CN107977558A - A kind of application program encryption method and encryption system for function terminal - Google Patents

A kind of application program encryption method and encryption system for function terminal Download PDF

Info

Publication number
CN107977558A
CN107977558A CN201711453428.1A CN201711453428A CN107977558A CN 107977558 A CN107977558 A CN 107977558A CN 201711453428 A CN201711453428 A CN 201711453428A CN 107977558 A CN107977558 A CN 107977558A
Authority
CN
China
Prior art keywords
password
application program
document
unit
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711453428.1A
Other languages
Chinese (zh)
Inventor
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN201711453428.1A priority Critical patent/CN107977558A/en
Publication of CN107977558A publication Critical patent/CN107977558A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of application program encryption method and encryption system for function terminal, wherein, application program encryption method, comprises the following steps:Selection needs encrypted application program, and sets applied cryptography;When triggering enters application program, the request of the input applied cryptography of display one;Obtain current application password input by user;Current application password is matched with applied cryptography;When current application password is consistent with the applied cryptography, into application program;When current application password and applied cryptography are inconsistent, the request of input applied cryptography is shown again.The present invention is based on MTK6260 platforms; the encipherment protection using process to the application program such as short message, address list, message registration, photo, document, keypad lock in functional mobile phone is realized by software; the privacy of user is protected, prevents the leakage of personal information, has the function that to protect privacy.

