judges whether to be configured with the second encryption data to second application program;
Refer to the second application program to be provided with using encryption data applies journey to the second application program configuration encryption data Sequence is locked.
When the second application program of the attribute with the first application program is found, judge whether using encryption data pair Second application program is provided with application locks.
Step 104, if not being configured with the second encryption data to second application program, to second application program It is encrypted.
It is right if not configuring the second encryption data (the second application program is not provided with application locks) to the second application program Second application program is encrypted.
In a kind of example of the embodiment of the present application, it is described can the step of be encrypted to second application program To include:Encryption prompt message of the generation for second application program;Receive what is returned for the encryption prompt message Second encryption data;Second encryption data is added for second application program.
When terminal is detected does not configure the second encryption data to the second application program, generation encryption prompt message informs use Family the second application program unencryption.User actively submits to the second encryption data to answer second after encryption prompting message is seen It is encrypted with program.Wherein, first the second encryption data of encryption data can be with identical.
For example, if user is when Taobao's application program is started, Jingdone district store application program determined in terminal has been set Application locks, then point out user to set application locks to Taobao's application program.Terminal receives the password number that user submits to According to Taobao's application program, application locks are set.
It is described the step of be encrypted to second application program in another example of the embodiment of the present application Can include:First encryption data is added for second application program.
When terminal is detected does not configure the second encryption data to the second application program, terminal can be applied using Taobao automatically First encryption data of program is encrypted to the second application program.If for example, the first encryption data of Taobao's application program is 123456, then 123456 are set to the second encryption data for Jingdone district store application program.When user needs to start Jingdone district , it is necessary to being input into 123456 could start Jingdone district store application program during the application program of store.
In the embodiment of the present application, encryption data storage encryption information table in the terminal.When terminal is detected not to Two application programs configure the second encryption data when, terminal is extracted from encryption information table can the first application program first encrypt number According to, and the second application program is encrypted using the first encryption data.
After being encrypted to the second application program, corresponding encryption data is added to encryption information table by terminal In.So that when attribute identical application program is detected, extraction encryption data is carried out to application program from encryption information table Encryption.
In the embodiment of the present application, terminal is according to the configured application program of encryption data (there is provided application locks Application program) attribute, the other application programs to belonging to the attribute are encrypted.
Such as, when the application program of terminal-pair first is configured with the first encryption data, lookup has phase with the first application program With the second application program of attribute;If not being configured with the second encryption data to the second application program, the second application program is carried out Encryption.So as to help user more fully to be encrypted to the application program in terminal, the security of application program is improved.
Reference picture 2, show the application a kind of application program encryption method embodiment 2 the step of flow chart, wherein The application program has attribute;Methods described specifically may include steps of:
Step 201, judges whether to be configured with the first encryption data to the first application program;
In the embodiment of the present application, user can configure application locks using the first encryption data to the first application program. When user needs to start the first application program, terminal generation checking interface.User needs to be encrypted in checking interface input first Data could start the first application program.
In the embodiment of the present application, can judge whether to match somebody with somebody the first application program when the first application program is activated It is equipped with the first first encryption data.Can also, in the first application program installation, judge whether to apply journey to first Sequence is configured with the first first encryption data.
Step 202, if not being configured with the first encryption data to the first application program, searches and first application program One or more second application programs with same attribute;
If the first encryption data, i.e. the first application program are not configured with to the first application program is not provided with application locks, Then search the second application program of the attribute with the first application program.
Step 203, judges whether to be configured with the second encryption data to second application program;
Whether terminal judges are configured with the second encryption data to the second application program, that is, judge whether the second application program sets It is equipped with application locks.
Step 204, if being configured with the second encryption data to second application program, enters to first application program Row encryption.
If being configured with the second encryption data to the second application program, the first application program is encrypted.Even Second application program is provided with application locks, then set application locks to the first application program.
It is described to wrap the step of be encrypted to first application program in a kind of example of the embodiment of the present application Include:Encryption prompt message of the generation for first application program;Receive first returned for the encryption prompt message Encryption data;First encryption data is added for first application program.
When terminal is detected configures the second encryption data to the second application program, generation encryption prompt message informs user The application program of attribute identical second with the first application program has been encrypted, and points out user to be encrypted the first application program. User actively submits to the first encryption data to be encrypted the second application program after encryption prompting message is seen.Wherein, first The encryption data of encryption data second can be with identical.
If for example, user determines the capital in terminal when startup has been provided with Taobao's application program of application locks Eastern store application program is not provided with application locks, then point out user to set application locks to Jingdone district store application program.Eventually The code data that end receives user's submission sets application locks to Jingdone district store application program.
It is described the step of be encrypted to first application program in another example of the embodiment of the present application Including:
Second encryption data is added for first application program.
When terminal is detected does not configure the first encryption data to the first application program, terminal can automatically using the second application Second encryption data of program is encrypted to the first application program.If for example, the second encryption number of Jingdone district store application program According to being 123456, then 123456 are set to the first encryption data for Taobao's application program.When user needs to start Taobao , it is necessary to being input into 123456 could start Taobao's application program during application program.
