CN102752751A - Protection method and device for application - Google Patents

Protection method and device for application Download PDF

Info

Publication number
CN102752751A
CN102752751A CN2012102233863A CN201210223386A CN102752751A CN 102752751 A CN102752751 A CN 102752751A CN 2012102233863 A CN2012102233863 A CN 2012102233863A CN 201210223386 A CN201210223386 A CN 201210223386A CN 102752751 A CN102752751 A CN 102752751A
Authority
CN
China
Prior art keywords
application
portable terminal
user
intended application
crytpographic key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102233863A
Other languages
Chinese (zh)
Other versions
CN102752751B (en
Inventor
付妮宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201210223386.3A priority Critical patent/CN102752751B/en
Publication of CN102752751A publication Critical patent/CN102752751A/en
Application granted granted Critical
Publication of CN102752751B publication Critical patent/CN102752751B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a protection method and device for an application. The method comprises the following steps: firstly enabling a mobile terminal to acquire a target application which is selected by a user and corresponds to the application to be encrypted; then enabling the mobile terminal to establish a encryption relation between the application to be encrypted and the target application; and finally, using the mobile terminal to save an encryption password of the application, which is set by the user. Thus, the encryption process of the application is completed. The invention is suitable for the field of communication systems.

Description

Guard method and the device used
Technical field
The present invention relates to the communication system field, particularly a kind of guard method of application and device.
Background technology
Along with the development of portable terminal, the performance of portable terminal constantly improves, simultaneously, use in the portable terminal also more and more, this just make the application of storing in the portable terminal and use in informational needs effectively protect.At present, when the application in the portable terminal is encrypted, can only directly encrypt for the application that needs protection.Yet when the Crypted password of using is stolen, just can directly obtains the information in the application easily, thereby cause the leakage of data message, make that the security reliability of portable terminal is not high.
Summary of the invention
The embodiment of the invention provides a kind of guard method and device of application, has improved the security reliability of portable terminal.
The technical scheme that the embodiment of the invention adopts is:
A kind of guard method of application comprises:
Portable terminal obtains the intended application corresponding with needing encrypted applications that the user selects;
Said portable terminal is set up the said encrypt relation that needs encrypted applications and said intended application;
Said portable terminal is preserved the said Crypted password that needs encrypted applications that said user is provided with.
A kind of protective device of application comprises:
Acquiring unit is used to obtain the intended application corresponding with needing encrypted applications that the user selects;
Set up the unit, be used to set up the said encrypt relation that needs encrypted applications and said intended application;
Preserve the unit, be used to preserve the Crypted password of the said application that said user is provided with.
The guard method of the application that the embodiment of the invention provides and device; At first portable terminal obtains the intended application corresponding with needing encrypted applications that the user selects; Portable terminal is set up the said encrypt relation that needs encrypted applications and said intended application then, and last portable terminal is preserved the Crypted password of the said application of said user's setting.Thereby accomplish ciphering process to using.The mode of data encryption is at present normally directly encrypted for the application that needs protection; Yet when the Crypted password of using is stolen; Just can directly obtain the data message in the application easily, thereby cause the leakage of data message, make that the security reliability of portable terminal is not high.The guard method of the application that the embodiment of the invention provides and device are realized the encryption to using through the mode of striding application, i.e. the input of applied cryptography enters the mouth in other are used, thereby have improved the security reliability of portable terminal.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
The guard method flow chart of the application that Fig. 1 provides for the embodiment of the invention one;
The protective device structural representation of the application that Fig. 2 provides for the embodiment of the invention one;
The guard method flow chart of the application that Fig. 3 provides for the embodiment of the invention two;
The protective device structural representation of the application that Fig. 4 provides for the embodiment of the invention two.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making all other embodiment that obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
For the advantage that makes technical scheme of the present invention is clearer, the present invention is elaborated below in conjunction with accompanying drawing and embodiment.
Embodiment one
Present embodiment provides a kind of guard method of application, and is as shown in Figure 1, and said method comprises:
101, portable terminal obtains the intended application corresponding with needing encrypted applications that the user selects.
Wherein, said intended application can be picture, file, music etc.
102, said portable terminal is set up the said encrypt relation that needs encrypted applications and said intended application.
Wherein, before the said encrypt relation that needs encrypted applications and said intended application was removed, said intended application can not be by editor or deletion, thereby guaranteed the reliability of said application encipher.
