CN103617382B - Method for secret protection and its device - Google Patents
Method for secret protection and its device Download PDFInfo
- Publication number
- CN103617382B CN103617382B CN201310597407.2A CN201310597407A CN103617382B CN 103617382 B CN103617382 B CN 103617382B CN 201310597407 A CN201310597407 A CN 201310597407A CN 103617382 B CN103617382 B CN 103617382B
- Authority
- CN
- China
- Prior art keywords
- user
- application program
- hidden
- password
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000012544 monitoring process Methods 0.000 claims abstract description 12
- 238000012545 processing Methods 0.000 claims description 9
- 230000008859 change Effects 0.000 claims description 4
- 238000013507 mapping Methods 0.000 description 8
- 230000008901 benefit Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000010008 shearing Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Abstract
The invention discloses a kind of method for secret protection and its device, wherein method includes receiving password or the program unique mark that user sets application program, the application program is encrypted;The application program being encrypted is hidden;The input information inputted in monitoring word TIP, inputs password or program unique mark progress password match that information is set with user by described, when user's input information meets password match rule, shows the application program being hidden.The device includes encrypting module, hidden module and display module.The method for secret protection and its device that the present invention is provided add the disguise of privacy application, reduce the risk that privacy content is found by other people.
Description
Technical field
The present invention relates to security technology area, and in particular to a kind of method for secret protection and its device.
Background technology
Intelligent mobile terminal(Including mobile phone, tablet personal computer etc.)The individual privacy information of user's a large number of users is contained,
For example, address list, photo, video recording and recording etc..If intelligent mobile terminal is obtained by others, these information, which will face, is let out
The risk of dew.Therefore, in the urgent need to the technical problem that those skilled in the art solve is that:How on intelligent mobile terminal
The information realization protected as privacy information is needed to be effectively protected.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on
State the method for secret protection and its device of problem.
Application program is set there is provided a kind of method for secret protection, including reception user according to one aspect of the present invention
The password or program unique mark put, the application program is encrypted;The application program being encrypted is entered
Row is hidden;The input information inputted in monitoring word TIP, the password that the input information is set with user or program
Unique mark carries out password match, when user's input information meets password match rule, shows the application journey being hidden
Sequence.
According to another aspect of the present invention there is provided a kind of privacy protection device, including encrypting module, user's correspondence is received
The password or program unique mark set with program, the application program is encrypted;Hidden module, to being encrypted
The application program be hidden;The input information inputted in display module, monitoring word TIP, the input is believed
The password or program unique mark that breath is set with user carry out password match, meet password match rule in user's input information
When, show the application program being hidden.
Method for secret protection and its device that the present invention is provided, first, receive the password that is set to application program of user or
Program unique mark, application program is encrypted, then, and the hiding instruction that reception user sends is carried out to the application program
Hide, finally, when user's input information meets password match rule, show the application program being hidden, so that
The application program of intelligent mobile terminal is more hidden, even if intelligent mobile terminal is browsed by other people, if not by password authentification,
Also the application program being hidden can not be shown, the disguise of privacy application is added, reduces and find privacy content by other people
Risk.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the schematic flow sheet of the method for secret protection provided according to one embodiment of the invention;
Fig. 2 shows the block diagram of the privacy protection device provided according to one embodiment of the invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Referring to Fig. 1, method for secret protection provided in an embodiment of the present invention, it may include following steps:
Password or program unique mark that step 10, reception user are set to application program, application program is encrypted.
When implementing, application program refers to the application program being arranged on intelligent mobile terminal, for example, address list,
The application programs such as dialing record, note, short message and picture library, these application programs have been commonly stored the individual privacy letter of user
Breath.Can certainly be the application program that other are installed on intelligent mobile terminal, for example, for preserving privacy of user content
(For example, privacy photo, short message, file etc.)Application program privacy application.For example, secret protection case, user can pass through
The password login pre-set is inputted to secret protection case, into privacy application, is then added in privacy photo or short message etc.
Hold.It is corresponding handle icon that these application programs are corresponding in intelligent mobile terminal.Pass through clicking operation icon, Ke Yijin
Enter corresponding application program.
When user enters corresponding application program, secret protection is provided for the application program.I.e.:User enters corresponding
After application program, corresponding Password Input frame can be ejected, user's input password, the operating system of intelligent mobile terminal receives user
The password set for application program, so that application program be encrypted.Password can be by 0-9 numeral, a-z letter or
Symbol(For example ,@, #, % or-etc. symbol)Deng the password of composition, or by gesture input information(For example, being by capturing object
One group of image that action process is obtained)The password of composition.
