CN107977558A - A kind of application program encryption method and encryption system for function terminal - Google Patents
A kind of application program encryption method and encryption system for function terminal Download PDFInfo
- Publication number
- CN107977558A CN107977558A CN201711453428.1A CN201711453428A CN107977558A CN 107977558 A CN107977558 A CN 107977558A CN 201711453428 A CN201711453428 A CN 201711453428A CN 107977558 A CN107977558 A CN 107977558A
- Authority
- CN
- China
- Prior art keywords
- password
- application program
- document
- unit
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of application program encryption method and encryption system for function terminal, wherein, application program encryption method, comprises the following steps:Selection needs encrypted application program, and sets applied cryptography;When triggering enters application program, the request of the input applied cryptography of display one;Obtain current application password input by user;Current application password is matched with applied cryptography;When current application password is consistent with the applied cryptography, into application program;When current application password and applied cryptography are inconsistent, the request of input applied cryptography is shown again.The present invention is based on MTK6260 platforms; the encipherment protection using process to the application program such as short message, address list, message registration, photo, document, keypad lock in functional mobile phone is realized by software; the privacy of user is protected, prevents the leakage of personal information, has the function that to protect privacy.
Description
Technical field
The present invention relates to function terminal field, more particularly to a kind of application program encryption method for function terminal and add
Close system.
Background technology
With the continuous development of electronic information technology, the mobile terminal such as mobile phone, tablet computer has been widely used,
As necessity indispensable in people's study and work and daily life.Mobile terminal develops into today, its software and hardware and use
Family experience is increasing therewith to further include the application program for being installed on mobile terminal, application all there occurs subversive change
Program makes the function of mobile terminal more powerful, meets the different demands of mobile terminal user, to mobile terminal user
Practise, work and life provide many facilities.For example, mobile terminal user passes through short message, phone etc. and household or friend
Exchanged, the camera carried by system, either recorded video of taking pictures records the life of user in the form of photo or video
In the photograph album of living or work, photo and video memory mobile terminal.For the user of some installation social networking application programs,
The information that can be write based on short message, internet etc. by social networking application program, the photo or video that shoot, with his family
Or friend is shared.
For the short message for sending or receiving in mobile terminal, the phone, shooting or the storage that take some are excellent interesting
Photo, the document stored etc., user is usually ready that the friend being shared with one's side is browsed.But when mobile terminal is moved by this
After the non-holder of dynamic terminal checks, by the short message preserved in application program, message registration, document, photo or it may regard
The leakage of private information such as frequency;Alternatively, share by social networking application program the photo or video in photograph album as mobile terminal user
When, due to user's hand, either other reasons have given privacy photo or video sharing to stranger etc. by mistake, it can be seen that, it is mobile
There are huge security risk for the privacy information stored in terminal.Particularly, when privacy information is related to personal or Company Confidential
During information, the leakage of privacy information may give personal or company to bring irremediable huge economic losses.Therefore, how
Protecting the safety of privacy information in mobile terminal becomes current urgent problem to be solved.
More and more frequent with the use of smart mobile phone, more and more closer with living, people increasingly focus on smart mobile phone
In information security, but few defencive functions for user privacy information of functional mobile phone platform, functional mobile phone acquiescence
Only mobile phone safe function, that is, start shooting needs to input password into fashionable, and during the use of functional mobile phone, all need not be defeated
Enter password unlock (including screen locking), it is easy to reveal the privacy content of user, especially for functional mobile phone address list, short message, lead to
The safeguard protection of the information such as words record, file management particularly lacks.
Smart mobile phone (Smart Phone), refers to as PC, has independent operating system, independent fortune
Row space, can voluntarily be installed the program of the third party service providers such as software, game, navigation offer by user, and can pass through shifting
Dynamic communication network come realize wireless network access type of cell phone general name.Functional mobile phone (Feature phone), comparatively,
It is a kind of mobile phone of lower level, its operational capability is slightly inferior to smart mobile phone with function, but function is purer, is mainly suitable for
Old man and children use.Such as smart mobile phone, some applications can also be performed on functional mobile phone.However, it can be answered
Application Programming Interface (API) is fewer than smart mobile phone, can not perform primary formula (native program), these formulas are most
It is to be based on JAVA ME or BREW.
Therefore, the present invention provides a kind of application program encryption method and encryption system for function terminal, wherein, should
With program encryption method, comprise the following steps:Selection needs encrypted application program, and sets applied cryptography;When triggering enters
During application program, the request of the input applied cryptography of display one;Obtain current application password input by user;By current application password
Matched with applied cryptography;When current application password is consistent with the applied cryptography, into application program;Work as current application
When password and inconsistent applied cryptography, the request of input applied cryptography is shown again.The present invention is based on MTK6260 platforms, passes through
Software realizes the encryption using process to the application program such as short message, address list, message registration, photo, document in functional mobile phone
Protection, protects the privacy of user, prevents the leakage of personal information, has the function that to protect privacy.
The content of the invention
In order to overcome above-mentioned technological deficiency, it is an object of the invention to provide a kind of application program for function terminal to add
Decryption method and encryption system.
An aspect of of the present present invention, discloses a kind of application program encryption method for function terminal, comprises the following steps:
In in the function terminal, selection needs encrypted one or more application program, and sets the application program
Applied cryptography;
Detect whether that triggering enters the application program;
When triggering enters the application program, the request of the input of display one applied cryptography;
Obtain current application password input by user;
The current application password is matched with the applied cryptography;
When the current application password is consistent with the applied cryptography, into the application program;
When the current application password and the applied cryptography are inconsistent, asking for the input applied cryptography is shown again
Ask.
Preferably, the application program encryption method is further comprising the steps of:
In in the function terminal, the document cipher for opening document in the application program is set;
After the application program is entered, the request of the input of display one document cipher;
Obtain current document password input by user;
The current document password is matched with the document cipher;
When the current document password is consistent with the document cipher, the document in the application program is opened;
When the current document password and the document cipher are inconsistent, asking for the input document cipher is shown again
Ask.
Preferably, the application program encryption method is further comprising the steps of:
In in the function terminal, a count threshold, a time threshold are set;
A counter in the function terminal is opened, by the count value zero setting of the counter;
When the current document password and the document cipher are inconsistent, the count value is added 1;
Compare the count value and the radix threshold value;
When the count value exceedes the count threshold, the function terminal sends the prompting that reports an error.
Preferably, when the count value exceedes the count threshold, the function terminal sends the step of reporting an error prompting
Further include:
Delete the document in the application program.
Preferably, the application program include short message, address list, message registration, file management, one kind in keypad lock or
It is a variety of.
Another aspect of the present invention, discloses a kind of application program encryption system for function terminal, described to apply journey
Sequence encryption system includes:Password setup module, detection trigger module, request display module, password acquisition module, password match mould
Block, application control module;
The password setup module, in the function terminal, selection needs encrypted one or more application program, and
The applied cryptography of the application program is set;
The detection trigger module, detects whether that triggering enters the application program;
The request display module, communicates to connect with the detection trigger module, when triggering enters the application program,
The request of the input of display one applied cryptography;
The password acquisition module, obtains current application password input by user;
The password match module, communicates to connect with the password acquisition module, password setup module, currently should described
Matched with password with the applied cryptography;
The application control module, with the password match module communicate to connect, when the current application password with it is described
When applied cryptography is consistent, into the application program;When the current application password and the applied cryptography are inconsistent, again
Display inputs the request of the applied cryptography.
Preferably, the application program encryption system further includes document control module;
The document control module includes:Password setting unit, request display unit, password acquiring unit, password match
Unit, temperature control unit;
The password setting unit, in the function terminal, setting, the document for opening document in the application program is close
Code;
The request display unit, after the application program is entered, the request of the input of display one document cipher;
The password acquiring unit, obtains current document password input by user;
The password match unit, communicates to connect with the password setting unit, password acquiring unit, ought be above by described in
Shelves password is matched with the document cipher;
The document control unit, is connected with the password match unit communication, when the current document password with it is described
When document cipher is consistent, the document in the application program is opened;When the current document password and the document cipher
When inconsistent, the request for inputting the document cipher is shown again.
Preferably, the application program encryption system further includes super secondary processing module;
The super secondary processing module includes:Threshold setting unit, count opening unit, count accumulated unit, counting and compare
Unit, super secondary processing unit;
The threshold setting unit, in the function terminal, sets a count threshold, a time threshold;
The counting opening unit, opens a counter in the function terminal, by the count value zero setting of the counter;
The counting accumulated unit, with it is described counting opening unit communication connection, when the current document password with it is described
When document cipher is inconsistent, the count value is added 1;
The counting comparing unit, with the threshold setting unit, counting accumulated unit communication connection, the counting
Value and the radix threshold value;
The super secondary processing unit, communicates to connect with the counting comparing unit, when the count value exceedes the counting
During threshold value, the function terminal sends the prompting that reports an error.
Preferably, the super secondary processing unit, deletes the document in the application program.
Preferably, the application program include short message, address list, message registration, file management, one kind in keypad lock or
It is a variety of.
After employing above-mentioned technical proposal, compared with prior art, have the advantages that:
1. the present invention provides a kind of application program encryption method and encryption system for function terminal, wherein, application
Program encryption method, comprises the following steps:Selection needs encrypted application program, and sets applied cryptography;Answered when triggering enters
During with program, the request of the input applied cryptography of display one;Obtain current application password input by user;By current application password with
Applied cryptography is matched;When current application password is consistent with the applied cryptography, into application program;When current application is close
When code and inconsistent applied cryptography, the request of input applied cryptography is shown again.The present invention is based on MTK6260 platforms, by soft
Part realizes that the encryption using process to the application program such as short message, address list, message registration, photo, document in functional mobile phone is protected
Shield, protects the privacy of user, prevents the leakage of personal information, has the function that to protect privacy.
Brief description of the drawings
Fig. 1 is the flow diagram for the application program encryption method for meeting one embodiment of the present invention;
The flow diagram of document encrypting step in the application program encryption method that Fig. 2 is Fig. 1;
The flow diagram of super secondary processing step in the application program encryption method that Fig. 3 is Fig. 2;
The flow diagram of super secondary processing step in the application program encryption method that Fig. 4 is Fig. 3;
Fig. 5 is the structure diagram for the application program encryption system for meeting one embodiment of the present invention.
Reference numeral:
100- application program encryption systems;
11- password setup modules;
12- detection trigger modules;
13- asks display module;
14- password acquisition modules;
15- password match modules;
16- application control modules;
17- document control modules;
The super secondary processing modules of 18-.
Embodiment
The advantages of the present invention is further explained below in conjunction with attached drawing and specific embodiment.
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects being described in detail in claims, of the invention.
It is only merely for the purpose of description specific embodiment in terminology used in the present invention, and is not intended to be limiting the present invention.
Bag is also intended in " one " of singulative of the invention and used in the attached claims, " one kind ", " described ", "the" etc.
Most forms are included, unless context clearly shows that other implications.It is also understood that term "and/or" used herein is
Refer to and any or all may be combined comprising the associated list items purpose of one or more.
It will be appreciated that though various modules, but these modules may be described using term first, second etc. in the present invention
It should not necessarily be limited by these terms.These terms are only used for same type of module being distinguished from each other out.For example, the present invention is not being departed from
In the case of scope, first detection module can also be referred to as the second detection module, and similarly, the second detection module can also be by
Referred to as first detection module.Depending on linguistic context, word as used in this " when ... " can be construed to " ...
When " or " if " or " in response to determining ".
In the description of the present invention, it is to be understood that term " longitudinal direction ", " transverse direction ", " on ", " under ", "front", "rear",
The orientation or position relationship of the instruction such as "left", "right", " vertical ", " level ", " top ", " bottom " " interior ", " outer " is based on attached drawing institutes
The orientation or position relationship shown, is for only for ease of the description present invention and simplifies description, rather than instruction or the dress for implying meaning
Put or element there must be specific orientation, with specific azimuth configuration and operation, therefore it is not intended that to limit of the invention
System.