Further; When thereby the user to need mark and needs encrypted applications to set up the intended application of encrypt relation in order to strengthen remembering; Portable terminal can come intended application is carried out mark through the identifier of user's indication, and concrete forms of identifier the present invention does not do qualification.
103, portable terminal is preserved the Crypted password of the said application of said user's setting.
The guard method of the application that provides for the embodiment of the invention, particularly application scenarios can for: the calendar application of storage calendar information has been set up encrypt relation with the A picture in the atlas application, and the password that portable terminal has been preserved calendar application is 123.When needs were deciphered calendar application, at first whether the picture selected of judges was correct for portable terminal, if when the picture that the user selects is picture A; Said portable terminal ejects decryption interface; Import clear crytpographic key with the prompting user, when the password of portable terminal judges input was 123, portable terminal was opened the interface of calendar application; When the password of portable terminal judges input was not 123, portable terminal interrupted decrypting process.
Present embodiment provides a kind of protective device of application, and is as shown in Figure 2, and the entity of said device can be portable terminal, and said device comprises: acquiring unit 21, set up unit 22, preserve unit 23.
Acquiring unit 21 can be used to obtain the intended application corresponding with needing encrypted applications that the user selects.
Wherein, said intended application can be picture, file, music etc.
Set up unit 22, can be used to set up the said encrypt relation that needs encrypted applications and said intended application.
Wherein, before the said encrypt relation that needs encrypted applications and said intended application was removed, said picture can not be by editor or deletion, thereby guaranteed the reliability of said application encipher.
Further; When thereby user terminal to need mark and needs encrypted applications to set up the intended application of encrypt relation in order to strengthen remembering; Portable terminal can come intended application is carried out mark through the identifier of user's indication, and concrete forms of identifier the present invention does not do qualification.
Preserve unit 23, can be used to preserve the Crypted password of the said application that said user is provided with.
Described in the guard method that the concrete application scenarios of the protective device that the embodiment of the invention provides can provide like the embodiment of the invention, do not giving unnecessary details at this.
The guard method of the application that the embodiment of the invention provides and device; At first portable terminal obtains the intended application corresponding with needing encrypted applications that the user selects; Portable terminal is set up the said encrypt relation that needs encrypted applications and said intended application then, and last portable terminal is preserved the Crypted password of the said application of said user's setting.Thereby accomplish ciphering process to using.The mode of data encryption is at present normally directly encrypted for the application that needs protection; Yet when the Crypted password of using is stolen; Just can directly obtain the data message in the application easily, thereby cause the leakage of data message, make that the security reliability of portable terminal is not high.The guard method of the application that the embodiment of the invention provides and device are realized the encryption to using through the mode of striding application, i.e. the input of applied cryptography enters the mouth in other are used, thereby have improved the security reliability of portable terminal.
Embodiment two
Present embodiment provides a kind of guard method of application, and is as shown in Figure 3, and said method comprises:
301, portable terminal obtains the intended application corresponding with needing encrypted applications that the user selects.
Wherein, said intended application can be picture, file, music etc.
302, said portable terminal is set up the said encrypt relation that needs encrypted applications and said intended application.
Wherein, before the said encrypt relation that needs encrypted applications and said intended application was removed, said intended application can not be by editor or deletion, thereby guaranteed the reliability of said application encipher.
Further; When thereby the user to need mark and needs encrypted applications to set up the intended application of encrypt relation in order to strengthen remembering; Portable terminal can come intended application is carried out mark through the identifier of user's indication, and concrete forms of identifier the present invention does not do qualification.
303, said portable terminal is preserved the Crypted password of the said application of said user's setting.
304, when the application need after the said encryption is deciphered, said portable terminal obtains the application that said user selects, and judges whether the application that said user selects is said intended application.
305a, when said user select be applied as said intended application the time, said portable terminal generates information.
Wherein, said information is imported the information of clear crytpographic key for the said user of indication.
305b, when said portable terminal judges that the application of said user terminal selecting is not said intended application, said portable terminal interrupts decrypting process.
306a, said portable terminal obtain the clear crytpographic key of said user's input, and judge whether said clear crytpographic key is identical with said Crypted password.
307a, when said clear crytpographic key is identical with said Crypted password, said portable terminal is deciphered said encrypted applications.