In the embodiment of the present application, encryption data storage encryption information table in the terminal.When terminal is detected not to One application program configure the first encryption data when, terminal is extracted from encryption information table can the second application program second encrypt number According to, and the first application program is encrypted using the second encryption data.
After being encrypted to the first application program, corresponding encryption data is added to encryption information table by terminal In.So that when attribute identical application program is detected, extraction encryption data is carried out to application program from encryption information table Encryption.
In the embodiment of the present application, terminal is according to the configured application program of encryption data (there is provided application locks Application program) attribute, the other application programs to belonging to the attribute are encrypted.
It is activated when the first application program or during installation, search has the second of same alike result with the first application program Application program, if the application program of terminal-pair second is configured with the second encryption data, is encrypted to the first application program. So as to help user more fully to be encrypted to the application program in terminal, the security of application program is improved.
Reference picture 3, show the application a kind of application program encryption method embodiment 3 the step of flow chart, wherein The application program has attribute;Methods described specifically may include steps of:
Step 301, when the first encryption data is configured to the first application program, lookup has with first application program One or more second application programs of same attribute;
If being configured with the first encryption data (i.e. the first application program is provided with application locks) to the first application program, Search the second application program of the attribute with the first application program.
The attribute of application program can be a kind of classification information.For example, being divided by the function of application program.Taobao should With program, Jingdone district store application program, their function is all shopping, then their attribute is shopping class.Wechat application program, QQ application programs, their function is all communication, then their attribute is communication class.
Step 302, judges whether to be configured with the second encryption data to second application program;
Judge whether to be configured with the second encryption number to the application program of attribute identical second of attribute and the first application program According to (judging whether the second application program is provided with application locks).
Step 303, if not being configured with the second encryption data to second application program, to second application program It is encrypted.
It is right if not configuring the second encryption data (the second application program is not provided with application locks) to the second application program Second application program is encrypted.
In a kind of example of the embodiment of the present application, it is described can the step of be encrypted to second application program To include:Encryption prompt message of the generation for second application program;Receive what is returned for the encryption prompt message Second encryption data;Second encryption data is added for second application program.
When terminal is detected does not configure the second encryption data to the second application program, generation encryption prompt message informs use Family the second application program unencryption.User actively submits to the second encryption data to answer second after encryption prompting message is seen It is encrypted with program.Wherein, first the second encryption data of encryption data can be with identical.
For example, if user is when Taobao's application program is started, Jingdone district store application program determined in terminal has been set Application locks, then point out user to set application locks to Taobao's application program.Terminal receives the password number that user submits to According to Taobao's application program, application locks are set.
It is described the step of be encrypted to second application program in another example of the embodiment of the present application Can include:First encryption data is added for second application program.
When terminal is detected does not configure the second encryption data to the second application program, terminal can be applied using Taobao automatically First encryption data of program is encrypted to the second application program.If for example, the first encryption data of Taobao's application program is 123456, then 123456 are set to the second encryption data for Jingdone district store application program.When user needs to start Jingdone district , it is necessary to being input into 123456 could start Jingdone district store application program during the application program of store.
In the embodiment of the present application, encryption data storage encryption information table in the terminal.When terminal is detected not to Two application programs configure the second encryption data when, terminal is extracted from encryption information table can the first application program first encrypt number According to, and the second application program is encrypted using the first encryption data.
After being encrypted to the second application program, corresponding encryption data is added to encryption information table by terminal In.So that when attribute identical application program is detected, extraction encryption data is carried out to application program from encryption information table Encryption.
In the embodiment of the present application, terminal is according to the configured application program of encryption data (there is provided application locks Application program) attribute, the other application programs to belonging to the attribute are encrypted.
Such as, when the application program of terminal-pair first is configured with the first encryption data, lookup has phase with the first application program With the second application program of attribute;If not being configured with the second encryption data to the second application program, the second application program is carried out Encryption.So as to help user more fully to be encrypted to the application program in terminal, the security of application program is improved.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it to be all expressed as a series of action group Close, but those skilled in the art should know, and the embodiment of the present application is not limited by described sequence of movement, because according to According to the embodiment of the present application, some steps can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, involved action not necessarily the application is implemented Necessary to example.
Reference picture 4, shows a kind of structured flowchart of the encryption device embodiment 1 of application program of the application, wherein, institute Stating application program has attribute, and described device can specifically include such as lower module:
First configuration determination module 401, for judging whether to be configured with the first encryption data to the first application program;
First searching modul 402, if for being configured with the first encryption data to the first application program, searching and described One application program has one or more second application programs of same attribute;
Second configuration determination module 403, for judging whether to be configured with the second encryption data to second application program;
First encryption processing module 404, if for not being configured with the second encryption data to second application program, it is right Second application program is encrypted.
In the embodiment of the present application, first encryption processing module 404 can include:
First encryption data adds submodule, for adding first encryption data for second application program.