In the description of the present invention, unless otherwise prescribed with restriction, it is necessary to which explanation, term " connection " etc. should do broad sense
Understand, for example, it may be the connection inside mechanical connection or electrical connection or two elements, can be directly connected,
Can be indirectly connected by intermediary, for the ordinary skill in the art, can understand as the case may be on
State the concrete meaning of term.
In follow-up description, using the suffix of such as " module ", " unit " for representing element only for being conducive to
The explanation of the present invention, itself does not have specific meaning.Therefore, " module ", " unit " can be used mixedly.
The encryption method and encryption system of the present invention can be applied to function terminal, such as functional mobile phone, can also be applied to
Intelligent terminal, intelligent terminal can be implemented in a variety of manners, including such as smart mobile phone, laptop, PDA (a numbers
Word assistant), PAD (tablet computer), PMP (portable media player), guider, the mobile terminal of intelligent watch etc.,
And the fixed terminal of numeral TV, desktop computer etc..Hereinafter it is assumed that terminal is function terminal, and assume function end
Hold as functional mobile phone, the present invention will be described.However, it will be understood by those skilled in the art that implement according to the present invention
The construction of mode can also apply to the terminal of intelligent type.For ease of description, the embodiment of the present invention is by taking functional mobile phone as an example
Illustrate, other application scene is cross-referenced.
With reference to figure 1, the application program encryption method for function terminal, it is characterised in that comprise the following steps:
In in the function terminal, selection needs encrypted one or more application program, and sets the application program
Applied cryptography;
Detect whether that triggering enters the application program;
When triggering enters the application program, the request of the input of display one applied cryptography;
Obtain current application password input by user;
The current application password is matched with the applied cryptography;
When the current application password is consistent with the applied cryptography, into the application program;Currently should when described
During with password and the inconsistent applied cryptography, the request for inputting the applied cryptography is shown again.
There was only mobile phone safe function for functional mobile phone platform acquiescence, that is, start shooting and just start shooting into fashionable input password, afterwards
Without input password unlock (including screen locking) during using mobile phone, it is easy to the privacy content of user is revealed, especially,
The protection for short breath, address list, message registration, file management, photograph album information etc., the present invention are not based on function machine platform
MTK6260 platforms, the privacy lock function menu in functional mobile phone main menu is realized by software.Open some part privacy lock
When, correspondence is required for locking into relevant interface.
Upper lock control is carried out for each application process entrance, specific process is as follows:
First, short message
(1) in short message main menu/call send short message/message registration in send short message/from contact person send short message
(2) standby interface check unread short messages/from dialing interface option send short message/from address list group send it is short
Letter
(3) from dialing interface option send short message/from address list group send short message/short message sending network address
(4) contact person mark servel send short message
(5) direction shortcut enters inbox/Sent messages/messages menus/write short message interface
2nd, address list
(1) entry communication is recorded in address list/call in address list main menu/sos edit contacts/message registration
(2) preserve contact person/write from dialing and enter contact person in short message advance and add name/number
(3) the address list selection directory number in short message addition receiver/setting-mobile phone setting-blacklist is write
(4) direction shortcut addition contact person
(5) address list privacy lock is opened, and dialing interface mismatches contact person in mobile phone
3rd, message registration
(1) message registration is entered in message registration main menu/standby interface missed call/call
(2) direction shortcut enters Dialled calllog/Recive calllog/Recive calllog/all
calllog
4th, file management
(1) file management menu/video player menus/imagevier menus/recording menu/audioplayer dishes
It is single
(2) open state inserts USB into the file list/ bluetooths reception file of mobile phone disk/fm players
(3) contextual model selects the tinkle of bells/contact person the tinkle of bells/contact person head portrait/Ebook menus
(4) direction shortcut enters audioplayer/Sound record/imagevier
5th, keypad lock
(1) locking screen interface (needing input password to unlock when Unlock)
To sum up, by the upper lock control of the process that each application program uses to more than, the privacy of user is protected, prevents individual
The leakage of information, has the function that to protect privacy.