In one embodiment, the password or program unique mark that can be set to user further do password mapping processing,
Used during for password match.A kind of mode of password mapping processing is that the password that sets user or program unique mark are done
MD5 computings, and corresponding MD5 values are preserved, the first MD5 values can be defined as here.For example, what user's input was made up of character string
Password, then MD5 computings are carried out to the character string, corresponding MD5 values can be obtained.The another way of password mapping processing
It is that one specified file is encrypted for the password that is set with user or program unique mark, for example, can be to a text
This document is encrypted.
In one embodiment, can be not under same operating system, when different user enters different application
With application program, respective password or program unique mark are set.
In specific application environment, user enters after the corresponding application program of intelligent mobile terminal, can eject corresponding
Secret protection prompt message, prompt the user whether to be encrypted, if will if, point out user input corresponding password or
Program unique mark.
Step 20, the application program being encrypted is hidden.
When implementing, when user needs to be hidden the application program being encrypted, Android can be passed through
System api PackageManager setComponentEnabledSetting can realize hiden application icon:
PackageManager pm=MainActivity.this.getPackageManager();
ComponentName comName=getEntryComponentName();
pm.setComponentEnabledSetting(comName,
PackageManager.COMPONENT_ENABLED_STATE_DISABLED,
PackageManager.DONT_KILL_APP);
In specific application environment, the switch whether hidden can be set, secret protection is being set for application program
Afterwards, when switch may be selected for "ON" in user, then the application program can be hidden.Can certainly be default setting password or unique
To program default hidden after mark
The input information that inputs in step 30, monitoring word TIP, by the input information and user set it is close
Code or program unique mark carry out password match, and when user's input information meets password match rule, what display was hidden should
Use program.
In a specific implementation, the information of user's input in any application containing input frame is obtained;By user
The information of input does MD5 computings, obtains corresponding MD5 values(The MD5 values can be defined as the 2nd MD5 values);It will be produced in step 10
The first raw MD5 values and the 2nd MD5 values are compared, and the application program being hidden then is shown when both are identical.For example, by user
In any application inputing characters string containing input frame, then the character string is done into MD5 computings, corresponding MD5 values are obtained, will
The MD5 values that the MD5 values and step 10 are generated compare, if identical, then by checking, that is, show the application journey being hidden
Sequence.
In another specific implementation, the information of user's input in any application containing input frame is obtained;With with
Family inputs information to encrypted specified file is decrypted in step 10, when successful decryption, shows the application being hidden
Program.
In another specific implementation, the information of user's input in any application containing input frame is obtained;It will use
The password that is set with step 10 of information or program unique mark of family input be made whether it is identical compared, when identical, display quilt
Hiding application program.The password or program unique mark that the implementation step 10 is set are without the close of mapping processing
Code, therefore only need to the password that information is set with step 10 that inputs user or program unique mark is directly compared.
In another specific implementation, set when entering different application for different user for different application
The situation of respective password or program unique mark, can first receive user and set corresponding multiple passwords to different application
Or program unique mark, then when user's input information meets password match rule, search and input information pair with each user
The application program answered, and show the application program that is being searched and being hidden.For example, being run under an operating system many
Individual software, multiple application programs such as picture, photograph, music and video, then each user can apply journey to these
Sequence sets respective password(Each application program corresponds to setting and/storage of each user each to application program simultaneously
Content etc.), then each user will show application journey corresponding with the user when input information meets password match rule
Sequence(Including the user to content of the setting of application program and/storage etc.).So ensure that each selfishness of each user's correspondence
The independence and security of close application program.
In embodiment of above, obtain user's information of input in any application containing input frame and further comprise:
When user replicates or shears user's information of input in the application containing input frame, whether the information in monitoring clipbook is sent out
Changing, when the information in the clipbook changes, then obtains the information that clipbook is recorded.It can be protected by the step
Card shows the accuracy of concealing program, if because user's simply simple input information, can be with without duplication or shearing
It is considered that user is not desired to show concealing program, now need not also obtains the information of user's input, so that setting up password is verified.Such as
If fruit finds that user replicates or sheared to the information currently inputted, it now may be considered user and want to show concealing program, this
When obtain user input information so that setting up password verify.
Show that the application program being hidden may include:Only show the postrun application program being hidden;Or only show
Show the entrance for the application program launching being hidden;Or the postrun application program being hidden is shown, show simultaneously
The entrance for the application program launching being hidden, so as to facilitate user to be needed to be selected according to oneself.
Method for secret protection provided in an embodiment of the present invention, may also include a step, i.e., to user any containing defeated
Enter the information of input in the application of frame to be identified, judge whether user will show the application program being hidden, tied according to judgement
Fruit decides whether to carry out password match.Specific implementation can judge whether the information of user's input includes to be used to represent to use
Family thinks that startup display is hidden the identification information of application program, when containing identification information, judges that user will show what is be hidden
Application program, setting up password matching.The identification information can be numeral, letter and/or symbol.For example, can be using PW as a mark
Know information.After user inputs PW, it is possible to think that user wants to show the application program being hidden, and then the letter to subsequently inputting
Breath carries out corresponding password match.By setting identification information, maloperation can be prevented and related application program is shown.Example
Such as, the secret protection password of a hiding application program is 135, and we are when carrying out handset dialing, may be through conventional
To 135, then will now show the application program, unfavorable so is protected to privacy of user, so add after identification information,
It is prevented that maloperation and show the application program, i.e., user only have input identification information after, then input correlation password
Application program can be shown.
Method for secret protection provided in an embodiment of the present invention, first, receives password or journey that user is set to application program
Sequence unique mark, application program is encrypted, then, and the hiding instruction that reception user sends carries out hidden to the application program
Hide, finally, when user's input information meets password match rule, the application program being hidden is shown, so that intelligence
The application program of energy mobile terminal is more hidden, even if intelligent mobile terminal is browsed by other people, if not by password authentification,
The application program being hidden can not be shown, the disguise of privacy application is added, reduces the wind that privacy content is found by other people
Danger.
Referring to Fig. 2, privacy protection device provided in an embodiment of the present invention, it includes encrypting module 1, hidden module 2 and shown
Show module 3.Encrypting module 1 receives password or the program unique mark that user is set to application program, and application program is added
It is close.Hidden module 2 is used to receiving hiding instruction that user sends to being hidden to the application program being encrypted;Display
Module 3 is used to, when user's input information meets password match rule, show the application program being hidden.Wherein, password includes
The password being made up of numeral, letter or symbol, or by the password of gesture input information structure.
The privacy protection device may also include cryptographic handling module, and the cryptographic handling module, which is used in, receives user to applying journey
When password or program unique mark that sequence is set, password is done into password mapping processing.I.e. cryptographic handling module be further used for by
Password or program unique mark do MD5 computings, preserve the first MD5 values;Or specify text to one with password or program unique mark
Part is encrypted.
In one embodiment, display module 3 may include acquiring unit, comparing unit and display unit.Acquiring unit is used
In the information for obtaining user's input in any application containing input frame;The information that comparing unit is used to input user is done
MD5 computings, preserve the 2nd MD5 values;First MD5 values and the 2nd MD5 values are compared;Display unit is used to work as comparing unit ratio
Compared with result it is identical when, show the application program that is hidden.
In another embodiment, display module 3 may include acquiring unit, decryption unit and display unit.Wherein, obtain
Unit is used for the information for obtaining user's input in any application containing input frame;Decryption unit is used to input information with user
The specified file is decrypted;Display unit is used for when decryption unit successful decryption, shows the application program being hidden.
In another embodiment, display module 3 may include acquiring unit, comparing unit and display unit.Wherein, obtain
Unit is used for the information for obtaining user's input in any application containing input frame;Comparing unit is used for the letter for inputting user
Cease the password set with user or program unique mark is made whether identical compared;Display unit is used for what is compared when comparing unit
When being as a result identical, the application program being hidden is shown.
In another embodiment, encrypting module 1 sets corresponding multiple close for receiving user to different application
Code or program unique mark.So now display module 3 may include acquiring unit, comparing unit, searching unit and display unit.
Wherein, acquiring unit is used for the information for obtaining user's input in any application containing input frame;Comparing unit is used to use
The password or program unique mark that the information of family input is set with user are made whether identical compared;Searching unit is used in user
When input information meets password match rule, application program corresponding with user's input information is searched.Display unit is used to show
The application program that is being searched and being hidden.
In embodiment of above, display unit is further used to only show the postrun application journey being hidden
Sequence;Or only show the entrance for the application program launching being hidden;Or the postrun application program being hidden of display,
The entrance for the application program launching being hidden is shown simultaneously.
Acquiring unit in embodiment of above is further used for when user replicates or shears user containing input frame
Using upper input information when, monitoring clipbook in information whether change, when the information in the clipbook becomes
During change, the information that clipbook is recorded is obtained.
In order to further improve the accuracy of user password information checking, prevent user misoperation from causing hiding application journey
Sequence is shown, and privacy protection device provided in an embodiment of the present invention also includes judge module;The judge module is used for for user
The information of input is identified, and judges whether user will show the application program being hidden, according to judged result decide whether into
Row password match.Can be specifically that judge module judges whether the information of user's input is included for representing that user wants to start display
The identification information of application program is hidden, when containing identification information, judges that user will show the application program being hidden, is started
Password match.
Privacy protection device provided in an embodiment of the present invention, first, receives password or journey that user is set to application program
Sequence unique mark, application program is encrypted, then, and the hiding instruction that reception user sends carries out hidden to the application program
Hide, finally, when user's input information meets password match rule, the application program being hidden is shown, so that intelligence
The application program of energy mobile terminal is more hidden, even if intelligent mobile terminal is browsed by other people, if not by password authentification,
The application program being hidden can not be shown, the disguise of privacy application is added, reduces the wind that privacy content is found by other people
Danger.
A1, a kind of method for secret protection, including:
Password or program unique mark that user is set to application program are received, the application program is encrypted;
The application program being encrypted is hidden;
The input information inputted in monitoring word TIP, the password that the input information is set with user or program
Unique mark carries out password match, when user's input information meets password match rule, shows the application journey being hidden
Sequence.
A2, the method according to A1, the password include the password being made up of numeral, letter or symbol, or by gesture
Input the password of information structure.
A3, the method for secret protection according to A1, in addition to:
When receiving password or the program unique mark that user is set to application program, the password or program are uniquely marked
Password mapping processing is done in knowledge.
A4, the method for secret protection according to A3, it is described to do the password or program unique mark at password mapping
Reason includes:
The password or program unique mark are done into MD5 computings, and preserve the first MD5 values;Or
One specified file is encrypted with the password or program unique mark.
A5, the method according to A4, it is described when user's input information meets password match rule, what display was hidden
The application program includes:
Obtain the information of user's input in any application containing input frame;
The information that the user is inputted does MD5 computings, and preserves the 2nd MD5 values;
The first MD5 values and the 2nd MD5 values are compared, the application program being hidden then is shown when both are identical.
A6, the method according to A4, it is described when user's input information meets password match rule, what display was hidden
The application program includes:
Obtain the information of user's input in any application containing input frame;
With user input information the specified file is decrypted, when successful decryption, show be hidden it is described should
Use program.
A7, the method according to A1, it is described when user's input information meets password match rule, what display was hidden
The application program includes:
Obtain the information of user's input in any application containing input frame;
The information that user is inputted and the password or program unique mark be made whether it is identical compared, when identical, show
Show the application program being hidden.
A8, the method according to any one of A5-7, the acquisition user input in any application containing input frame
Information further comprise:
When user replicates or shears user's information of input in the application containing input frame, the letter in monitoring clipbook
Whether breath changes, when the information in the clipbook changes, then obtains the information that clipbook is recorded.
A9, the method according to any one of A5-7, the password or program that the reception user is set to application program are only
One mark further comprises:
Receive user and corresponding multiple passwords or program unique mark are set to different application.
A10, the method according to A9, described when user's input information meets password match rule, display is hidden
The application program further comprise:When user's input information meets password match rule, search and input information with user
Corresponding application program, and show the application program that is being searched and being hidden.
A11, the method according to any one of A1-7, in addition to the information inputted for user are identified, and judge to use
Whether family will show the application program being hidden, and be decided whether to carry out password match according to judged result.
A12, the method according to A11, it is described to be identified for the information that user inputs, judge whether user will show
Show that the application program being hidden includes:
Judging whether the information of user's input includes is used to represent that user wants to start the mark that display is hidden application program
Information, when containing the identification information, judges that user will show the application program being hidden, setting up password matching.
A13, the method according to A1, the application program that the display is hidden include:
Only show the postrun application program being hidden;Or
Only show the entrance for the application program launching being hidden;Or
The postrun application program being hidden of display, while showing entering for the application program launching being hidden
Mouthful.
B14, a kind of privacy protection device, including:
Encrypting module, receives password or program unique mark that user is set to application program, the application program is entered
Row encryption;
Hidden module, is hidden to the application program being encrypted;
The input information inputted in display module, monitoring word TIP, the input information is set with user
Password or program unique mark carry out password match, when user's input information meets password match rule, what display was hidden
The application program.
B15, the privacy protection device according to B14, the password include by numeral, letter or symbol constitute it is close
Code, or by the password of gesture input information structure.
B16, the privacy protection device according to B14, in addition to:
Cryptographic handling module, the password or program that the cryptographic handling module is set in reception user to application program is unique
During mark, the password or program unique mark are done into password mapping processing.
B17, the privacy protection device according to B16, the cryptographic handling module be further used for the password or
Program unique mark does MD5 computings, preserves the first MD5 values;Or with the password or program unique mark to a specified file
It is encrypted.
B18, the privacy protection device according to B16, the display module include:
Acquiring unit, obtains the information of user's input in any application containing input frame;
Comparing unit, the information that the user is inputted does MD5 computings, preserves the 2nd MD5 values;By the first MD5 values
It is compared with the 2nd MD5 values;
Display unit, when the comparing unit result of the comparison is identical, shows the application program being hidden.
B19, the privacy protection device according to B16, the display module include:
Acquiring unit, obtains the information of user's input in any application containing input frame;
Decryption unit, the specified file is decrypted with user's input information;
Display unit, when the decryption unit successful decryption, shows the application program being hidden.
B20, the privacy protection device according to B1, the display module include:
Acquiring unit, obtains the information of user's input in any application containing input frame;
Comparing unit, the information that user is inputted is made whether identical compared with the password or program unique mark;
Display unit, when the comparing unit result of the comparison is identical, shows the application program being hidden.
B21, the privacy protection device according to any one of B18-20, the acquiring unit are further used for when user is multiple
System or shearing user are in the application containing input frame during the information of input, and whether the information in monitoring clipbook changes,
When the information in the clipbook changes, the information that clipbook is recorded is obtained.
B22, the method according to any one of B18-B20, the encrypting module are further used for receiving user to difference
Application program sets corresponding multiple passwords or program unique mark.
B23, the method according to B22, the display module also include:
Searching unit, when user's input information meets password match rule, searches answer corresponding with user's input information
Use program.
B24, the method according to B23, the display unit are further used for showing being searched and are hidden
The application program.
B25, the privacy protection device according to any one of B14-B20, in addition to:
Judge module;The judge module, is identified for the information that user inputs, judges whether user will show quilt
Hiding application program, decides whether to carry out password match according to judged result.
B26, the privacy protection device according to B25, the judge module are further used for judging the letter of user's input
Whether breath, which includes, is used to represent that user wants that starting display is hidden the identification information of application program, when containing the identification information
When, judge that user will show the application program being hidden, setting up password matching.
B27, the privacy protection device according to B14, the display unit are further used for only showing postrun quilt
The hiding application program;Or
Only show the entrance for the application program launching being hidden;Or
The postrun application program being hidden of display, while showing entering for the application program launching being hidden
Mouthful.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system
Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various
Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the specification that this place is provided, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, exist
Above in the description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect
The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself
All as the separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any
Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power
Profit requires, made a summary and accompanying drawing)Disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
Replace.
Although in addition, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of be the same as Example does not mean in of the invention
Within the scope of and form different embodiments.For example, in the following claims, times of embodiment claimed
One of meaning mode can be used in any combination.
The present invention all parts embodiment can be realized with hardware, or with one or more processor run
Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor(DSP)Some in processing unit to realize pop-up according to embodiments of the present invention
Or some or all functions of whole parts.The present invention be also implemented as perform method as described herein one
Partly or completely equipment or program of device(For example, computer program and computer program product).It is such to realize this
The program of invention can be stored on a computer-readable medium, or can have the form of one or more signal.So
Signal can download and obtain from internet website, either provide or provided in any other form on carrier signal.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of some different elements and coming real by means of properly programmed computer
It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
Claims (16)
1. a kind of method for secret protection, it is characterised in that including:
Password or program unique mark that user is set to application program are received, the application program is encrypted;According to institute
The password or program unique mark for stating setting generate the first MD5 values;
The application program being encrypted is hidden;
The information of user's input in any application containing input frame is monitored and obtained, judges whether the information of user's input wraps
Containing for representing that user wants to start the identification information that display is hidden application program, decided whether to carry out password according to judged result
Matching;When containing the identification information, judge that user will show the application program being hidden, setting up password matching;
After setting up password matching, MD5 computings are done to the information that user inputs, corresponding MD5 values is obtained, is designated as the 2nd MD5 values,
When the first MD5 values, the 2nd MD5 values meet password match rule, the application program being hidden is shown.