Description

A kind of application program encryption method and encryption system for function terminal
Technical field
The present invention relates to function terminal field, more particularly to a kind of application program encryption method for function terminal and add Close system.
Background technology
With the continuous development of electronic information technology, the mobile terminal such as mobile phone, tablet computer has been widely used, As necessity indispensable in people's study and work and daily life.Mobile terminal develops into today, its software and hardware and use Family experience is increasing therewith to further include the application program for being installed on mobile terminal, application all there occurs subversive change Program makes the function of mobile terminal more powerful, meets the different demands of mobile terminal user, to mobile terminal user Practise, work and life provide many facilities.For example, mobile terminal user passes through short message, phone etc. and household or friend Exchanged, the camera carried by system, either recorded video of taking pictures records the life of user in the form of photo or video In the photograph album of living or work, photo and video memory mobile terminal.For the user of some installation social networking application programs, The information that can be write based on short message, internet etc. by social networking application program, the photo or video that shoot, with his family Or friend is shared.
For the short message for sending or receiving in mobile terminal, the phone, shooting or the storage that take some are excellent interesting Photo, the document stored etc., user is usually ready that the friend being shared with one's side is browsed.But when mobile terminal is moved by this After the non-holder of dynamic terminal checks, by the short message preserved in application program, message registration, document, photo or it may regard The leakage of private information such as frequency;Alternatively, share by social networking application program the photo or video in photograph album as mobile terminal user When, due to user's hand, either other reasons have given privacy photo or video sharing to stranger etc. by mistake, it can be seen that, it is mobile There are huge security risk for the privacy information stored in terminal.Particularly, when privacy information is related to personal or Company Confidential During information, the leakage of privacy information may give personal or company to bring irremediable huge economic losses.Therefore, how Protecting the safety of privacy information in mobile terminal becomes current urgent problem to be solved.
More and more frequent with the use of smart mobile phone, more and more closer with living, people increasingly focus on smart mobile phone In information security, but few defencive functions for user privacy information of functional mobile phone platform, functional mobile phone acquiescence Only mobile phone safe function, that is, start shooting needs to input password into fashionable, and during the use of functional mobile phone, all need not be defeated Enter password unlock (including screen locking), it is easy to reveal the privacy content of user, especially for functional mobile phone address list, short message, lead to The safeguard protection of the information such as words record, file management particularly lacks.
Smart mobile phone (Smart Phone), refers to as PC, has independent operating system, independent fortune Row space, can voluntarily be installed the program of the third party service providers such as software, game, navigation offer by user, and can pass through shifting Dynamic communication network come realize wireless network access type of cell phone general name.Functional mobile phone (Feature phone), comparatively, It is a kind of mobile phone of lower level, its operational capability is slightly inferior to smart mobile phone with function, but function is purer, is mainly suitable for Old man and children use.Such as smart mobile phone, some applications can also be performed on functional mobile phone.However, it can be answered Application Programming Interface (API) is fewer than smart mobile phone, can not perform primary formula (native program), these formulas are most It is to be based on JAVA ME or BREW.
Therefore, the present invention provides a kind of application program encryption method and encryption system for function terminal, wherein, should With program encryption method, comprise the following steps:Selection needs encrypted application program, and sets applied cryptography;When triggering enters During application program, the request of the input applied cryptography of display one;Obtain current application password input by user;By current application password Matched with applied cryptography;When current application password is consistent with the applied cryptography, into application program;Work as current application When password and inconsistent applied cryptography, the request of input applied cryptography is shown again.The present invention is based on MTK6260 platforms, passes through Software realizes the encryption using process to the application program such as short message, address list, message registration, photo, document in functional mobile phone Protection, protects the privacy of user, prevents the leakage of personal information, has the function that to protect privacy.
The content of the invention
In order to overcome above-mentioned technological deficiency, it is an object of the invention to provide a kind of application program for function terminal to add Decryption method and encryption system.
An aspect of of the present present invention, discloses a kind of application program encryption method for function terminal, comprises the following steps:
In in the function terminal, selection needs encrypted one or more application program, and sets the application program Applied cryptography;
Detect whether that triggering enters the application program;
When triggering enters the application program, the request of the input of display one applied cryptography;
Obtain current application password input by user;
The current application password is matched with the applied cryptography;
When the current application password is consistent with the applied cryptography, into the application program;
When the current application password and the applied cryptography are inconsistent, asking for the input applied cryptography is shown again Ask.
Preferably, the application program encryption method is further comprising the steps of:
In in the function terminal, the document cipher for opening document in the application program is set;
After the application program is entered, the request of the input of display one document cipher;
Obtain current document password input by user;
The current document password is matched with the document cipher;
When the current document password is consistent with the document cipher, the document in the application program is opened;
When the current document password and the document cipher are inconsistent, asking for the input document cipher is shown again Ask.
Preferably, the application program encryption method is further comprising the steps of:
In in the function terminal, a count threshold, a time threshold are set;
A counter in the function terminal is opened, by the count value zero setting of the counter;
When the current document password and the document cipher are inconsistent, the count value is added 1;
Compare the count value and the radix threshold value;
When the count value exceedes the count threshold, the function terminal sends the prompting that reports an error.
Preferably, when the count value exceedes the count threshold, the function terminal sends the step of reporting an error prompting Further include:
Delete the document in the application program.
Preferably, the application program include short message, address list, message registration, file management, one kind in keypad lock or It is a variety of.
Another aspect of the present invention, discloses a kind of application program encryption system for function terminal, described to apply journey Sequence encryption system includes:Password setup module, detection trigger module, request display module, password acquisition module, password match mould Block, application control module;
The password setup module, in the function terminal, selection needs encrypted one or more application program, and The applied cryptography of the application program is set;
The detection trigger module, detects whether that triggering enters the application program;
The request display module, communicates to connect with the detection trigger module, when triggering enters the application program, The request of the input of display one applied cryptography;
The password acquisition module, obtains current application password input by user;
The password match module, communicates to connect with the password acquisition module, password setup module, currently should described Matched with password with the applied cryptography;
The application control module, with the password match module communicate to connect, when the current application password with it is described When applied cryptography is consistent, into the application program;When the current application password and the applied cryptography are inconsistent, again Display inputs the request of the applied cryptography.
Preferably, the application program encryption system further includes document control module;
The document control module includes:Password setting unit, request display unit, password acquiring unit, password match Unit, temperature control unit;
The password setting unit, in the function terminal, setting, the document for opening document in the application program is close Code;
The request display unit, after the application program is entered, the request of the input of display one document cipher;
The password acquiring unit, obtains current document password input by user;
The password match unit, communicates to connect with the password setting unit, password acquiring unit, ought be above by described in Shelves password is matched with the document cipher;
The document control unit, is connected with the password match unit communication, when the current document password with it is described When document cipher is consistent, the document in the application program is opened;When the current document password and the document cipher When inconsistent, the request for inputting the document cipher is shown again.
Preferably, the application program encryption system further includes super secondary processing module;
The super secondary processing module includes:Threshold setting unit, count opening unit, count accumulated unit, counting and compare Unit, super secondary processing unit;
The threshold setting unit, in the function terminal, sets a count threshold, a time threshold;
The counting opening unit, opens a counter in the function terminal, by the count value zero setting of the counter;
The counting accumulated unit, with it is described counting opening unit communication connection, when the current document password with it is described When document cipher is inconsistent, the count value is added 1;
The counting comparing unit, with the threshold setting unit, counting accumulated unit communication connection, the counting Value and the radix threshold value;
The super secondary processing unit, communicates to connect with the counting comparing unit, when the count value exceedes the counting During threshold value, the function terminal sends the prompting that reports an error.
Preferably, the super secondary processing unit, deletes the document in the application program.
Preferably, the application program include short message, address list, message registration, file management, one kind in keypad lock or It is a variety of.
After employing above-mentioned technical proposal, compared with prior art, have the advantages that:
1. the present invention provides a kind of application program encryption method and encryption system for function terminal, wherein, application Program encryption method, comprises the following steps:Selection needs encrypted application program, and sets applied cryptography;Answered when triggering enters During with program, the request of the input applied cryptography of display one;Obtain current application password input by user;By current application password with Applied cryptography is matched;When current application password is consistent with the applied cryptography, into application program;When current application is close When code and inconsistent applied cryptography, the request of input applied cryptography is shown again.The present invention is based on MTK6260 platforms, by soft Part realizes that the encryption using process to the application program such as short message, address list, message registration, photo, document in functional mobile phone is protected Shield, protects the privacy of user, prevents the leakage of personal information, has the function that to protect privacy.
Brief description of the drawings