With reference to figure 2, in a preferred embodiment, the application program encryption method is further comprising the steps of:
In in the function terminal, the document cipher for opening document in the application program is set;
After the application program is entered, the request of the input of display one document cipher;
Obtain current document password input by user;
The current document password is matched with the document cipher;
When the current document password is consistent with the document cipher, the document in the application program is opened;
When the current document password and the document cipher are inconsistent, asking for the input document cipher is shown again
Ask.
With reference to figure 3, in a preferred embodiment, the application program encryption method is further comprising the steps of:
In in the function terminal, a count threshold, a time threshold are set;
A counter in the function terminal is opened, by the count value zero setting of the counter;
When the current document password and the document cipher are inconsistent, the count value is added 1;
Compare the count value and the radix threshold value;
When the count value exceedes the count threshold, the function terminal sends the prompting that reports an error.
With reference to figure 4, in a preferred embodiment, when the count value exceedes the count threshold, the function terminal
The step of reporting an error prompting is sent to further include:
Delete the document in the application program.
With reference to figure 2- Fig. 4, according to above-described embodiment, application program encryption method provided by the invention, can be added by three layers
Close mode realizes the privacy protection function of functional mobile phone:
(1) privacy application program is encrypted by password;
(2) short message in privacy application program, message registration, document, photo or video are encrypted by password.
(3) to prevent the reasons such as functional mobile phone loss from causing privacy to be invaded, when Password Input mistake exceedes n times, forever
The privacy information in privacy application program is deleted long.
Wherein, (1) is encrypted privacy application program by password;(2) by password in privacy application program
Short message, message registration, document, photo or video are encrypted, and when password input by user is correct, can check the private file
Image in folder and/or private file folder, when password bad input by user, prompts user to re-enter password.
Increase encryption rule on the basis of preceding two layers of encryption rule:(3) for prevent functional mobile phone lose etc. reason cause it is hidden
Private is invaded, when Password Input mistake exceedes n times, the privacy information in permanent delet privacy application program.As described above,
When password bad input by user, user is prompted to re-enter password, when user inputs the number of password mistake more than one
During fixed number value, the privacy information is deleted.For example, (can be set after Password Input mistake 10 times by User Defined), it is hidden to delete this
Personal letter ceases.
Deleting the method for the privacy information can be, a delete modules are set in functional mobile phone, when Password Input is wrong
When missing 10 times, trigger the module and delete the privacy information.
It is understood that the above method is applicable not only to the situation of the privacy Password Input mistake of application program, equally
Suitable for the situation of the privacy Password Input mistake of document in application program.
And/or increase encryption rule on the basis of preceding two layers of encryption rule:(3) it is to prevent the reasons such as functional mobile phone loss
Cause privacy to be invaded, report an error when Password Input mistake exceedes n times.As described above, when password bad input by user
When, prompt user to re-enter password, report an error when the number that user inputs password mistake exceedes certain numerical value, the mode to report an error
Can have None- identified file, file corruption, mess code, file there is no etc., privacy information is converted into unreadable file.
For example, the privacy image in photograph album is converted my unreadable file, its cipher mode has a variety of.Using PNG files as
Example, PNG-8 files are the PNG picture formats being widely used at present, and are mainly made of six bulks, PNG file marks, file header number
Terminate the order such as data IEND according to block IHDR, palette data block PLTE, video data block IDAT and image to arrange, pass through handle
PNG piecemeals, such as preceding one piece of 100 bytes, and then mono- piece of 1K, last one piece of remainder bytes, then upset block order, use
2byte records total length, 1byte records order, so as to fulfill encryption;Can also be according to Image-Width, Image-
The order of Height, Image-Depth write data to write data, or according to above-mentioned regular inverted order, with Image-Width,
Image-Height, Image-Depth order or inverted order write the cipher mode of data it is further preferred that being not easy to be cracked.