2. according to the method described in claim 1, it is characterised in that the password includes what is be made up of numeral, letter or symbol
Password, or by the password of gesture input information structure.
3. method for secret protection according to claim 1, it is characterised in that the application program is encrypted, specifically
Including:
After the first MD5 values are generated, the first MD5 values are preserved;Or
One specified file is encrypted the password or program unique mark set with user.
4. according to the method described in claim 1, it is characterised in that meet password in the first MD5 values, the 2nd MD5 values
During with rule, the application program being hidden is shown, is specifically included:The 2nd MD5 values are compared with the first MD5 values
Compared with, when both are consistent, the application program that display is hidden.
5. the method according to claim any one of 1-4, it is characterised in that the acquisition user contains input frame any
Application on the information of input further comprise:
When user replicates or shears user's information of input in the application containing input frame, the information in monitoring clipbook is
It is no to change, when the information in the clipbook changes, then obtain the information that clipbook is recorded.
6. the method according to any one of Claims 1-4, it is characterised in that the reception user is set to application program
Password or program unique mark further comprise:
Receive user and corresponding multiple passwords or program unique mark are set to different application.
7. the method according to any one of Claims 1-4, meets password match in the first MD5 values, the 2nd MD5 values
When regular, the application program being hidden is shown, is specifically included:Application program corresponding with user's input information is searched, and
Show the application program that is being searched and being hidden.
8. the method according to any one of Claims 1-4, the application program that the display is hidden includes:
Only show the postrun application program being hidden;Or
Only show the entrance for the application program launching being hidden;Or
The postrun application program being hidden of display, while the entrance for the application program launching that display is hidden.
9. a kind of privacy protection device, it is characterised in that including:
Encrypting module, receives password or program unique mark that user is set to application program, the application program is added
Close processing;The password or program unique mark are done into MD5 computings, the first MD5 values are generated;
Hidden module, is hidden to the application program being encrypted;
Judge module, for user, the information of input is identified in any application with input frame, judges that user inputs
Information whether include and be used to represent that user wants that starting display is hidden the identification information of application program, when containing the mark letter
During breath, setting up password matching;
Display module, for after the judge module determines to carry out password match, MD5 computings to be done to the information that user inputs,
Corresponding MD5 values are obtained, the 2nd MD5 values are designated as, when the first MD5 values, the 2nd MD5 values meet password match rule, shown
Show the application program being hidden.
10. privacy protection device according to claim 9, the password include by numeral, letter or symbol constitute it is close
Code, or by the password of gesture input information structure.
11. privacy protection device according to claim 9, in addition to cryptographic handling module, the cryptographic handling module are used
In the password or program unique mark are done into MD5 computings, the first MD5 values are preserved;Or the password or program set with user is only
One specified file is encrypted one mark.
12. privacy protection device according to claim 11, the display module includes:
Acquiring unit, obtains the information of user's input in any application containing input frame;
Comparing unit, the information that the user is inputted does MD5 computings, preserves the 2nd MD5 values;By the first MD5 values and
Two MD5 values are compared;
Display unit, when the comparing unit result of the comparison is identical, shows the application program being hidden.
13. privacy protection device according to claim 12, the acquiring unit is further used for when user replicates or cuts
User is cut in the application containing input frame during the information of input, whether the information in monitoring clipbook changes, when described
When information in clipbook changes, the information that clipbook is recorded is obtained.
14. the privacy protection device according to claim any one of 9-12, the encrypting module, which is further used for receiving, to be used
Family sets corresponding multiple passwords or program unique mark to different application.
15. the privacy protection device according to claim 12 or 13, the display module also includes:
Searching unit, when user's input information meets password match rule, searches application journey corresponding with user's input information
Sequence, the display unit is further used for showing the application program that is being searched and being hidden.