Fig. 1 is the flow diagram for the application program encryption method for meeting one embodiment of the present invention;
The flow diagram of document encrypting step in the application program encryption method that Fig. 2 is Fig. 1;
The flow diagram of super secondary processing step in the application program encryption method that Fig. 3 is Fig. 2;
The flow diagram of super secondary processing step in the application program encryption method that Fig. 4 is Fig. 3;
Fig. 5 is the structure diagram for the application program encryption system for meeting one embodiment of the present invention.
Reference numeral:
100- application program encryption systems;
11- password setup modules;
12- detection trigger modules;
13- asks display module;
14- password acquisition modules;
15- password match modules;
16- application control modules;
17- document control modules;
The super secondary processing modules of 18-.
Embodiment
The advantages of the present invention is further explained below in conjunction with attached drawing and specific embodiment.
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects being described in detail in claims, of the invention.
It is only merely for the purpose of description specific embodiment in terminology used in the present invention, and is not intended to be limiting the present invention. Bag is also intended in " one " of singulative of the invention and used in the attached claims, " one kind ", " described ", "the" etc. Most forms are included, unless context clearly shows that other implications.It is also understood that term "and/or" used herein is Refer to and any or all may be combined comprising the associated list items purpose of one or more.
It will be appreciated that though various modules, but these modules may be described using term first, second etc. in the present invention It should not necessarily be limited by these terms.These terms are only used for same type of module being distinguished from each other out.For example, the present invention is not being departed from In the case of scope, first detection module can also be referred to as the second detection module, and similarly, the second detection module can also be by Referred to as first detection module.Depending on linguistic context, word as used in this " when ... " can be construed to " ... When " or " if " or " in response to determining ".
In the description of the present invention, it is to be understood that term " longitudinal direction ", " transverse direction ", " on ", " under ", "front", "rear", The orientation or position relationship of the instruction such as "left", "right", " vertical ", " level ", " top ", " bottom " " interior ", " outer " is based on attached drawing institutes The orientation or position relationship shown, is for only for ease of the description present invention and simplifies description, rather than instruction or the dress for implying meaning Put or element there must be specific orientation, with specific azimuth configuration and operation, therefore it is not intended that to limit of the invention System.
In the description of the present invention, unless otherwise prescribed with restriction, it is necessary to which explanation, term " connection " etc. should do broad sense Understand, for example, it may be the connection inside mechanical connection or electrical connection or two elements, can be directly connected, Can be indirectly connected by intermediary, for the ordinary skill in the art, can understand as the case may be on State the concrete meaning of term.
In follow-up description, using the suffix of such as " module ", " unit " for representing element only for being conducive to The explanation of the present invention, itself does not have specific meaning.Therefore, " module ", " unit " can be used mixedly.
The encryption method and encryption system of the present invention can be applied to function terminal, such as functional mobile phone, can also be applied to Intelligent terminal, intelligent terminal can be implemented in a variety of manners, including such as smart mobile phone, laptop, PDA (a numbers Word assistant), PAD (tablet computer), PMP (portable media player), guider, the mobile terminal of intelligent watch etc., And the fixed terminal of numeral TV, desktop computer etc..Hereinafter it is assumed that terminal is function terminal, and assume function end Hold as functional mobile phone, the present invention will be described.However, it will be understood by those skilled in the art that implement according to the present invention The construction of mode can also apply to the terminal of intelligent type.For ease of description, the embodiment of the present invention is by taking functional mobile phone as an example Illustrate, other application scene is cross-referenced.
With reference to figure 1, the application program encryption method for function terminal, it is characterised in that comprise the following steps:
In in the function terminal, selection needs encrypted one or more application program, and sets the application program Applied cryptography;
Detect whether that triggering enters the application program;
When triggering enters the application program, the request of the input of display one applied cryptography;
Obtain current application password input by user;
The current application password is matched with the applied cryptography;
When the current application password is consistent with the applied cryptography, into the application program;Currently should when described During with password and the inconsistent applied cryptography, the request for inputting the applied cryptography is shown again.
There was only mobile phone safe function for functional mobile phone platform acquiescence, that is, start shooting and just start shooting into fashionable input password, afterwards Without input password unlock (including screen locking) during using mobile phone, it is easy to the privacy content of user is revealed, especially, The protection for short breath, address list, message registration, file management, photograph album information etc., the present invention are not based on function machine platform MTK6260 platforms, the privacy lock function menu in functional mobile phone main menu is realized by software.Open some part privacy lock When, correspondence is required for locking into relevant interface.
Upper lock control is carried out for each application process entrance, specific process is as follows:
First, short message
(1) in short message main menu/call send short message/message registration in send short message/from contact person send short message