307b, judge said clear crytpographic key and said Crypted password not simultaneously when said portable terminal, said portable terminal interrupts decrypting process.
The guard method of the application that provides for the embodiment of the invention; Application scenarios can have been set up encrypt relation for: the contact application of storing contact information and the atlas B picture in using particularly, and the password that portable terminal has been preserved contact application is 456.When needs were deciphered contact application, at first whether the picture selected of judges was correct for portable terminal, if when the picture that the user selects is picture B; Said portable terminal ejects decryption interface; Import clear crytpographic key with the prompting user, when the password of portable terminal judges input was 456, portable terminal was opened the interface of contact application; When the password of portable terminal judges terminal input was not 456, portable terminal interrupted decrypting process.
Present embodiment provides a kind of protective device of application; As shown in Figure 4; The entity of said device can be portable terminal, and said device comprises: acquiring unit 41, set up unit 42, preserve unit 43, identify unit 44, generation unit 45, judging unit 46, open unit 47, terminal unit 48.
Acquiring unit 41 can be used to obtain the intended application corresponding with needing encrypted applications that the user selects.
Wherein, said intended application can be picture, file, music etc.
Acquiring unit 41 can also be used for when the application need after the said encryption is deciphered, and obtains the application that said user selects, and judges whether the application that said user selects is said intended application.
Set up unit 42, can be used to set up the said encrypt relation that needs encrypted applications and said intended application.
Wherein, before the said encrypt relation that needs encrypted applications and said intended application was removed, said intended application can not be by editor or deletion, thereby guaranteed the reliability of said application encipher.
Further; When thereby the user to need mark and needs encrypted applications to set up the intended application of encrypt relation in order to strengthen remembering; Portable terminal can come intended application is carried out mark through the identifier of user's indication, and concrete forms of identifier the present invention does not do qualification.
Preserve unit 43, can be used to preserve the Crypted password of the said application that said user is provided with.
Identify unit 44 can be used for when said user needs the said intended application of mark, and the identifier of indicating according to said user identifies said intended application.
Generation unit 45, can be used for when said user select be applied as said intended application the time, generate information.
Wherein, said information is imported the information of clear crytpographic key for the said user of indication.
Judging unit 46 can be used to obtain the clear crytpographic key of said user's input, and judge whether said clear crytpographic key is identical with said Crypted password.
Open unit 47, can be used for when said clear crytpographic key is identical with said Crypted password, opening said encrypted applications.
Interrupt location 48 can be used to judge that the application that said user selects is not that said intended application or said portable terminal are judged said clear crytpographic key and said Crypted password not simultaneously, interrupts decrypting process.
Described in the guard method that the concrete application scenarios of the protective device that the embodiment of the invention provides can provide like the embodiment of the invention, do not giving unnecessary details at this.
The guard method of the application that the embodiment of the invention provides and device; At first portable terminal obtains the intended application corresponding with needing encrypted applications that the user selects; Portable terminal is set up the said encrypt relation that needs encrypted applications and said intended application then, and last portable terminal is preserved the Crypted password of the said application of said user's setting.Thereby accomplish ciphering process to using.The mode of data encryption is at present normally directly encrypted for the application that needs protection; Yet when the Crypted password of using is stolen; Just can directly obtain the data message in the application easily, thereby cause the leakage of data message, make that the security reliability of portable terminal is not high.The guard method of the application that the embodiment of the invention provides and device are realized the encryption to using through the mode of striding application, i.e. the input of applied cryptography enters the mouth in other are used, thereby have improved the security reliability of portable terminal.
The protective device of the application that the embodiment of the invention provides can be realized the above-mentioned method embodiment that provides, and concrete function is realized seeing also the explanation among the method embodiment, repeats no more at this.The guard method of the application that the embodiment of the invention provides and device go for the communication system field, but are not limited only to this.
One of ordinary skill in the art will appreciate that all or part of flow process that realizes in the foregoing description method; Be to instruct relevant hardware to accomplish through computer program; Described program can be stored in the computer read/write memory medium; This program can comprise the flow process like the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only storage memory body (Read-Only Memory, ROM) or at random store memory body (Random Access Memory, RAM) etc.
The above; Be merely embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technical staff who is familiar with the present technique field is in the technical scope that the present invention discloses; The variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (10)