16. the privacy protection device according to claim 12 or 13, the display unit is further used for only showing operation
The application program being hidden afterwards;Or
Only show the entrance for the application program launching being hidden;Or
The postrun application program being hidden of display, while the entrance for the application program launching that display is hidden.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310597407.2A CN103617382B (en) | 2013-11-22 | 2013-11-22 | Method for secret protection and its device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310597407.2A CN103617382B (en) | 2013-11-22 | 2013-11-22 | Method for secret protection and its device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103617382A CN103617382A (en) | 2014-03-05 |
CN103617382B true CN103617382B (en) | 2017-10-17 |
Family
ID=50168085
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310597407.2A Active CN103617382B (en) | 2013-11-22 | 2013-11-22 | Method for secret protection and its device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103617382B (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104520866B (en) * | 2014-03-31 | 2018-08-21 | 华为技术有限公司 | Method for secret protection and terminal device |
CN105205386A (en) * | 2014-06-25 | 2015-12-30 | 腾讯科技(深圳)有限公司 | Password protecting method and device for mobile terminal application program |
CN104182662B (en) * | 2014-08-22 | 2017-10-17 | 广东欧珀移动通信有限公司 | Hiding and deployment method, system and the mobile terminal of hide application program |
CN104182675A (en) * | 2014-08-26 | 2014-12-03 | 上海斐讯数据通信技术有限公司 | Mobile equipment terminal and application hiding system and application hiding and starting method thereof |
CN105426712A (en) * | 2014-09-04 | 2016-03-23 | 中兴通讯股份有限公司 | Application encryption method and apparatus |
CN105574423B (en) * | 2014-10-09 | 2021-05-04 | 中兴通讯股份有限公司 | Terminal equipment and file management method thereof |
CN104331648A (en) * | 2014-11-24 | 2015-02-04 | 上海斐讯数据通信技术有限公司 | Locking system, locking method, unlocking system and unlocking method for application |
CN104732125B (en) * | 2015-01-30 | 2017-12-22 | 努比亚技术有限公司 | The display methods and terminal of encryption information |
CN106161742B (en) * | 2015-04-02 | 2020-12-01 | 深圳市腾讯计算机系统有限公司 | Authentication method and authentication system of mobile terminal |
CN106156646B (en) * | 2015-04-03 | 2020-09-22 | 北京搜狗科技发展有限公司 | Information calling method and electronic equipment |
CN105631275B (en) * | 2015-04-15 | 2018-12-25 | 宇龙计算机通信科技(深圳)有限公司 | information display method, information display device and terminal |
CN104820540A (en) * | 2015-05-20 | 2015-08-05 | 北京奇虎科技有限公司 | Mobile terminal and software management method thereof |
CN105550866B (en) * | 2015-05-30 | 2020-05-19 | 宇龙计算机通信科技(深圳)有限公司 | Safety control method and device |
CN104933343A (en) * | 2015-07-01 | 2015-09-23 | 京东方科技集团股份有限公司 | Secrecy method and apparatus of application program, and electronic device |
CN105138887B (en) * | 2015-08-27 | 2018-07-27 | 宇龙计算机通信科技(深圳)有限公司 | A kind of input method of log-on message, device and terminal device |
US9996254B2 (en) * | 2015-09-23 | 2018-06-12 | Samsung Electronics Co., Ltd. | Hidden application icons |
CN105701373B (en) * | 2015-12-28 | 2019-08-30 | 东软集团股份有限公司 | The method and apparatus for opening ADB interface |
CN105760737A (en) * | 2016-02-23 | 2016-07-13 | 深圳市金立通信设备有限公司 | Control method for applications and terminal |
CN105844145A (en) * | 2016-04-19 | 2016-08-10 | 广州三星通信技术研究有限公司 | Method and equipment for managing passwords |
TWI584150B (en) * | 2016-05-17 | 2017-05-21 | 資通電腦股份有限公司 | Digital document locating method |
CN106066961A (en) * | 2016-05-27 | 2016-11-02 | 乐视控股(北京)有限公司 | A kind of object operation method and device |
JP6770588B2 (en) * | 2016-06-07 | 2020-10-14 | 華為技術有限公司Huawei Technologies Co.,Ltd. | Methods and terminals for enhancing information security |
CN106096449A (en) * | 2016-06-20 | 2016-11-09 | 乐视控股(北京)有限公司 | Document protection method and device |
CN107526487A (en) * | 2016-06-20 | 2017-12-29 | 阿里巴巴集团控股有限公司 | A kind of page operation method and device |
CN106095513B (en) * | 2016-06-22 | 2020-02-18 | 宇龙计算机通信科技(深圳)有限公司 | Application self-identification safe starting method and system |
CN106874718B (en) * | 2016-07-27 | 2020-12-15 | 创新先进技术有限公司 | Privacy processing method and device and terminal |
CN106502734A (en) * | 2016-10-13 | 2017-03-15 | 珠海市魅族科技有限公司 | A kind of control method of application program and equipment |
CN106570420B (en) * | 2016-11-08 | 2020-11-06 | 广州Tcl互联网小额贷款有限公司 | Secret code-based intelligent equipment privacy protection implementation method and system |
CN106791087A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | The storage method of information, device and equipment |
CN108881116A (en) * | 2017-05-11 | 2018-11-23 | 阿里巴巴集团控股有限公司 | Show the implementation method and device of sensitive information |
WO2019056338A1 (en) * | 2017-09-25 | 2019-03-28 | 深圳传音通讯有限公司 | Application hiding system, hiding method, and starting method |
CN107748843A (en) * | 2017-10-27 | 2018-03-02 | 上海京颐科技股份有限公司 | Application access method and device, storage medium, the terminal of medical care portable mobile termianl |
CN108319865B (en) * | 2018-01-17 | 2022-08-02 | 德天国际科技有限公司 | Privacy protection method based on multiple roles, storage medium and terminal equipment |
CN108769037B (en) * | 2018-06-04 | 2020-11-10 | 厦门集微科技有限公司 | Data processing method and device, computer storage medium and terminal |
CN110012149B (en) * | 2019-02-18 | 2022-02-25 | 深圳壹账通智能科技有限公司 | Application program management method, device, terminal and storage medium |
CN116627272B (en) * | 2023-07-21 | 2024-01-26 | 深圳市则成电子股份有限公司 | Touch control method and device and computer equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366105A (en) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal for implementing private space |
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8738934B2 (en) * | 2009-08-25 | 2014-05-27 | Keeper Security, Inc. | Method and apparatus for protecting account numbers and passwords |
CN102387181B (en) * | 2010-09-03 | 2015-09-23 | 腾讯科技(深圳)有限公司 | A kind of login method and entering device |
CN103377347B (en) * | 2012-04-24 | 2016-01-06 | 腾讯科技(深圳)有限公司 | File encryption, decryption method and device |
-
2013
- 2013-11-22 CN CN201310597407.2A patent/CN103617382B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366105A (en) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal for implementing private space |
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN103617382A (en) | 2014-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103617382B (en) | Method for secret protection and its device | |
ES2741513T3 (en) | Software based multi-channel polymorphic data obfuscation | |
KR102048756B1 (en) | Method and system for managing information on mobile devices | |
CN104125547B (en) | Handle the method and short message processing device of short message | |
CN103455761B (en) | File encryption and decryption method and device and electronic device | |
CN105530261B (en) | The guard method of privacy information and device | |
US8490861B1 (en) | Systems and methods for providing security information about quick response codes | |
CN111163094B (en) | Network attack detection method, network attack detection device, electronic device, and medium | |
CN105809000A (en) | Information processing method and electronic device | |
CN106030527B (en) | By the system and method for application notification user available for download | |
US20150047019A1 (en) | Information processing method and electronic device | |
CN105095758B (en) | Screen locking applied program processing method, device and mobile terminal | |
CN104915594B (en) | Application program operation method and device | |
US8485428B1 (en) | Systems and methods for providing security information about quick response codes | |
CN106100851A (en) | Password management system, intelligent wristwatch and cipher management method thereof | |
WO2014145186A1 (en) | Methods and apparatus for securing user input in a mobile device | |
CN112800401B (en) | Privacy processing method, privacy processing device and terminal | |
CN105162804A (en) | Communication information protection method and apparatus | |
CN106503570A (en) | The method and device of protection Root authority | |
WO2015154464A1 (en) | Encryption method and device | |
US8464343B1 (en) | Systems and methods for providing security information about quick response codes | |
CN105205415B (en) | The processing method and processing system of file | |
CN106685791B (en) | Secret information sending method and device | |
TW201833759A (en) | Contact information display method and device, and information display method and device | |
US10909245B1 (en) | Secure quarantine of potentially malicious content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220801 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |
|
TR01 | Transfer of patent right |