In the embodiment of the present application, first encryption processing module 404 can include:
Prompting generation submodule, for generating the encryption prompt message for second application program;
Encryption data returns to submodule, for receiving the second encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding second encryption data for second application program.
In the embodiment of the present application, the first configuration determination module 401 can include:
Start judging submodule, for when first application program is activated, judging whether to be applied to described first Program is configured with the first first encryption data;
Or,
Judging submodule is installed, for when the first application program installation, judge whether should to described first The first first encryption data is configured with program.
In the embodiment of the present application, encryption data storage encryption information table in the terminal.
In the embodiment of the present application, also include:First encryption data logging modle, for when to second application program After being encrypted, corresponding encryption data is added in the encryption information table.
Reference picture 5, shows a kind of structured flowchart of the encryption device embodiment 2 of application program of the application, wherein, institute Stating application program has attribute, and described device can specifically include such as lower module:
3rd configuration determination module 501, for judging whether to be configured with the first encryption data to the first application program;
Second searching modul 502, if for not being configured with the first encryption data to the first application program, search with it is described First application program has one or more second application programs of same attribute;
4th configuration determination module 503, for judging whether to be configured with the second encryption data to second application program;
Second encryption processing module 504, if for being configured with the second encryption data to second application program, to institute The first application program is stated to be encrypted.
In the embodiment of the present application, second encryption processing module 504 can include:
First encryption data adds submodule, for adding second encryption data for first application program.
In the embodiment of the present application, second encryption processing module 504 can include:
Prompting generation submodule, for generating the encryption prompt message for first application program;
Encryption data returns to submodule, for receiving the first encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding first encryption data for first application program.
In the embodiment of the present application, the 3rd configuration determination module 501 can include:
Start judging submodule, for when first application program is activated, judging whether to be applied to described first Program is configured with the first first encryption data;
Or,
Judging submodule is installed, for when the first application program installation, judge whether should to described first The first first encryption data is configured with program.
In the embodiment of the present application, encryption data storage encryption information table in the terminal.
In the embodiment of the present application, also include:Second encryption data logging modle, for when to first application program After being encrypted, corresponding encryption data is added in the encryption information table.
Reference picture 6, shows a kind of structured flowchart of the encryption device embodiment 3 of application program of the application, wherein, institute Stating application program has attribute, and described device can specifically include such as lower module:
3rd searching modul 601, for when the first encryption data is configured to the first application program, searching and described first Application program has one or more second application programs of same attribute;
5th configuration determination module 602, for judging whether to be configured with the second encryption data to second application program;
3rd encryption processing module 603, if for not being configured with the second encryption data to second application program, it is right Second application program is encrypted.
In the embodiment of the present application, the 3rd encryption processing module 603 can include:
First encryption data adds submodule, for adding first encryption data for second application program.
In the embodiment of the present application, the 3rd encryption processing module 603 can include:
Prompting generation submodule, for generating the encryption prompt message for second application program;
Encryption data returns to submodule, for receiving the second encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding second encryption data for second application program.
In the embodiment of the present application, encryption data storage encryption information table in the terminal.
In the embodiment of the present application, also include:3rd encryption data logging modle, for when to second application program After being encrypted, corresponding encryption data is added in the encryption information table.
For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, it is related Part is illustrated referring to the part of embodiment of the method.
The embodiment of the present application additionally provides mobile terminal, as shown in fig. 7, for convenience of description, illustrate only and the application The related part of embodiment, particular technique details is not disclosed, and refer to the embodiment of the present application method part.The terminal can be Including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 7 is illustrated that the block diagram of the part-structure of the mobile phone related to the terminal of the embodiment of the present application offer.With reference to figure 7, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 710, memory 720, input block 730, display unit 740, Sensor 750, voicefrequency circuit 760, Wireless Fidelity (wireless fidelity, WiFi) module 770, processor 780 and The grade part of power supply 790.It will be understood by those skilled in the art that the handset structure shown in Fig. 7 does not constitute the restriction to mobile phone, Part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 7:
RF circuits 710 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, processed to processor 780;In addition, up data is activation will be designed to base station.Generally, RF circuits 710 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 710 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 720 can be used to store software program and module, and processor 780 is by running storage in memory 720 Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 720 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone Data (such as voice data, phone directory etc.) etc..Additionally, memory 720 can include high-speed random access memory, can be with Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states Part.
Input block 730 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 730 may include that contact panel 731 and other inputs set Standby 732.Contact panel 731, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user uses The operation of any suitable object such as finger, stylus or annex on contact panel 731 or near contact panel 731), and root Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 731 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 780, and the order sent of receiving processor 780 and can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 731.Except contact panel 731, input Unit 730 can also include other input equipments 732.Specifically, other input equipments 732 can include but is not limited to secondary or physical bond One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 740 can be used for show by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 740 may include display panel 741, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 741.Further, contact panel 731 can cover display panel 741, when contact panel 731 detect it is thereon or attached After near touch operation, processor 780 is sent to determine the type of touch event, with preprocessor 780 according to touch event Type corresponding visual output is provided on display panel 741.Although in the figure 7, contact panel 731 and display panel 741 It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control Panel 731 and display panel 741 be integrated and input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 750, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 741, proximity transducer can close display panel 741 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of accelerometer sensor Size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 760, loudspeaker 761, microphone 762 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data conversion that road 760 will can receive, is transferred to loudspeaker 761, and sound is converted to by loudspeaker 761 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 762, is turned after being received by voicefrequency circuit 760 It is changed to voice data, then after voice data output processor 780 is processed, through RF circuits 710 to be sent to such as another mobile phone, Or export to memory 720 so as to further treatment voice data.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 770 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 7 shows WiFi module 770, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 780 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform software program of the storage in memory 720 and/or module, and call storage in memory 720 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 780 can be wrapped Include one or more processing units;Preferably, processor 780 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 780.
Mobile phone also includes the power supply 790 (such as battery) powered to all parts, it is preferred that power supply can be by power supply pipe Reason system is logically contiguous with processor 780, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
In the embodiment of the present application, the processor 780 included by the terminal also has following functions:
Judge whether to be configured with the first encryption data to the first application program;
If so, then searching one or more second application programs that there is same attribute with first application program;
Judge whether to be configured with the second encryption data to second application program;
If it is not, being then encrypted to second application program.
Processor 780 included by the terminal also has following functions:
First encryption data is added for second application program.
Processor 780 included by the terminal also has following functions:
Encryption prompt message of the generation for second application program;
Receive the second encryption data returned for the encryption prompt message;
Second encryption data is added for second application program.
Processor 780 included by the terminal also has following functions:
When first application program is activated, judge whether to be configured with first first to first application program Encryption data;
Or,
When the first application program installation, judge whether to be configured with first application program first One encryption data.
Processor 780 included by the terminal also has following functions:
After being encrypted to second application program, corresponding encryption data is added to the encryption information In table.
The embodiment of the present application additionally provides mobile terminal, as shown in figure 8, for convenience of description, illustrate only and the application The related part of embodiment, particular technique details is not disclosed, and refer to the embodiment of the present application method part.The terminal can be Including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 8 is illustrated that the block diagram of the part-structure of the mobile phone related to the terminal of the embodiment of the present application offer.With reference to figure 8, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 810, memory 820, input block 830, display unit 840, Sensor 850, voicefrequency circuit 860, Wireless Fidelity (wireless fidelity, WiFi) module 870, processor 880 and The grade part of power supply 890.It will be understood by those skilled in the art that the handset structure shown in Fig. 8 does not constitute the restriction to mobile phone, Part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 8:
RF circuits 810 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, processed to processor 880;In addition, up data is activation will be designed to base station.Generally, RF circuits 810 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 810 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 820 can be used to store software program and module, and processor 880 is by running storage in memory 820 Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 820 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone Data (such as voice data, phone directory etc.) etc..Additionally, memory 820 can include high-speed random access memory, can be with Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states Part.
Input block 830 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 830 may include that contact panel 831 and other inputs set Standby 832.Contact panel 831, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user uses The operation of any suitable object such as finger, stylus or annex on contact panel 831 or near contact panel 831), and root Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 831 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 880, and the order sent of receiving processor 880 and can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 831.Except contact panel 831, input Unit 830 can also include other input equipments 832.Specifically, other input equipments 832 can include but is not limited to secondary or physical bond One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 840 can be used for show by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 840 may include display panel 841, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 841.Further, contact panel 831 can cover display panel 841, when contact panel 831 detect it is thereon or attached After near touch operation, processor 880 is sent to determine the type of touch event, with preprocessor 880 according to touch event Type corresponding visual output is provided on display panel 841.Although in fig. 8, contact panel 831 and display panel 841 It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control Panel 831 and display panel 841 be integrated and input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 841, proximity transducer can close display panel 841 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of accelerometer sensor Size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data conversion that road 860 will can receive, is transferred to loudspeaker 861, and sound is converted to by loudspeaker 861 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is turned after being received by voicefrequency circuit 860 It is changed to voice data, then after voice data output processor 880 is processed, through RF circuits 810 to be sent to such as another mobile phone, Or export to memory 820 so as to further treatment voice data.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 870 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 8 shows WiFi module 870, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 880 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform software program of the storage in memory 820 and/or module, and call storage in memory 820 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 880 can be wrapped Include one or more processing units;Preferably, processor 880 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile phone also includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can be by power supply pipe Reason system is logically contiguous with processor 880, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
In the embodiment of the present application, the processor 880 included by the terminal also has following functions:
Judge whether to be configured with the first encryption data to the first application program;
If it is not, then searching one or more second application programs that there is same attribute with first application program;
Judge whether to be configured with the second encryption data to second application program;
If so, being then encrypted to first application program.
Processor 880 included by the terminal also has following functions:
Second encryption data is added for first application program.
Processor 880 included by the terminal also has following functions:
Encryption prompt message of the generation for first application program;
Receive the first encryption data returned for the encryption prompt message;
First encryption data is added for first application program.
Processor 880 included by the terminal also has following functions:
When first application program is activated, judge whether to be configured with first first to first application program Encryption data;
Or,
When the first application program installation, judge whether to be configured with first application program first One encryption data.
Processor 880 included by the terminal also has following functions:
After being encrypted to first application program, corresponding encryption data is added to the encryption information In table.
The embodiment of the present application additionally provides mobile terminal, as shown in figure 9, for convenience of description, illustrate only and the application The related part of embodiment, particular technique details is not disclosed, and refer to the embodiment of the present application method part.The terminal can be Including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 9 is illustrated that the block diagram of the part-structure of the mobile phone related to the terminal of the embodiment of the present application offer.With reference to figure 9, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 910, memory 920, input block 930, display unit 940, Sensor 950, voicefrequency circuit 960, Wireless Fidelity (wireless fidelity, WiFi) module 970, processor 980 and The grade part of power supply 990.It will be understood by those skilled in the art that the handset structure shown in Fig. 9 does not constitute the restriction to mobile phone, Part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 9:
RF circuits 910 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, processed to processor 980;In addition, up data is activation will be designed to base station.Generally, RF circuits 910 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 910 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 920 can be used to store software program and module, and processor 980 is by running storage in memory 920 Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 920 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone Data (such as voice data, phone directory etc.) etc..Additionally, memory 920 can include high-speed random access memory, can be with Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states Part.
Input block 930 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 930 may include that contact panel 931 and other inputs set Standby 932.Contact panel 931, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user uses The operation of any suitable object such as finger, stylus or annex on contact panel 931 or near contact panel 931), and root Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 931 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 980, and the order sent of receiving processor 980 and can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 931.Except contact panel 931, input Unit 930 can also include other input equipments 932.Specifically, other input equipments 932 can include but is not limited to secondary or physical bond One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 940 can be used for show by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 940 may include display panel 941, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 941.Further, contact panel 931 can cover display panel 941, when contact panel 931 detect it is thereon or attached After near touch operation, processor 980 is sent to determine the type of touch event, with preprocessor 980 according to touch event Type corresponding visual output is provided on display panel 941.Although in fig .9, contact panel 931 and display panel 941 It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control Panel 931 and display panel 941 be integrated and input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 950, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 941, proximity transducer can close display panel 941 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of accelerometer sensor Size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data conversion that road 960 will can receive, is transferred to loudspeaker 961, and sound is converted to by loudspeaker 961 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is turned after being received by voicefrequency circuit 960 It is changed to voice data, then after voice data output processor 980 is processed, through RF circuits 910 to be sent to such as another mobile phone, Or export to memory 920 so as to further treatment voice data.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 970 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 9 shows WiFi module 970, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 980 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform software program of the storage in memory 920 and/or module, and call storage in memory 920 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 980 can be wrapped Include one or more processing units;Preferably, processor 980 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 980.
Mobile phone also includes the power supply 990 (such as battery) powered to all parts, it is preferred that power supply can be by power supply pipe Reason system is logically contiguous with processor 980, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
In the embodiment of the present application, the processor 980 included by the terminal also has following functions:
When the first encryption data is configured to the first application program, lookup has same attribute with first application program One or more second application programs;
Judge whether to be configured with the second encryption data to second application program;
If it is not, being then encrypted to second application program.
In the embodiment of the present application, the processor 980 included by the terminal also has following functions:
First encryption data is added for second application program.
In the embodiment of the present application, the processor 980 included by the terminal also has following functions:
Encryption prompt message of the generation for second application program;
Receive the second encryption data returned for the encryption prompt message;
Second encryption data is added for second application program.
In the embodiment of the present application, the processor 980 included by the terminal also has following functions:
After being encrypted to second application program, corresponding encryption data is added to the encryption information In table.
Each embodiment in this specification is described by the way of progressive, what each embodiment was stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present application can be provided as method, device or calculate Machine program product.Therefore, the embodiment of the present application can using complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.And, the embodiment of the present application can using wherein include computer at one or more can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present application is with reference to the method according to the embodiment of the present application, terminal device (system) and computer program The flow chart and/or block diagram of product is described.It should be understood that flow chart and/or block diagram can be realized by computer program instructions In each flow and/or flow and/or square frame in square frame and flow chart and/or block diagram combination.These can be provided Computer program instructions set to all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is producing a machine so that held by the processor of computer or other programmable data processing terminal equipments Capable instruction is produced for realizing in one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames The device of the function of specifying.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing terminal equipments In the computer-readable memory for working in a specific way so that instruction of the storage in the computer-readable memory produces bag The manufacture of command device is included, the command device is realized in one flow of flow chart or multiple one side of flow and/or block diagram The function of being specified in frame or multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing terminal equipments so that Series of operation steps is performed on computer or other programmable terminal equipments to produce computer implemented treatment, so that The instruction performed on computer or other programmable terminal equipments is provided for realizing in one flow of flow chart or multiple flows And/or specified in one square frame of block diagram or multiple square frame function the step of.
Although having been described for the preferred embodiment of the embodiment of the present application, those skilled in the art once know base This creative concept, then can make other change and modification to these embodiments.So, appended claims are intended to be construed to Including preferred embodiment and fall into having altered and changing for the embodiment of the present application scope.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.And, term " including ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or terminal device including a series of key elements are not only wrapped Those key elements, but also other key elements including being not expressly set out are included, or also includes being this process, method, article Or the intrinsic key element of terminal device.In the absence of more restrictions, by wanting that sentence "including a ..." is limited Element, it is not excluded that also there is other identical element in the process including the key element, method, article or terminal device.
Encryption method above to a kind of application program provided herein, the encryption device of a kind of application program and Kind of mobile terminal, is described in detail, and specific case used herein is carried out to the principle and implementation method of the application Illustrate, the explanation of above example is only intended to help and understands the present processes and its core concept;Simultaneously for this area Those skilled in the art, according to the application thought, will change in specific embodiments and applications, to sum up Described, this specification content should not be construed as the limitation to the application.
The embodiment of the present application discloses A1, a kind of encryption method of application program, wherein, the application program has category Property;Described method includes:
Judge whether to be configured with the first encryption data to the first application program;
If so, then searching one or more second application programs that there is same attribute with first application program;
Judge whether to be configured with the second encryption data to second application program;
If it is not, being then encrypted to second application program.
A2, the method as described in A1, it is described to include the step of be encrypted to second application program:
First encryption data is added for second application program.
A3, the method as described in A1, it is described to include the step of be encrypted to second application program:
Encryption prompt message of the generation for second application program;
Receive the second encryption data returned for the encryption prompt message;
Second encryption data is added for second application program.
A4, the method as described in A1, it is described to judge whether the step of the first encryption data is configured with to the first application program Including:
When first application program is activated, judge whether to be configured with first first to first application program Encryption data;
Or,
When the first application program installation, judge whether to be configured with first application program first One encryption data.
A5, the method as described in A4, encryption data storage encryption information table in the terminal.
A6, the method as described in A5, also include:
After being encrypted to second application program, corresponding encryption data is added to the encryption information In table.
The embodiment of the present application also discloses B7, a kind of encryption method of application program, wherein, the application program has category Property;Described method includes:
Judge whether to be configured with the first encryption data to the first application program;
If it is not, then searching one or more second application programs that there is same attribute with first application program;
Judge whether to be configured with the second encryption data to second application program;
If so, being then encrypted to first application program.
B8, the method as described in B7, it is described to include the step of be encrypted to first application program:
Second encryption data is added for first application program.
B9, the method as described in B7, it is described to include the step of be encrypted to first application program:
Encryption prompt message of the generation for first application program;
Receive the first encryption data returned for the encryption prompt message;
First encryption data is added for first application program.
B10, the method as described in B7, it is described to judge whether the step of the first encryption data is configured with to the first application program Including:
When first application program is activated, judge whether to be configured with first first to first application program Encryption data;
Or,
When the first application program installation, judge whether to be configured with first application program first One encryption data.
B11, the method as described in B10, encryption data storage encryption information table in the terminal.
B12, the method as described in B11, also include:
After being encrypted to first application program, corresponding encryption data is added to the encryption information In table.
The embodiment of the present application also discloses C13, a kind of encryption method of application program, wherein, the application program has Attribute;Described method includes:
When the first encryption data is configured to the first application program, lookup has same attribute with first application program One or more second application programs;
Judge whether to be configured with the second encryption data to second application program;
If it is not, being then encrypted to second application program.
C14, the method as described in C13, it is described to include the step of be encrypted to second application program:
First encryption data is added for second application program.
C15, the method as described in C13, it is described to include the step of be encrypted to second application program:
Encryption prompt message of the generation for second application program;
Receive the second encryption data returned for the encryption prompt message;
Second encryption data is added for second application program.
C16, the method as described in C13, encryption data storage encryption information table in the terminal.
C17, the method as described in C13, also include:
After being encrypted to second application program, corresponding encryption data is added to the encryption information In table.
The embodiment of the present application also discloses D18, a kind of encryption device of application program, wherein, the application program has Attribute;Described device includes:
First configuration determination module, for judging whether to be configured with the first encryption data to the first application program;
First searching modul, if for being configured with the first encryption data to the first application program, searching and described first Application program has one or more second application programs of same attribute;
Second configuration determination module, for judging whether to be configured with the second encryption data to second application program;
First encryption processing module, if for not being configured with the second encryption data to second application program, to institute The second application program is stated to be encrypted.
D19, the device as described in D18, first encryption processing module include:
First encryption data adds submodule, for adding first encryption data for second application program.
D20, the device as described in D18, first encryption processing module include:
Prompting generation submodule, for generating the encryption prompt message for second application program;
Encryption data returns to submodule, for receiving the second encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding second encryption data for second application program.
D21, the device as described in D18, the first configuration determination module include:
Start judging submodule, for when first application program is activated, judging whether to be applied to described first Program is configured with the first first encryption data;
Or,
Judging submodule is installed, for when the first application program installation, judge whether should to described first The first first encryption data is configured with program.
D22, the device as described in D21, encryption data storage encryption information table in the terminal.
D23, the device as described in D22, also include:
First encryption data logging modle, for after being encrypted to second application program, by accordingly Encryption data is added in the encryption information table.
The embodiment of the present application also discloses E24, a kind of encryption device of application program, wherein, the application program has Attribute;Described device includes:
3rd configuration determination module, for judging whether to be configured with the first encryption data to the first application program;
Second searching modul, if for not being configured with the first encryption data to the first application program, searching and described One application program has one or more second application programs of same attribute;
4th configuration determination module, for judging whether to be configured with the second encryption data to second application program;
Second encryption processing module, if for being configured with the second encryption data to second application program, to described First application program is encrypted.
E25, the device as described in E24, second encryption processing module include:
First encryption data adds submodule, for adding second encryption data for first application program.
E26, the device as described in E24, second encryption processing module include:
Prompting generation submodule, for generating the encryption prompt message for first application program;
Encryption data returns to submodule, for receiving the first encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding first encryption data for first application program.
E27, the device as described in E24, the 3rd configuration determination module include:
Start judging submodule, for when first application program is activated, judging whether to be applied to described first Program is configured with the first first encryption data;
Or,
Judging submodule is installed, for when the first application program installation, judge whether should to described first The first first encryption data is configured with program.
E28, the device as described in E27, encryption data storage encryption information table in the terminal.
E29, the device as described in E28, also include:
Second encryption data logging modle, for after being encrypted to first application program, by accordingly Encryption data is added in the encryption information table.
The embodiment of the present application also discloses F30, a kind of encryption device of application program, wherein, the application program has Attribute;Described device includes:
3rd searching modul, should with described first for when the first encryption data is configured to the first application program, searching There are one or more second application programs of same attribute with program;
5th configuration determination module, for judging whether to be configured with the second encryption data to second application program;
3rd encryption processing module, if for not being configured with the second encryption data to second application program, to institute The second application program is stated to be encrypted.
F31, the device as described in F30, the 3rd encryption processing module include:
First encryption data adds submodule, for adding first encryption data for second application program.
F32, the device as described in F30, the 3rd encryption processing module include:
Prompting generation submodule, for generating the encryption prompt message for second application program;
Encryption data returns to submodule, for receiving the second encryption data returned for the encryption prompt message;
Second encryption data adds submodule, for adding second encryption data for second application program.
F33, the device as described in F30, encryption data storage encryption information table in the terminal.
F34, the device as described in F30, also include:
3rd encryption data logging modle, for after being encrypted to second application program, by accordingly Encryption data is added in the encryption information table.
The embodiment of the present application also discloses E35, a kind of mobile terminal, including processor and memory,
The memory is used to store the program of the encryption method for performing the application program described in A1 to A6;
The processor is configurable for performing the program stored in the memory.
The embodiment of the present application also discloses G36, a kind of mobile terminal, including processor and memory,
The memory is used to store the program of the encryption method for performing the application program described in B7 to B12;
The processor is configurable for performing the program stored in the memory.
The embodiment of the present application also discloses H37, a kind of mobile terminal, including processor and memory,
The memory is used to store the program of the encryption method for performing the application program described in B13 to B17;
The processor is configurable for performing the program stored in the memory.

Claims (10)

1. a kind of encryption method of application program, it is characterised in that the application program has attribute;Described method includes:
Judge whether to be configured with the first encryption data to the first application program;
If so, then searching one or more second application programs that there is same attribute with first application program;
Judge whether to be configured with the second encryption data to second application program;
If it is not, being then encrypted to second application program.
2. method according to claim 1, it is characterised in that described to be encrypted to second application program Step includes:
First encryption data is added for second application program.
3. a kind of encryption method of application program, it is characterised in that the application program has attribute;Described method includes:
Judge whether to be configured with the first encryption data to the first application program;
If it is not, then searching one or more second application programs that there is same attribute with first application program;
Judge whether to be configured with the second encryption data to second application program;
If so, being then encrypted to first application program.
4. a kind of encryption method of application program, it is characterised in that the application program has attribute;Described method includes:
When the first encryption data is configured to the first application program, lookup has the one of same attribute with first application program Individual or multiple second application programs;
Judge whether to be configured with the second encryption data to second application program;
If it is not, being then encrypted to second application program.
5. a kind of encryption device of application program, it is characterised in that the application program has attribute;Described device includes:
First configuration determination module, for judging whether to be configured with the first encryption data to the first application program;
First searching modul, if for being configured with the first encryption data to the first application program, searching and the described first application Program has one or more second application programs of same attribute;
Second configuration determination module, for judging whether to be configured with the second encryption data to second application program;
First encryption processing module, if for not being configured with the second encryption data to second application program, to described Two application programs are encrypted.
6. a kind of encryption device of application program, it is characterised in that the application program has attribute;Described device includes:
3rd configuration determination module, for judging whether to be configured with the first encryption data to the first application program;
Second searching modul, if for not being configured with the first encryption data to the first application program, searching should with described first There are one or more second application programs of same attribute with program;
4th configuration determination module, for judging whether to be configured with the second encryption data to second application program;
Second encryption processing module, if for being configured with the second encryption data to second application program, to described first Application program is encrypted.
7. a kind of encryption device of application program, it is characterised in that the application program has attribute;Described device includes:
3rd searching modul, for when the first encryption data is configured to the first application program, lookup to apply journey with described first Sequence has one or more second application programs of same attribute;
5th configuration determination module, for judging whether to be configured with the second encryption data to second application program;
3rd encryption processing module, if for not being configured with the second encryption data to second application program, to described Two application programs are encrypted.
8. a kind of mobile terminal, it is characterised in that including processor and memory,
The memory is used to store the program of right of execution 1 to the encryption method of the application program described in power 2;
The processor is configurable for performing the program stored in the memory.
9. a kind of mobile terminal, it is characterised in that including processor and memory,
The memory is used for the program of the encryption method for storing the application program described in right of execution 3;
The processor is configurable for performing the program stored in the memory.
10. a kind of mobile terminal, it is characterised in that including processor and memory,
The memory is used for the program of the encryption method for storing the application program described in right of execution 4;
The processor is configurable for performing the program stored in the memory.
CN201710005463.0A 2017-01-04 2017-01-04 Application encryption method and apparatus, and mobile terminal Pending CN106709322A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710005463.0A CN106709322A (en) 2017-01-04 2017-01-04 Application encryption method and apparatus, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710005463.0A CN106709322A (en) 2017-01-04 2017-01-04 Application encryption method and apparatus, and mobile terminal

Publications (1)

Publication Number Publication Date
CN106709322A true CN106709322A (en) 2017-05-24

Family

ID=58903744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710005463.0A Pending CN106709322A (en) 2017-01-04 2017-01-04 Application encryption method and apparatus, and mobile terminal

Country Status (1)

Country Link
CN (1) CN106709322A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073578A (en) * 2020-08-20 2020-12-11 上海连尚网络科技有限公司 Method and equipment for using or limiting application function in social application

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763181A (en) * 2014-01-24 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Automatic attribute setting device and method
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN104102858A (en) * 2013-04-07 2014-10-15 中兴通讯股份有限公司 Application program encryption processing method, application program encryption processing device and terminal
CN105988897A (en) * 2015-02-12 2016-10-05 广东欧珀移动通信有限公司 Recovery method and device of backup data of mobile terminal
CN106203061A (en) * 2016-06-27 2016-12-07 维沃移动通信有限公司 The encryption method of a kind of application program and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104102858A (en) * 2013-04-07 2014-10-15 中兴通讯股份有限公司 Application program encryption processing method, application program encryption processing device and terminal
CN103763181A (en) * 2014-01-24 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Automatic attribute setting device and method
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN105988897A (en) * 2015-02-12 2016-10-05 广东欧珀移动通信有限公司 Recovery method and device of backup data of mobile terminal
CN106203061A (en) * 2016-06-27 2016-12-07 维沃移动通信有限公司 The encryption method of a kind of application program and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073578A (en) * 2020-08-20 2020-12-11 上海连尚网络科技有限公司 Method and equipment for using or limiting application function in social application
CN112073578B (en) * 2020-08-20 2022-07-12 上海连尚网络科技有限公司 Method and equipment for using or limiting application function in social application

Similar Documents

Publication Publication Date Title
CN103616981B (en) application processing method, device and mobile terminal
CN103677899B (en) The method and apparatus of application program is installed
CN104978115A (en) Content display method and device
CN104571838B (en) A kind of quick method and apparatus for starting application program
CN104850406B (en) A kind of method and apparatus for switching the page
CN106598584A (en) Resource file processing method, apparatus and system
CN104468101A (en) User identity authentication method and device and authentication service system
CN103678502B (en) Information collection method and device
CN106921791A (en) The storage and inspection method of a kind of multimedia file, device and mobile terminal
CN107590397A (en) A kind of method and apparatus for showing embedded webpage
CN106709347A (en) Application running method and application running device
CN108307529A (en) A kind of hotspot connection method and its mobile terminal
CN105530239A (en) Multimedia data obtaining method and device
CN103823851B (en) Webpage display process and device
CN106874045A (en) A kind of startup method of application program, device and mobile terminal
CN103246847B (en) A kind of method and apparatus of macrovirus killing
CN107171740A (en) Radio frequency interference processing method, device, storage medium and terminal
CN107292177A (en) A kind of method of controlling security and terminal device
CN106487878B (en) A kind of method and terminal of Data Migration
CN107450810A (en) operation processing method and device
CN106055615A (en) Method, device and system for obtaining music information
CN106709322A (en) Application encryption method and apparatus, and mobile terminal
CN105260219B (en) A kind of method for downloading software and terminal
CN106228994A (en) A kind of method and apparatus detecting tonequality
CN107071153B (en) A kind of fingerprint mould group mode switching method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170802

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524

RJ01 Rejection of invention patent application after publication