1. the guard method of an application is characterized in that, comprising:
Portable terminal obtains the intended application corresponding with needing encrypted applications that the user selects;
Said portable terminal is set up the said encrypt relation that needs encrypted applications and said intended application;
Said portable terminal is preserved the said Crypted password that needs encrypted applications that said user is provided with.
2. the guard method of application according to claim 1 is characterized in that, also comprises:
When said portable terminal was not removed the said encrypt relation that needs encrypted applications and said intended application, said intended application can not edited or delete to said portable terminal.
3. the guard method of application according to claim 1 is characterized in that, also comprises:
When said user needed the said intended application of mark, said portable terminal identified said intended application according to the identifier of said user's indication.
4. the guard method of application according to claim 1 is characterized in that, also comprises:
When the application need after the said encryption was deciphered, said portable terminal obtained the application that said user selects, and judged whether the application that said user selects is said intended application;
When said user select be applied as said intended application the time, said portable terminal generates information, wherein, said information is imported the information of clear crytpographic key for the said user of indication;
Said portable terminal obtains the clear crytpographic key of said user's input, and judges whether said clear crytpographic key is identical with said Crypted password;
When said clear crytpographic key was identical with said Crypted password, said portable terminal was opened said encrypted applications.
5. the guard method of application according to claim 4 is characterized in that, also comprises:
Judge that when said portable terminal the application that said user selects is not that said intended application or said portable terminal are judged said clear crytpographic key and said Crypted password not simultaneously, said portable terminal interrupts decrypting process.
6. the protective device of an application is characterized in that, comprising:
Acquiring unit is used to obtain the intended application corresponding with needing encrypted applications that the user selects;
Set up the unit, be used to set up the said encrypt relation that needs encrypted applications and said intended application;
Preserve the unit, be used to preserve the Crypted password of the said application that said user is provided with.
7. the protective device of application according to claim 6 is characterized in that, when the said encrypt relation that needs encrypted applications and said intended application was not removed, said intended application can not be by editor or deletion.
8. the protective device of application according to claim 6 is characterized in that, also comprises:
Identify unit is used for when said user needs the said intended application of mark, and the identifier of indicating according to said user identifies said intended application.
9. the protective device of application according to claim 6 is characterized in that,
Said acquiring unit also is used for when the application need after the said encryption is deciphered, and obtains the application that said user selects, and judges whether the application that said user selects is said intended application;
Generation unit, be used for when said user select be applied as said intended application the time, generate information, wherein, said information is imported the information of clear crytpographic key for the said user of indication;
Judging unit is used to obtain the clear crytpographic key of said user's input, and judges whether said clear crytpographic key is identical with said Crypted password;
Open the unit, be used for when said clear crytpographic key is identical with said Crypted password, opening said encrypted applications.
10. the protective device of application according to claim 6 is characterized in that, also comprises:
Interrupt location is used to judge that the application that said user selects is not said intended application or judges said clear crytpographic key and said Crypted password not simultaneously, interrupts decrypting process.
CN201210223386.3A 2012-06-29 2012-06-29 The guard method of application and device Active CN102752751B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210223386.3A CN102752751B (en) 2012-06-29 2012-06-29 The guard method of application and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210223386.3A CN102752751B (en) 2012-06-29 2012-06-29 The guard method of application and device