(2) standby interface check unread short messages/from dialing interface option send short message/from address list group send it is short Letter
(3) from dialing interface option send short message/from address list group send short message/short message sending network address
(4) contact person mark servel send short message
(5) direction shortcut enters inbox/Sent messages/messages menus/write short message interface
2nd, address list
(1) entry communication is recorded in address list/call in address list main menu/sos edit contacts/message registration
(2) preserve contact person/write from dialing and enter contact person in short message advance and add name/number
(3) the address list selection directory number in short message addition receiver/setting-mobile phone setting-blacklist is write
(4) direction shortcut addition contact person
(5) address list privacy lock is opened, and dialing interface mismatches contact person in mobile phone
3rd, message registration
(1) message registration is entered in message registration main menu/standby interface missed call/call
(2) direction shortcut enters Dialled calllog/Recive calllog/Recive calllog/all calllog
4th, file management
(1) file management menu/video player menus/imagevier menus/recording menu/audioplayer dishes It is single
(2) open state inserts USB into the file list/ bluetooths reception file of mobile phone disk/fm players
(3) contextual model selects the tinkle of bells/contact person the tinkle of bells/contact person head portrait/Ebook menus
(4) direction shortcut enters audioplayer/Sound record/imagevier
5th, keypad lock
(1) locking screen interface (needing input password to unlock when Unlock)
To sum up, by the upper lock control of the process that each application program uses to more than, the privacy of user is protected, prevents individual The leakage of information, has the function that to protect privacy.
With reference to figure 2, in a preferred embodiment, the application program encryption method is further comprising the steps of:
In in the function terminal, the document cipher for opening document in the application program is set;
After the application program is entered, the request of the input of display one document cipher;
Obtain current document password input by user;
The current document password is matched with the document cipher;
When the current document password is consistent with the document cipher, the document in the application program is opened;
When the current document password and the document cipher are inconsistent, asking for the input document cipher is shown again Ask.
With reference to figure 3, in a preferred embodiment, the application program encryption method is further comprising the steps of:
In in the function terminal, a count threshold, a time threshold are set;
A counter in the function terminal is opened, by the count value zero setting of the counter;
When the current document password and the document cipher are inconsistent, the count value is added 1;
Compare the count value and the radix threshold value;
When the count value exceedes the count threshold, the function terminal sends the prompting that reports an error.
With reference to figure 4, in a preferred embodiment, when the count value exceedes the count threshold, the function terminal The step of reporting an error prompting is sent to further include:
Delete the document in the application program.
With reference to figure 2- Fig. 4, according to above-described embodiment, application program encryption method provided by the invention, can be added by three layers Close mode realizes the privacy protection function of functional mobile phone:
(1) privacy application program is encrypted by password;
(2) short message in privacy application program, message registration, document, photo or video are encrypted by password.
(3) to prevent the reasons such as functional mobile phone loss from causing privacy to be invaded, when Password Input mistake exceedes n times, forever The privacy information in privacy application program is deleted long.
Wherein, (1) is encrypted privacy application program by password;(2) by password in privacy application program Short message, message registration, document, photo or video are encrypted, and when password input by user is correct, can check the private file Image in folder and/or private file folder, when password bad input by user, prompts user to re-enter password.
Increase encryption rule on the basis of preceding two layers of encryption rule:(3) for prevent functional mobile phone lose etc. reason cause it is hidden Private is invaded, when Password Input mistake exceedes n times, the privacy information in permanent delet privacy application program.As described above, When password bad input by user, user is prompted to re-enter password, when user inputs the number of password mistake more than one During fixed number value, the privacy information is deleted.For example, (can be set after Password Input mistake 10 times by User Defined), it is hidden to delete this Personal letter ceases.
Deleting the method for the privacy information can be, a delete modules are set in functional mobile phone, when Password Input is wrong When missing 10 times, trigger the module and delete the privacy information.
It is understood that the above method is applicable not only to the situation of the privacy Password Input mistake of application program, equally Suitable for the situation of the privacy Password Input mistake of document in application program.
And/or increase encryption rule on the basis of preceding two layers of encryption rule:(3) it is to prevent the reasons such as functional mobile phone loss Cause privacy to be invaded, report an error when Password Input mistake exceedes n times.As described above, when password bad input by user When, prompt user to re-enter password, report an error when the number that user inputs password mistake exceedes certain numerical value, the mode to report an error Can have None- identified file, file corruption, mess code, file there is no etc., privacy information is converted into unreadable file.
For example, the privacy image in photograph album is converted my unreadable file, its cipher mode has a variety of.Using PNG files as Example, PNG-8 files are the PNG picture formats being widely used at present, and are mainly made of six bulks, PNG file marks, file header number Terminate the order such as data IEND according to block IHDR, palette data block PLTE, video data block IDAT and image to arrange, pass through handle PNG piecemeals, such as preceding one piece of 100 bytes, and then mono- piece of 1K, last one piece of remainder bytes, then upset block order, use 2byte records total length, 1byte records order, so as to fulfill encryption;Can also be according to Image-Width, Image- The order of Height, Image-Depth write data to write data, or according to above-mentioned regular inverted order, with Image-Width, Image-Height, Image-Depth order or inverted order write the cipher mode of data it is further preferred that being not easy to be cracked.
In a preferred embodiment, the application program includes short message, address list, message registration, file management, keypad lock In one or more.
Based on above-mentioned steps, provided by the present invention for the application program encryption method of function terminal, selection needs to encrypt Application program, and applied cryptography is set;When triggering enters application program, the request of the input applied cryptography of display one;Obtain Current application password input by user;Current application password is matched with applied cryptography;When current application password with it is described When applied cryptography is consistent, into application program;When current application password and applied cryptography are inconsistent, input application is shown again The request of password.Based on MTK6260 platforms, by software realize to short message in functional mobile phone, address list, message registration, photo, The encipherment protection using process of the application programs such as document, protects the privacy of user, prevents the leakage of personal information, reach protection The effect of privacy.
With reference to figure 5, present invention also offers a kind of application program encryption system 100 for function terminal, the application Program encryption system 100 includes:Password setup module 11, detection trigger module 12, request display module 13, password acquisition module 14th, password match module 15, application control module 16;
The password setup module 11, in the function terminal, selection needs encrypted one or more application program, And the applied cryptography of the application program is set;
The detection trigger module 12, detects whether that triggering enters the application program;
The request display module 13, communicates to connect with the detection trigger module 12, when triggering applies journey into described During sequence, the request of the input of display one applied cryptography;
The password acquisition module 14, obtains current application password input by user;
The password match module 15, communicates to connect with the password acquisition module 14, password setup module 11, by described in Current application password is matched with the applied cryptography;
The application control module 16, communicates to connect with the password match module 15, when the current application password with When the applied cryptography is consistent, into the application program;When the current application password and the applied cryptography are inconsistent, The request for inputting the applied cryptography is shown again.
In a preferred embodiment, the application program encryption system 100 further includes document control module 17;
The document control module 17 includes:Password setting unit, request display unit, password acquiring unit, password With unit, temperature control unit;
The password setting unit, in the function terminal, setting, the document for opening document in the application program is close Code;
The request display unit, after the application program is entered, the request of the input of display one document cipher;
The password acquiring unit, obtains current document password input by user;
The password match unit, communicates to connect with the password setting unit, password acquiring unit, ought be above by described in Shelves password is matched with the document cipher;
The document control unit, is connected with the password match unit communication, when the current document password with it is described When document cipher is consistent, the document in the application program is opened;When the current document password and the document cipher When inconsistent, the request for inputting the document cipher is shown again.
In a preferred embodiment, the application program encryption system 100 further includes super secondary processing module 18;
The super secondary processing module 18 includes:Threshold setting unit, count opening unit, count accumulated unit, count ratio Compared with unit, super secondary processing unit;
The threshold setting unit, in the function terminal, sets a count threshold, a time threshold;
The counting opening unit, opens a counter in the function terminal, by the count value zero setting of the counter;
The counting accumulated unit, with it is described counting opening unit communication connection, when the current document password with it is described When document cipher is inconsistent, the count value is added 1;
The counting comparing unit, with the threshold setting unit, counting accumulated unit communication connection, the counting Value and the radix threshold value;
The super secondary processing unit, communicates to connect with the counting comparing unit, when the count value exceedes the counting During threshold value, the function terminal sends the prompting that reports an error.
In a preferred embodiment, the super secondary processing unit, deletes the document in the application program.
In a preferred embodiment, the application program includes short message, address list, message registration, file management, keypad lock In one or more.
Based on above-mentioned setting, provided by the present invention for the application program encryption system of function terminal, put down based on MTK6260 Platform, the use process to the application program such as short message, address list, message registration, photo, document in functional mobile phone is realized by software Encipherment protection, protect the privacy of user, prevent the leakage of personal information, have the function that protect privacy.
It should be noted that the embodiment of the present invention has preferable implementation, and not the present invention is made any type of Limitation, any one skilled in the art change or are modified to possibly also with the technology contents of the disclosure above equivalent effective Embodiment, as long as without departing from the content of technical solution of the present invention, makees above example according to technical spirit of the invention Any modification or equivalent variations and modification, in the range of still falling within technical solution of the present invention.

Claims (10)

1. a kind of application program encryption method for function terminal, it is characterised in that comprise the following steps:
In in the function terminal, selection needs encrypted one or more application program, and sets answering for the application program Use password;
Detect whether that triggering enters the application program;
When triggering enters the application program, the request of the input of display one applied cryptography;
Obtain current application password input by user;
The current application password is matched with the applied cryptography;
When the current application password is consistent with the applied cryptography, into the application program;
When the current application password and the applied cryptography are inconsistent, the request for inputting the applied cryptography is shown again.
2. encryption method as claimed in claim 1, it is characterised in that
The application program encryption method is further comprising the steps of:
In in the function terminal, the document cipher for opening document in the application program is set;
After the application program is entered, the request of the input of display one document cipher;
Obtain current document password input by user;
The current document password is matched with the document cipher;
When the current document password is consistent with the document cipher, the document in the application program is opened;
When the current document password and the document cipher are inconsistent, the request for inputting the document cipher is shown again.
3. encryption method as claimed in claim 2, it is characterised in that
The application program encryption method is further comprising the steps of:
In in the function terminal, a count threshold, a time threshold are set;
A counter in the function terminal is opened, by the count value zero setting of the counter;
When the current document password and the document cipher are inconsistent, the count value is added 1;
Compare the count value and the radix threshold value;
When the count value exceedes the count threshold, the function terminal sends the prompting that reports an error.
4. encryption method as claimed in claim 3, it is characterised in that
When the count value exceedes the count threshold, the function terminal sends the step of reporting an error prompting and further includes:
Delete the document in the application program.
5. encryption method as claimed in claim 1, it is characterised in that
The application program includes the one or more in short message, address list, message registration, file management, keypad lock.
A kind of 6. application program encryption system for function terminal, it is characterised in that
The application program encryption system includes:Password setup module, detection trigger module, request display module, password obtain Module, password match module, application control module;
The password setup module, in the function terminal, selection needs encrypted one or more application program, and sets The applied cryptography of the application program;
The detection trigger module, detects whether that triggering enters the application program;
The request display module, communicates to connect with the detection trigger module, when triggering enters the application program, display The request of the one input applied cryptography;
The password acquisition module, obtains current application password input by user;
The password match module, communicates to connect with the password acquisition module, password setup module, and the current application is close Code is matched with the applied cryptography;
The application control module, communicates to connect with the password match module, when the current application password and the application When password is consistent, into the application program;When the current application password and the applied cryptography are inconsistent, show again Input the request of the applied cryptography.
7. encryption system as claimed in claim 6, it is characterised in that
The application program encryption system further includes document control module;
The document control module includes:Password setting unit, request display unit, password acquiring unit, password match unit, Temperature control unit;
The password setting unit, in the function terminal, sets the document cipher for opening document in the application program;
The request display unit, after the application program is entered, the request of the input of display one document cipher;
The password acquiring unit, obtains current document password input by user;
The password match unit, communicates to connect with the password setting unit, password acquiring unit, and the current document is close Code is matched with the document cipher;
The document control unit, is connected with the password match unit communication, when the current document password and the document When password is consistent, the document in the application program is opened;When the current document password differs with the document cipher During cause, the request for inputting the document cipher is shown again.
8. encryption system as claimed in claim 7, it is characterised in that
The application program encryption system further includes super secondary processing module;
The super secondary processing module includes:Threshold setting unit, count opening unit, count accumulated unit, count comparing unit, Super secondary processing unit;
The threshold setting unit, in the function terminal, sets a count threshold, a time threshold;
The counting opening unit, opens a counter in the function terminal, by the count value zero setting of the counter;
The counting accumulated unit, communicates to connect with the counting opening unit, when the current document password and the document When password is inconsistent, the count value is added 1;
The counting comparing unit, with the threshold setting unit, count accumulated unit communication connection, the count value with The radix threshold value;
The super secondary processing unit, communicates to connect with the counting comparing unit, when the count value exceedes the count threshold When, the function terminal sends the prompting that reports an error.
9. encryption system as claimed in claim 8, it is characterised in that
The super secondary processing unit, deletes the document in the application program.
10. encryption system as claimed in claim 6, it is characterised in that
The application program includes the one or more in short message, address list, message registration, file management, keypad lock.
CN201711453428.1A 2017-12-28 2017-12-28 A kind of application program encryption method and encryption system for function terminal Pending CN107977558A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711453428.1A CN107977558A (en) 2017-12-28 2017-12-28 A kind of application program encryption method and encryption system for function terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711453428.1A CN107977558A (en) 2017-12-28 2017-12-28 A kind of application program encryption method and encryption system for function terminal

Publications (1)

Publication Number Publication Date
CN107977558A true CN107977558A (en) 2018-05-01

Family

ID=62007915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711453428.1A Pending CN107977558A (en) 2017-12-28 2017-12-28 A kind of application program encryption method and encryption system for function terminal

Country Status (1)

Country Link
CN (1) CN107977558A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113158240A (en) * 2021-04-02 2021-07-23 上海嵩恒网络科技股份有限公司 Method and device for optimizing file decryption process, terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008348A (en) * 2014-04-17 2014-08-27 小米科技有限责任公司 Application program control method, application program control device and terminal
CN104268453A (en) * 2014-09-24 2015-01-07 可牛网络技术(北京)有限公司 Method and device for application program safety management for terminal equipment, and terminal
CN104504309A (en) * 2015-01-09 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Data encryption method and terminal for application program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008348A (en) * 2014-04-17 2014-08-27 小米科技有限责任公司 Application program control method, application program control device and terminal
CN104268453A (en) * 2014-09-24 2015-01-07 可牛网络技术(北京)有限公司 Method and device for application program safety management for terminal equipment, and terminal
CN104504309A (en) * 2015-01-09 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Data encryption method and terminal for application program

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113158240A (en) * 2021-04-02 2021-07-23 上海嵩恒网络科技股份有限公司 Method and device for optimizing file decryption process, terminal and storage medium

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN104933342B (en) A kind of picture inspection method and mobile terminal
CN102467462B (en) Method for protecting data stored in device and corresponding device
CN103186761B (en) The fingerprint encryption method and its communication terminal of secret file
CN102447772A (en) Privacy in mobile device communication
CN101026822A (en) Method for protecting mobile phone private data
CN100473193C (en) Mobile terminal with information secrecy function and secrecy method
CN102880560A (en) User privacy data protection method and mobile terminal using user privacy data protection method
CN101507246A (en) Data privacy on wireless communication terminal
CN101282535A (en) Method and apparatus for protecting mobile terminal private information
CN106598777A (en) Method and system used for saving and recovering deleted file, and mobile equipment
CN106231092A (en) A kind of phone information security protection method
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
JP7278345B2 (en) Mobile terminal privacy protection method and protection device, and mobile terminal
CN105069344B (en) mobile terminal locking method and device
US20120108217A1 (en) Communication terminal, telephone directory resistering method, and communication terminal handling method
CN106101438A (en) A kind of cellphone information protection lock
CN107977558A (en) A kind of application program encryption method and encryption system for function terminal
JP5163042B2 (en) Information processing apparatus, security countermeasure method, and computer program
CN101222706B (en) Method for guaranteeing data information safety in mobile terminal
JP2004229240A (en) Portable telephone
US20080159305A1 (en) Virtual private communication devices and techniques
CN205829777U (en) A kind of cellphone information protection lock
KR20070071389A (en) A method of protection data for portable terminal
JP2013134556A (en) Confidential information management system, information processing device, control method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180501

RJ01 Rejection of invention patent application after publication