In a preferred embodiment, the application program includes short message, address list, message registration, file management, keypad lock
In one or more.
Based on above-mentioned steps, provided by the present invention for the application program encryption method of function terminal, selection needs to encrypt
Application program, and applied cryptography is set;When triggering enters application program, the request of the input applied cryptography of display one;Obtain
Current application password input by user;Current application password is matched with applied cryptography;When current application password with it is described
When applied cryptography is consistent, into application program;When current application password and applied cryptography are inconsistent, input application is shown again
The request of password.Based on MTK6260 platforms, by software realize to short message in functional mobile phone, address list, message registration, photo,
The encipherment protection using process of the application programs such as document, protects the privacy of user, prevents the leakage of personal information, reach protection
The effect of privacy.
With reference to figure 5, present invention also offers a kind of application program encryption system 100 for function terminal, the application
Program encryption system 100 includes:Password setup module 11, detection trigger module 12, request display module 13, password acquisition module
14th, password match module 15, application control module 16;
The password setup module 11, in the function terminal, selection needs encrypted one or more application program,
And the applied cryptography of the application program is set;
The detection trigger module 12, detects whether that triggering enters the application program;
The request display module 13, communicates to connect with the detection trigger module 12, when triggering applies journey into described
During sequence, the request of the input of display one applied cryptography;
The password acquisition module 14, obtains current application password input by user;
The password match module 15, communicates to connect with the password acquisition module 14, password setup module 11, by described in
Current application password is matched with the applied cryptography;
The application control module 16, communicates to connect with the password match module 15, when the current application password with
When the applied cryptography is consistent, into the application program;When the current application password and the applied cryptography are inconsistent,
The request for inputting the applied cryptography is shown again.
In a preferred embodiment, the application program encryption system 100 further includes document control module 17;
The document control module 17 includes:Password setting unit, request display unit, password acquiring unit, password
With unit, temperature control unit;
The password setting unit, in the function terminal, setting, the document for opening document in the application program is close
Code;
The request display unit, after the application program is entered, the request of the input of display one document cipher;
The password acquiring unit, obtains current document password input by user;
The password match unit, communicates to connect with the password setting unit, password acquiring unit, ought be above by described in
Shelves password is matched with the document cipher;
The document control unit, is connected with the password match unit communication, when the current document password with it is described
When document cipher is consistent, the document in the application program is opened;When the current document password and the document cipher
When inconsistent, the request for inputting the document cipher is shown again.
In a preferred embodiment, the application program encryption system 100 further includes super secondary processing module 18;
The super secondary processing module 18 includes:Threshold setting unit, count opening unit, count accumulated unit, count ratio
Compared with unit, super secondary processing unit;
The threshold setting unit, in the function terminal, sets a count threshold, a time threshold;
The counting opening unit, opens a counter in the function terminal, by the count value zero setting of the counter;
The counting accumulated unit, with it is described counting opening unit communication connection, when the current document password with it is described
When document cipher is inconsistent, the count value is added 1;
The counting comparing unit, with the threshold setting unit, counting accumulated unit communication connection, the counting
Value and the radix threshold value;
The super secondary processing unit, communicates to connect with the counting comparing unit, when the count value exceedes the counting
During threshold value, the function terminal sends the prompting that reports an error.
In a preferred embodiment, the super secondary processing unit, deletes the document in the application program.
In a preferred embodiment, the application program includes short message, address list, message registration, file management, keypad lock
In one or more.
Based on above-mentioned setting, provided by the present invention for the application program encryption system of function terminal, put down based on MTK6260
Platform, the use process to the application program such as short message, address list, message registration, photo, document in functional mobile phone is realized by software
Encipherment protection, protect the privacy of user, prevent the leakage of personal information, have the function that protect privacy.
It should be noted that the embodiment of the present invention has preferable implementation, and not the present invention is made any type of
Limitation, any one skilled in the art change or are modified to possibly also with the technology contents of the disclosure above equivalent effective
Embodiment, as long as without departing from the content of technical solution of the present invention, makees above example according to technical spirit of the invention
Any modification or equivalent variations and modification, in the range of still falling within technical solution of the present invention.
Claims (10)
1. a kind of application program encryption method for function terminal, it is characterised in that comprise the following steps:
In in the function terminal, selection needs encrypted one or more application program, and sets answering for the application program
Use password;
Detect whether that triggering enters the application program;
When triggering enters the application program, the request of the input of display one applied cryptography;
Obtain current application password input by user;
The current application password is matched with the applied cryptography;
When the current application password is consistent with the applied cryptography, into the application program;
When the current application password and the applied cryptography are inconsistent, the request for inputting the applied cryptography is shown again.
2. encryption method as claimed in claim 1, it is characterised in that
The application program encryption method is further comprising the steps of:
In in the function terminal, the document cipher for opening document in the application program is set;
After the application program is entered, the request of the input of display one document cipher;
Obtain current document password input by user;
The current document password is matched with the document cipher;
When the current document password is consistent with the document cipher, the document in the application program is opened;
When the current document password and the document cipher are inconsistent, the request for inputting the document cipher is shown again.
3. encryption method as claimed in claim 2, it is characterised in that
The application program encryption method is further comprising the steps of:
In in the function terminal, a count threshold, a time threshold are set;
A counter in the function terminal is opened, by the count value zero setting of the counter;
When the current document password and the document cipher are inconsistent, the count value is added 1;
Compare the count value and the radix threshold value;
When the count value exceedes the count threshold, the function terminal sends the prompting that reports an error.
4. encryption method as claimed in claim 3, it is characterised in that
When the count value exceedes the count threshold, the function terminal sends the step of reporting an error prompting and further includes:
Delete the document in the application program.
5. encryption method as claimed in claim 1, it is characterised in that
The application program includes the one or more in short message, address list, message registration, file management, keypad lock.
A kind of 6. application program encryption system for function terminal, it is characterised in that
The application program encryption system includes:Password setup module, detection trigger module, request display module, password obtain
Module, password match module, application control module;
The password setup module, in the function terminal, selection needs encrypted one or more application program, and sets
The applied cryptography of the application program;
The detection trigger module, detects whether that triggering enters the application program;
The request display module, communicates to connect with the detection trigger module, when triggering enters the application program, display
The request of the one input applied cryptography;
The password acquisition module, obtains current application password input by user;
The password match module, communicates to connect with the password acquisition module, password setup module, and the current application is close
Code is matched with the applied cryptography;
The application control module, communicates to connect with the password match module, when the current application password and the application
When password is consistent, into the application program;When the current application password and the applied cryptography are inconsistent, show again
Input the request of the applied cryptography.
7. encryption system as claimed in claim 6, it is characterised in that
The application program encryption system further includes document control module;
The document control module includes:Password setting unit, request display unit, password acquiring unit, password match unit,
Temperature control unit;
The password setting unit, in the function terminal, sets the document cipher for opening document in the application program;
The request display unit, after the application program is entered, the request of the input of display one document cipher;
The password acquiring unit, obtains current document password input by user;
The password match unit, communicates to connect with the password setting unit, password acquiring unit, and the current document is close
Code is matched with the document cipher;
The document control unit, is connected with the password match unit communication, when the current document password and the document
When password is consistent, the document in the application program is opened;When the current document password differs with the document cipher
During cause, the request for inputting the document cipher is shown again.
8. encryption system as claimed in claim 7, it is characterised in that
The application program encryption system further includes super secondary processing module;
The super secondary processing module includes:Threshold setting unit, count opening unit, count accumulated unit, count comparing unit,
Super secondary processing unit;
The threshold setting unit, in the function terminal, sets a count threshold, a time threshold;
The counting opening unit, opens a counter in the function terminal, by the count value zero setting of the counter;
The counting accumulated unit, communicates to connect with the counting opening unit, when the current document password and the document
When password is inconsistent, the count value is added 1;
The counting comparing unit, with the threshold setting unit, count accumulated unit communication connection, the count value with
The radix threshold value;
The super secondary processing unit, communicates to connect with the counting comparing unit, when the count value exceedes the count threshold
When, the function terminal sends the prompting that reports an error.
9. encryption system as claimed in claim 8, it is characterised in that
The super secondary processing unit, deletes the document in the application program.
10. encryption system as claimed in claim 6, it is characterised in that
The application program includes the one or more in short message, address list, message registration, file management, keypad lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711453428.1A CN107977558A (en) | 2017-12-28 | 2017-12-28 | A kind of application program encryption method and encryption system for function terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711453428.1A CN107977558A (en) | 2017-12-28 | 2017-12-28 | A kind of application program encryption method and encryption system for function terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107977558A true CN107977558A (en) | 2018-05-01 |
Family
ID=62007915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711453428.1A Pending CN107977558A (en) | 2017-12-28 | 2017-12-28 | A kind of application program encryption method and encryption system for function terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107977558A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158240A (en) * | 2021-04-02 | 2021-07-23 | 上海嵩恒网络科技股份有限公司 | Method and device for optimizing file decryption process, terminal and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104008348A (en) * | 2014-04-17 | 2014-08-27 | 小米科技有限责任公司 | Application program control method, application program control device and terminal |
CN104268453A (en) * | 2014-09-24 | 2015-01-07 | 可牛网络技术(北京)有限公司 | Method and device for application program safety management for terminal equipment, and terminal |
CN104504309A (en) * | 2015-01-09 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | Data encryption method and terminal for application program |
-
2017
- 2017-12-28 CN CN201711453428.1A patent/CN107977558A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104008348A (en) * | 2014-04-17 | 2014-08-27 | 小米科技有限责任公司 | Application program control method, application program control device and terminal |
CN104268453A (en) * | 2014-09-24 | 2015-01-07 | 可牛网络技术(北京)有限公司 | Method and device for application program safety management for terminal equipment, and terminal |
CN104504309A (en) * | 2015-01-09 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | Data encryption method and terminal for application program |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158240A (en) * | 2021-04-02 | 2021-07-23 | 上海嵩恒网络科技股份有限公司 | Method and device for optimizing file decryption process, terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
CN104933342B (en) | A kind of picture inspection method and mobile terminal | |
CN102467462B (en) | Method for protecting data stored in device and corresponding device | |
CN103186761B (en) | The fingerprint encryption method and its communication terminal of secret file | |
CN102447772A (en) | Privacy in mobile device communication | |
CN101026822A (en) | Method for protecting mobile phone private data | |
CN100473193C (en) | Mobile terminal with information secrecy function and secrecy method | |
CN102880560A (en) | User privacy data protection method and mobile terminal using user privacy data protection method | |
CN101507246A (en) | Data privacy on wireless communication terminal | |
CN101282535A (en) | Method and apparatus for protecting mobile terminal private information | |
CN106598777A (en) | Method and system used for saving and recovering deleted file, and mobile equipment | |
CN106231092A (en) | A kind of phone information security protection method | |
CN106936999A (en) | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently | |
JP7278345B2 (en) | Mobile terminal privacy protection method and protection device, and mobile terminal | |
CN105069344B (en) | mobile terminal locking method and device | |
US20120108217A1 (en) | Communication terminal, telephone directory resistering method, and communication terminal handling method | |
CN106101438A (en) | A kind of cellphone information protection lock | |
CN107977558A (en) | A kind of application program encryption method and encryption system for function terminal | |
JP5163042B2 (en) | Information processing apparatus, security countermeasure method, and computer program | |
CN101222706B (en) | Method for guaranteeing data information safety in mobile terminal | |
JP2004229240A (en) | Portable telephone | |
US20080159305A1 (en) | Virtual private communication devices and techniques | |
CN205829777U (en) | A kind of cellphone information protection lock | |
KR20070071389A (en) | A method of protection data for portable terminal | |
JP2013134556A (en) | Confidential information management system, information processing device, control method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180501 |
|
RJ01 | Rejection of invention patent application after publication |