Publications (2)

Publication Number Publication Date
CN102752751A true CN102752751A (en) 2012-10-24
CN102752751B CN102752751B (en) 2015-08-12

Family

ID=47032602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210223386.3A Active CN102752751B (en) 2012-06-29 2012-06-29 The guard method of application and device

Country Status (1)

Country Link
CN (1) CN102752751B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982289A (en) * 2012-11-14 2013-03-20 广东欧珀移动通信有限公司 Method of data protection and mobile intelligent terminal
CN103763091A (en) * 2014-01-09 2014-04-30 深圳市欧珀通信软件有限公司 Encrypting method, decrypting method, encrypting device and decrypting device of application program
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application
CN103929312A (en) * 2014-04-29 2014-07-16 深圳市中兴移动通信有限公司 Mobile terminal and method and system for protecting individual information of mobile terminal
CN103973901A (en) * 2014-05-28 2014-08-06 深圳市中兴移动通信有限公司 Device and method for automatically executing calendar events
CN106648583A (en) * 2016-09-22 2017-05-10 依偎科技(南昌)有限公司 Information processing method and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645123A (en) * 2009-08-26 2010-02-10 西安电子科技大学 Identity certification system and method of hand-held mobile equipment with touch screen
CN101650769A (en) * 2009-09-10 2010-02-17 宇龙计算机通信科技(深圳)有限公司 Methods and systems for encrypting and decrypting data and electronic equipment
CN101695107A (en) * 2009-10-09 2010-04-14 北京数码视讯科技股份有限公司 Method of soft keyboard for safely inputting code of set top box of digital television
CN101950403A (en) * 2010-09-15 2011-01-19 中国工商银行股份有限公司 Data processing method, device and system based on internet banking

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645123A (en) * 2009-08-26 2010-02-10 西安电子科技大学 Identity certification system and method of hand-held mobile equipment with touch screen
CN101650769A (en) * 2009-09-10 2010-02-17 宇龙计算机通信科技(深圳)有限公司 Methods and systems for encrypting and decrypting data and electronic equipment
CN101695107A (en) * 2009-10-09 2010-04-14 北京数码视讯科技股份有限公司 Method of soft keyboard for safely inputting code of set top box of digital television
CN101950403A (en) * 2010-09-15 2011-01-19 中国工商银行股份有限公司 Data processing method, device and system based on internet banking

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982289A (en) * 2012-11-14 2013-03-20 广东欧珀移动通信有限公司 Method of data protection and mobile intelligent terminal
CN103763091A (en) * 2014-01-09 2014-04-30 深圳市欧珀通信软件有限公司 Encrypting method, decrypting method, encrypting device and decrypting device of application program
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application
CN103778363B (en) * 2014-01-20 2015-09-30 宇龙计算机通信科技(深圳)有限公司 The guard method of mobile terminal and application
CN103929312A (en) * 2014-04-29 2014-07-16 深圳市中兴移动通信有限公司 Mobile terminal and method and system for protecting individual information of mobile terminal
CN103973901A (en) * 2014-05-28 2014-08-06 深圳市中兴移动通信有限公司 Device and method for automatically executing calendar events
CN106648583A (en) * 2016-09-22 2017-05-10 依偎科技(南昌)有限公司 Information processing method and terminal

Also Published As

Publication number Publication date
CN102752751B (en) 2015-08-12

Similar Documents

Publication Publication Date Title
CN102752751A (en) Protection method and device for application
US20170046281A1 (en) Address dependent data encryption
CN101231622B (en) Data storage method and equipment base on flash memory, as well as data fetch method and apparatu
EP3291124A1 (en) Electronic data protection method and device, and terminal device
JPWO2003034651A1 (en) Content processing apparatus and content protection program
CN101916342A (en) Secure mobile storage device and method for realizing secure data exchange by using same
JP2007522707A (en) Backup and restoration of DRM security data
CN103793334A (en) Mobile storage device based data protecting method and mobile storage device
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
CN109816383A (en) A kind of block chain endorsement method, block chain wallet and block chain
CN103107887A (en) Method and device for controlling files based on position information
CN109981266B (en) Method and device for storing and reading key and sensitive information
CN101815292B (en) Device and method for protecting data of mobile terminal
CN109450620A (en) The method and mobile terminal of security application are shared in a kind of mobile terminal
CN104751064A (en) Document encryption prompting method and document encryption prompting system
CN104268458A (en) Vehicle program encrypting and verifying method and device
CN103929312A (en) Mobile terminal and method and system for protecting individual information of mobile terminal
CN101174941B (en) Off-line digital copyright protection method and device for mobile terminal document
CN109344656B (en) Database data encryption/decryption method, device and equipment
CN103177224A (en) Data protection method and device used for terminal external storage card
CN103473512A (en) Mobile storage medium management method and mobile storage medium management device
CN105574432A (en) Key processing method and system for virtual disk
CN102426637B (en) A kind of embedded database cryptographic storage method
CN110008724B (en) Solid state hard disk controller safe loading method and device and storage medium
CN105243332A (en) Encryption method and apparatus as well as kernel encryption data operation method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant