CN103617382B - Method for secret protection and its device - Google Patents

Method for secret protection and its device Download PDF

Info

Publication number
CN103617382B
CN103617382B CN201310597407.2A CN201310597407A CN103617382B CN 103617382 B CN103617382 B CN 103617382B CN 201310597407 A CN201310597407 A CN 201310597407A CN 103617382 B CN103617382 B CN 103617382B
Authority
CN
China
Prior art keywords
user
application program
hidden
password
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310597407.2A
Other languages
Chinese (zh)
Other versions
CN103617382A (en
Inventor
沈海寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310597407.2A priority Critical patent/CN103617382B/en
Publication of CN103617382A publication Critical patent/CN103617382A/en
Application granted granted Critical
Publication of CN103617382B publication Critical patent/CN103617382B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Abstract

The invention discloses a kind of method for secret protection and its device, wherein method includes receiving password or the program unique mark that user sets application program, the application program is encrypted;The application program being encrypted is hidden;The input information inputted in monitoring word TIP, inputs password or program unique mark progress password match that information is set with user by described, when user's input information meets password match rule, shows the application program being hidden.The device includes encrypting module, hidden module and display module.The method for secret protection and its device that the present invention is provided add the disguise of privacy application, reduce the risk that privacy content is found by other people.

Description

Method for secret protection and its device
Technical field
The present invention relates to security technology area, and in particular to a kind of method for secret protection and its device.
Background technology
Intelligent mobile terminal(Including mobile phone, tablet personal computer etc.)The individual privacy information of user's a large number of users is contained, For example, address list, photo, video recording and recording etc..If intelligent mobile terminal is obtained by others, these information, which will face, is let out The risk of dew.Therefore, in the urgent need to the technical problem that those skilled in the art solve is that:How on intelligent mobile terminal The information realization protected as privacy information is needed to be effectively protected.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State the method for secret protection and its device of problem.
Application program is set there is provided a kind of method for secret protection, including reception user according to one aspect of the present invention The password or program unique mark put, the application program is encrypted;The application program being encrypted is entered Row is hidden;The input information inputted in monitoring word TIP, the password that the input information is set with user or program Unique mark carries out password match, when user's input information meets password match rule, shows the application journey being hidden Sequence.
According to another aspect of the present invention there is provided a kind of privacy protection device, including encrypting module, user's correspondence is received The password or program unique mark set with program, the application program is encrypted;Hidden module, to being encrypted The application program be hidden;The input information inputted in display module, monitoring word TIP, the input is believed The password or program unique mark that breath is set with user carry out password match, meet password match rule in user's input information When, show the application program being hidden.
Method for secret protection and its device that the present invention is provided, first, receive the password that is set to application program of user or Program unique mark, application program is encrypted, then, and the hiding instruction that reception user sends is carried out to the application program Hide, finally, when user's input information meets password match rule, show the application program being hidden, so that The application program of intelligent mobile terminal is more hidden, even if intelligent mobile terminal is browsed by other people, if not by password authentification, Also the application program being hidden can not be shown, the disguise of privacy application is added, reduces and find privacy content by other people Risk.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the schematic flow sheet of the method for secret protection provided according to one embodiment of the invention;
Fig. 2 shows the block diagram of the privacy protection device provided according to one embodiment of the invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Referring to Fig. 1, method for secret protection provided in an embodiment of the present invention, it may include following steps:
Password or program unique mark that step 10, reception user are set to application program, application program is encrypted.
When implementing, application program refers to the application program being arranged on intelligent mobile terminal, for example, address list, The application programs such as dialing record, note, short message and picture library, these application programs have been commonly stored the individual privacy letter of user Breath.Can certainly be the application program that other are installed on intelligent mobile terminal, for example, for preserving privacy of user content (For example, privacy photo, short message, file etc.)Application program privacy application.For example, secret protection case, user can pass through The password login pre-set is inputted to secret protection case, into privacy application, is then added in privacy photo or short message etc. Hold.It is corresponding handle icon that these application programs are corresponding in intelligent mobile terminal.Pass through clicking operation icon, Ke Yijin Enter corresponding application program.
When user enters corresponding application program, secret protection is provided for the application program.I.e.:User enters corresponding After application program, corresponding Password Input frame can be ejected, user's input password, the operating system of intelligent mobile terminal receives user The password set for application program, so that application program be encrypted.Password can be by 0-9 numeral, a-z letter or Symbol(For example ,@, #, % or-etc. symbol)Deng the password of composition, or by gesture input information(For example, being by capturing object One group of image that action process is obtained)The password of composition.
In one embodiment, the password or program unique mark that can be set to user further do password mapping processing, Used during for password match.A kind of mode of password mapping processing is that the password that sets user or program unique mark are done MD5 computings, and corresponding MD5 values are preserved, the first MD5 values can be defined as here.For example, what user's input was made up of character string Password, then MD5 computings are carried out to the character string, corresponding MD5 values can be obtained.The another way of password mapping processing It is that one specified file is encrypted for the password that is set with user or program unique mark, for example, can be to a text This document is encrypted.
In one embodiment, can be not under same operating system, when different user enters different application With application program, respective password or program unique mark are set.
In specific application environment, user enters after the corresponding application program of intelligent mobile terminal, can eject corresponding Secret protection prompt message, prompt the user whether to be encrypted, if will if, point out user input corresponding password or Program unique mark.
Step 20, the application program being encrypted is hidden.
When implementing, when user needs to be hidden the application program being encrypted, Android can be passed through System api PackageManager setComponentEnabledSetting can realize hiden application icon:
PackageManager pm=MainActivity.this.getPackageManager();
ComponentName comName=getEntryComponentName();
pm.setComponentEnabledSetting(comName,
PackageManager.COMPONENT_ENABLED_STATE_DISABLED,
PackageManager.DONT_KILL_APP);
In specific application environment, the switch whether hidden can be set, secret protection is being set for application program Afterwards, when switch may be selected for "ON" in user, then the application program can be hidden.Can certainly be default setting password or unique To program default hidden after mark
The input information that inputs in step 30, monitoring word TIP, by the input information and user set it is close Code or program unique mark carry out password match, and when user's input information meets password match rule, what display was hidden should Use program.
In a specific implementation, the information of user's input in any application containing input frame is obtained;By user The information of input does MD5 computings, obtains corresponding MD5 values(The MD5 values can be defined as the 2nd MD5 values);It will be produced in step 10 The first raw MD5 values and the 2nd MD5 values are compared, and the application program being hidden then is shown when both are identical.For example, by user In any application inputing characters string containing input frame, then the character string is done into MD5 computings, corresponding MD5 values are obtained, will The MD5 values that the MD5 values and step 10 are generated compare, if identical, then by checking, that is, show the application journey being hidden Sequence.
In another specific implementation, the information of user's input in any application containing input frame is obtained;With with Family inputs information to encrypted specified file is decrypted in step 10, when successful decryption, shows the application being hidden Program.
In another specific implementation, the information of user's input in any application containing input frame is obtained;It will use The password that is set with step 10 of information or program unique mark of family input be made whether it is identical compared, when identical, display quilt Hiding application program.The password or program unique mark that the implementation step 10 is set are without the close of mapping processing Code, therefore only need to the password that information is set with step 10 that inputs user or program unique mark is directly compared.
In another specific implementation, set when entering different application for different user for different application The situation of respective password or program unique mark, can first receive user and set corresponding multiple passwords to different application Or program unique mark, then when user's input information meets password match rule, search and input information pair with each user The application program answered, and show the application program that is being searched and being hidden.For example, being run under an operating system many Individual software, multiple application programs such as picture, photograph, music and video, then each user can apply journey to these Sequence sets respective password(Each application program corresponds to setting and/storage of each user each to application program simultaneously Content etc.), then each user will show application journey corresponding with the user when input information meets password match rule Sequence(Including the user to content of the setting of application program and/storage etc.).So ensure that each selfishness of each user's correspondence The independence and security of close application program.
In embodiment of above, obtain user's information of input in any application containing input frame and further comprise: When user replicates or shears user's information of input in the application containing input frame, whether the information in monitoring clipbook is sent out Changing, when the information in the clipbook changes, then obtains the information that clipbook is recorded.It can be protected by the step Card shows the accuracy of concealing program, if because user's simply simple input information, can be with without duplication or shearing It is considered that user is not desired to show concealing program, now need not also obtains the information of user's input, so that setting up password is verified.Such as If fruit finds that user replicates or sheared to the information currently inputted, it now may be considered user and want to show concealing program, this When obtain user input information so that setting up password verify.
Show that the application program being hidden may include:Only show the postrun application program being hidden;Or only show Show the entrance for the application program launching being hidden;Or the postrun application program being hidden is shown, show simultaneously The entrance for the application program launching being hidden, so as to facilitate user to be needed to be selected according to oneself.
Method for secret protection provided in an embodiment of the present invention, may also include a step, i.e., to user any containing defeated Enter the information of input in the application of frame to be identified, judge whether user will show the application program being hidden, tied according to judgement Fruit decides whether to carry out password match.Specific implementation can judge whether the information of user's input includes to be used to represent to use Family thinks that startup display is hidden the identification information of application program, when containing identification information, judges that user will show what is be hidden Application program, setting up password matching.The identification information can be numeral, letter and/or symbol.For example, can be using PW as a mark Know information.After user inputs PW, it is possible to think that user wants to show the application program being hidden, and then the letter to subsequently inputting Breath carries out corresponding password match.By setting identification information, maloperation can be prevented and related application program is shown.Example Such as, the secret protection password of a hiding application program is 135, and we are when carrying out handset dialing, may be through conventional To 135, then will now show the application program, unfavorable so is protected to privacy of user, so add after identification information, It is prevented that maloperation and show the application program, i.e., user only have input identification information after, then input correlation password Application program can be shown.
Method for secret protection provided in an embodiment of the present invention, first, receives password or journey that user is set to application program Sequence unique mark, application program is encrypted, then, and the hiding instruction that reception user sends carries out hidden to the application program Hide, finally, when user's input information meets password match rule, the application program being hidden is shown, so that intelligence The application program of energy mobile terminal is more hidden, even if intelligent mobile terminal is browsed by other people, if not by password authentification, The application program being hidden can not be shown, the disguise of privacy application is added, reduces the wind that privacy content is found by other people Danger.
Referring to Fig. 2, privacy protection device provided in an embodiment of the present invention, it includes encrypting module 1, hidden module 2 and shown Show module 3.Encrypting module 1 receives password or the program unique mark that user is set to application program, and application program is added It is close.Hidden module 2 is used to receiving hiding instruction that user sends to being hidden to the application program being encrypted;Display Module 3 is used to, when user's input information meets password match rule, show the application program being hidden.Wherein, password includes The password being made up of numeral, letter or symbol, or by the password of gesture input information structure.
The privacy protection device may also include cryptographic handling module, and the cryptographic handling module, which is used in, receives user to applying journey When password or program unique mark that sequence is set, password is done into password mapping processing.I.e. cryptographic handling module be further used for by Password or program unique mark do MD5 computings, preserve the first MD5 values;Or specify text to one with password or program unique mark Part is encrypted.
In one embodiment, display module 3 may include acquiring unit, comparing unit and display unit.Acquiring unit is used In the information for obtaining user's input in any application containing input frame;The information that comparing unit is used to input user is done MD5 computings, preserve the 2nd MD5 values;First MD5 values and the 2nd MD5 values are compared;Display unit is used to work as comparing unit ratio Compared with result it is identical when, show the application program that is hidden.
In another embodiment, display module 3 may include acquiring unit, decryption unit and display unit.Wherein, obtain Unit is used for the information for obtaining user's input in any application containing input frame;Decryption unit is used to input information with user The specified file is decrypted;Display unit is used for when decryption unit successful decryption, shows the application program being hidden.
In another embodiment, display module 3 may include acquiring unit, comparing unit and display unit.Wherein, obtain Unit is used for the information for obtaining user's input in any application containing input frame;Comparing unit is used for the letter for inputting user Cease the password set with user or program unique mark is made whether identical compared;Display unit is used for what is compared when comparing unit When being as a result identical, the application program being hidden is shown.
In another embodiment, encrypting module 1 sets corresponding multiple close for receiving user to different application Code or program unique mark.So now display module 3 may include acquiring unit, comparing unit, searching unit and display unit. Wherein, acquiring unit is used for the information for obtaining user's input in any application containing input frame;Comparing unit is used to use The password or program unique mark that the information of family input is set with user are made whether identical compared;Searching unit is used in user When input information meets password match rule, application program corresponding with user's input information is searched.Display unit is used to show The application program that is being searched and being hidden.
In embodiment of above, display unit is further used to only show the postrun application journey being hidden Sequence;Or only show the entrance for the application program launching being hidden;Or the postrun application program being hidden of display, The entrance for the application program launching being hidden is shown simultaneously.
Acquiring unit in embodiment of above is further used for when user replicates or shears user containing input frame Using upper input information when, monitoring clipbook in information whether change, when the information in the clipbook becomes During change, the information that clipbook is recorded is obtained.
In order to further improve the accuracy of user password information checking, prevent user misoperation from causing hiding application journey Sequence is shown, and privacy protection device provided in an embodiment of the present invention also includes judge module;The judge module is used for for user The information of input is identified, and judges whether user will show the application program being hidden, according to judged result decide whether into Row password match.Can be specifically that judge module judges whether the information of user's input is included for representing that user wants to start display The identification information of application program is hidden, when containing identification information, judges that user will show the application program being hidden, is started Password match.
Privacy protection device provided in an embodiment of the present invention, first, receives password or journey that user is set to application program Sequence unique mark, application program is encrypted, then, and the hiding instruction that reception user sends carries out hidden to the application program Hide, finally, when user's input information meets password match rule, the application program being hidden is shown, so that intelligence The application program of energy mobile terminal is more hidden, even if intelligent mobile terminal is browsed by other people, if not by password authentification, The application program being hidden can not be shown, the disguise of privacy application is added, reduces the wind that privacy content is found by other people Danger.
A1, a kind of method for secret protection, including:
Password or program unique mark that user is set to application program are received, the application program is encrypted;
The application program being encrypted is hidden;
The input information inputted in monitoring word TIP, the password that the input information is set with user or program Unique mark carries out password match, when user's input information meets password match rule, shows the application journey being hidden Sequence.
A2, the method according to A1, the password include the password being made up of numeral, letter or symbol, or by gesture Input the password of information structure.
A3, the method for secret protection according to A1, in addition to:
When receiving password or the program unique mark that user is set to application program, the password or program are uniquely marked Password mapping processing is done in knowledge.
A4, the method for secret protection according to A3, it is described to do the password or program unique mark at password mapping Reason includes:
The password or program unique mark are done into MD5 computings, and preserve the first MD5 values;Or
One specified file is encrypted with the password or program unique mark.
A5, the method according to A4, it is described when user's input information meets password match rule, what display was hidden The application program includes:
Obtain the information of user's input in any application containing input frame;
The information that the user is inputted does MD5 computings, and preserves the 2nd MD5 values;
The first MD5 values and the 2nd MD5 values are compared, the application program being hidden then is shown when both are identical.
A6, the method according to A4, it is described when user's input information meets password match rule, what display was hidden The application program includes:
Obtain the information of user's input in any application containing input frame;
With user input information the specified file is decrypted, when successful decryption, show be hidden it is described should Use program.
A7, the method according to A1, it is described when user's input information meets password match rule, what display was hidden The application program includes:
Obtain the information of user's input in any application containing input frame;
The information that user is inputted and the password or program unique mark be made whether it is identical compared, when identical, show Show the application program being hidden.
A8, the method according to any one of A5-7, the acquisition user input in any application containing input frame Information further comprise:
When user replicates or shears user's information of input in the application containing input frame, the letter in monitoring clipbook Whether breath changes, when the information in the clipbook changes, then obtains the information that clipbook is recorded.
A9, the method according to any one of A5-7, the password or program that the reception user is set to application program are only One mark further comprises:
Receive user and corresponding multiple passwords or program unique mark are set to different application.
A10, the method according to A9, described when user's input information meets password match rule, display is hidden The application program further comprise:When user's input information meets password match rule, search and input information with user Corresponding application program, and show the application program that is being searched and being hidden.
A11, the method according to any one of A1-7, in addition to the information inputted for user are identified, and judge to use Whether family will show the application program being hidden, and be decided whether to carry out password match according to judged result.
A12, the method according to A11, it is described to be identified for the information that user inputs, judge whether user will show Show that the application program being hidden includes:
Judging whether the information of user's input includes is used to represent that user wants to start the mark that display is hidden application program Information, when containing the identification information, judges that user will show the application program being hidden, setting up password matching.
A13, the method according to A1, the application program that the display is hidden include:
Only show the postrun application program being hidden;Or
Only show the entrance for the application program launching being hidden;Or
The postrun application program being hidden of display, while showing entering for the application program launching being hidden Mouthful.
B14, a kind of privacy protection device, including:
Encrypting module, receives password or program unique mark that user is set to application program, the application program is entered Row encryption;
Hidden module, is hidden to the application program being encrypted;
The input information inputted in display module, monitoring word TIP, the input information is set with user Password or program unique mark carry out password match, when user's input information meets password match rule, what display was hidden The application program.
B15, the privacy protection device according to B14, the password include by numeral, letter or symbol constitute it is close Code, or by the password of gesture input information structure.
B16, the privacy protection device according to B14, in addition to:
Cryptographic handling module, the password or program that the cryptographic handling module is set in reception user to application program is unique During mark, the password or program unique mark are done into password mapping processing.
B17, the privacy protection device according to B16, the cryptographic handling module be further used for the password or Program unique mark does MD5 computings, preserves the first MD5 values;Or with the password or program unique mark to a specified file It is encrypted.
B18, the privacy protection device according to B16, the display module include:
Acquiring unit, obtains the information of user's input in any application containing input frame;
Comparing unit, the information that the user is inputted does MD5 computings, preserves the 2nd MD5 values;By the first MD5 values It is compared with the 2nd MD5 values;
Display unit, when the comparing unit result of the comparison is identical, shows the application program being hidden.
B19, the privacy protection device according to B16, the display module include:
Acquiring unit, obtains the information of user's input in any application containing input frame;
Decryption unit, the specified file is decrypted with user's input information;
Display unit, when the decryption unit successful decryption, shows the application program being hidden.
B20, the privacy protection device according to B1, the display module include:
Acquiring unit, obtains the information of user's input in any application containing input frame;
Comparing unit, the information that user is inputted is made whether identical compared with the password or program unique mark;
Display unit, when the comparing unit result of the comparison is identical, shows the application program being hidden.
B21, the privacy protection device according to any one of B18-20, the acquiring unit are further used for when user is multiple System or shearing user are in the application containing input frame during the information of input, and whether the information in monitoring clipbook changes, When the information in the clipbook changes, the information that clipbook is recorded is obtained.
B22, the method according to any one of B18-B20, the encrypting module are further used for receiving user to difference Application program sets corresponding multiple passwords or program unique mark.
B23, the method according to B22, the display module also include:
Searching unit, when user's input information meets password match rule, searches answer corresponding with user's input information Use program.
B24, the method according to B23, the display unit are further used for showing being searched and are hidden The application program.
B25, the privacy protection device according to any one of B14-B20, in addition to:
Judge module;The judge module, is identified for the information that user inputs, judges whether user will show quilt Hiding application program, decides whether to carry out password match according to judged result.
B26, the privacy protection device according to B25, the judge module are further used for judging the letter of user's input Whether breath, which includes, is used to represent that user wants that starting display is hidden the identification information of application program, when containing the identification information When, judge that user will show the application program being hidden, setting up password matching.
B27, the privacy protection device according to B14, the display unit are further used for only showing postrun quilt The hiding application program;Or
Only show the entrance for the application program launching being hidden;Or
The postrun application program being hidden of display, while showing entering for the application program launching being hidden Mouthful.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place is provided, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself All as the separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power Profit requires, made a summary and accompanying drawing)Disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
Although in addition, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of be the same as Example does not mean in of the invention Within the scope of and form different embodiments.For example, in the following claims, times of embodiment claimed One of meaning mode can be used in any combination.
The present invention all parts embodiment can be realized with hardware, or with one or more processor run Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor(DSP)Some in processing unit to realize pop-up according to embodiments of the present invention Or some or all functions of whole parts.The present invention be also implemented as perform method as described herein one Partly or completely equipment or program of device(For example, computer program and computer program product).It is such to realize this The program of invention can be stored on a computer-readable medium, or can have the form of one or more signal.So Signal can download and obtain from internet website, either provide or provided in any other form on carrier signal.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and coming real by means of properly programmed computer It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.

Claims (16)

1. a kind of method for secret protection, it is characterised in that including:
Password or program unique mark that user is set to application program are received, the application program is encrypted;According to institute The password or program unique mark for stating setting generate the first MD5 values;
The application program being encrypted is hidden;
The information of user's input in any application containing input frame is monitored and obtained, judges whether the information of user's input wraps Containing for representing that user wants to start the identification information that display is hidden application program, decided whether to carry out password according to judged result Matching;When containing the identification information, judge that user will show the application program being hidden, setting up password matching;
After setting up password matching, MD5 computings are done to the information that user inputs, corresponding MD5 values is obtained, is designated as the 2nd MD5 values, When the first MD5 values, the 2nd MD5 values meet password match rule, the application program being hidden is shown.
2. according to the method described in claim 1, it is characterised in that the password includes what is be made up of numeral, letter or symbol Password, or by the password of gesture input information structure.
3. method for secret protection according to claim 1, it is characterised in that the application program is encrypted, specifically Including:
After the first MD5 values are generated, the first MD5 values are preserved;Or
One specified file is encrypted the password or program unique mark set with user.
4. according to the method described in claim 1, it is characterised in that meet password in the first MD5 values, the 2nd MD5 values During with rule, the application program being hidden is shown, is specifically included:The 2nd MD5 values are compared with the first MD5 values Compared with, when both are consistent, the application program that display is hidden.
5. the method according to claim any one of 1-4, it is characterised in that the acquisition user contains input frame any Application on the information of input further comprise:
When user replicates or shears user's information of input in the application containing input frame, the information in monitoring clipbook is It is no to change, when the information in the clipbook changes, then obtain the information that clipbook is recorded.
6. the method according to any one of Claims 1-4, it is characterised in that the reception user is set to application program Password or program unique mark further comprise:
Receive user and corresponding multiple passwords or program unique mark are set to different application.
7. the method according to any one of Claims 1-4, meets password match in the first MD5 values, the 2nd MD5 values When regular, the application program being hidden is shown, is specifically included:Application program corresponding with user's input information is searched, and Show the application program that is being searched and being hidden.
8. the method according to any one of Claims 1-4, the application program that the display is hidden includes:
Only show the postrun application program being hidden;Or
Only show the entrance for the application program launching being hidden;Or
The postrun application program being hidden of display, while the entrance for the application program launching that display is hidden.
9. a kind of privacy protection device, it is characterised in that including:
Encrypting module, receives password or program unique mark that user is set to application program, the application program is added Close processing;The password or program unique mark are done into MD5 computings, the first MD5 values are generated;
Hidden module, is hidden to the application program being encrypted;
Judge module, for user, the information of input is identified in any application with input frame, judges that user inputs Information whether include and be used to represent that user wants that starting display is hidden the identification information of application program, when containing the mark letter During breath, setting up password matching;
Display module, for after the judge module determines to carry out password match, MD5 computings to be done to the information that user inputs, Corresponding MD5 values are obtained, the 2nd MD5 values are designated as, when the first MD5 values, the 2nd MD5 values meet password match rule, shown Show the application program being hidden.
10. privacy protection device according to claim 9, the password include by numeral, letter or symbol constitute it is close Code, or by the password of gesture input information structure.
11. privacy protection device according to claim 9, in addition to cryptographic handling module, the cryptographic handling module are used In the password or program unique mark are done into MD5 computings, the first MD5 values are preserved;Or the password or program set with user is only One specified file is encrypted one mark.
12. privacy protection device according to claim 11, the display module includes:
Acquiring unit, obtains the information of user's input in any application containing input frame;
Comparing unit, the information that the user is inputted does MD5 computings, preserves the 2nd MD5 values;By the first MD5 values and Two MD5 values are compared;
Display unit, when the comparing unit result of the comparison is identical, shows the application program being hidden.
13. privacy protection device according to claim 12, the acquiring unit is further used for when user replicates or cuts User is cut in the application containing input frame during the information of input, whether the information in monitoring clipbook changes, when described When information in clipbook changes, the information that clipbook is recorded is obtained.
14. the privacy protection device according to claim any one of 9-12, the encrypting module, which is further used for receiving, to be used Family sets corresponding multiple passwords or program unique mark to different application.
15. the privacy protection device according to claim 12 or 13, the display module also includes:
Searching unit, when user's input information meets password match rule, searches application journey corresponding with user's input information Sequence, the display unit is further used for showing the application program that is being searched and being hidden.
16. the privacy protection device according to claim 12 or 13, the display unit is further used for only showing operation The application program being hidden afterwards;Or
Only show the entrance for the application program launching being hidden;Or
The postrun application program being hidden of display, while the entrance for the application program launching that display is hidden.
CN201310597407.2A 2013-11-22 2013-11-22 Method for secret protection and its device Active CN103617382B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310597407.2A CN103617382B (en) 2013-11-22 2013-11-22 Method for secret protection and its device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310597407.2A CN103617382B (en) 2013-11-22 2013-11-22 Method for secret protection and its device

Publications (2)

Publication Number Publication Date
CN103617382A CN103617382A (en) 2014-03-05
CN103617382B true CN103617382B (en) 2017-10-17

Family

ID=50168085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310597407.2A Active CN103617382B (en) 2013-11-22 2013-11-22 Method for secret protection and its device

Country Status (1)

Country Link
CN (1) CN103617382B (en)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104520866B (en) * 2014-03-31 2018-08-21 华为技术有限公司 Method for secret protection and terminal device
CN105205386A (en) * 2014-06-25 2015-12-30 腾讯科技(深圳)有限公司 Password protecting method and device for mobile terminal application program
CN104182662B (en) * 2014-08-22 2017-10-17 广东欧珀移动通信有限公司 Hiding and deployment method, system and the mobile terminal of hide application program
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof
CN105426712A (en) * 2014-09-04 2016-03-23 中兴通讯股份有限公司 Application encryption method and apparatus
CN105574423B (en) * 2014-10-09 2021-05-04 中兴通讯股份有限公司 Terminal equipment and file management method thereof
CN104331648A (en) * 2014-11-24 2015-02-04 上海斐讯数据通信技术有限公司 Locking system, locking method, unlocking system and unlocking method for application
CN104732125B (en) * 2015-01-30 2017-12-22 努比亚技术有限公司 The display methods and terminal of encryption information
CN106161742B (en) * 2015-04-02 2020-12-01 深圳市腾讯计算机系统有限公司 Authentication method and authentication system of mobile terminal
CN106156646B (en) * 2015-04-03 2020-09-22 北京搜狗科技发展有限公司 Information calling method and electronic equipment
CN105631275B (en) * 2015-04-15 2018-12-25 宇龙计算机通信科技(深圳)有限公司 information display method, information display device and terminal
CN104820540A (en) * 2015-05-20 2015-08-05 北京奇虎科技有限公司 Mobile terminal and software management method thereof
CN105550866B (en) * 2015-05-30 2020-05-19 宇龙计算机通信科技(深圳)有限公司 Safety control method and device
CN104933343A (en) * 2015-07-01 2015-09-23 京东方科技集团股份有限公司 Secrecy method and apparatus of application program, and electronic device
CN105138887B (en) * 2015-08-27 2018-07-27 宇龙计算机通信科技(深圳)有限公司 A kind of input method of log-on message, device and terminal device
US9996254B2 (en) * 2015-09-23 2018-06-12 Samsung Electronics Co., Ltd. Hidden application icons
CN105701373B (en) * 2015-12-28 2019-08-30 东软集团股份有限公司 The method and apparatus for opening ADB interface
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal
CN105844145A (en) * 2016-04-19 2016-08-10 广州三星通信技术研究有限公司 Method and equipment for managing passwords
TWI584150B (en) * 2016-05-17 2017-05-21 資通電腦股份有限公司 Digital document locating method
CN106066961A (en) * 2016-05-27 2016-11-02 乐视控股(北京)有限公司 A kind of object operation method and device
JP6770588B2 (en) * 2016-06-07 2020-10-14 華為技術有限公司Huawei Technologies Co.,Ltd. Methods and terminals for enhancing information security
CN106096449A (en) * 2016-06-20 2016-11-09 乐视控股(北京)有限公司 Document protection method and device
CN107526487A (en) * 2016-06-20 2017-12-29 阿里巴巴集团控股有限公司 A kind of page operation method and device
CN106095513B (en) * 2016-06-22 2020-02-18 宇龙计算机通信科技(深圳)有限公司 Application self-identification safe starting method and system
CN106874718B (en) * 2016-07-27 2020-12-15 创新先进技术有限公司 Privacy processing method and device and terminal
CN106502734A (en) * 2016-10-13 2017-03-15 珠海市魅族科技有限公司 A kind of control method of application program and equipment
CN106570420B (en) * 2016-11-08 2020-11-06 广州Tcl互联网小额贷款有限公司 Secret code-based intelligent equipment privacy protection implementation method and system
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment
CN108881116A (en) * 2017-05-11 2018-11-23 阿里巴巴集团控股有限公司 Show the implementation method and device of sensitive information
WO2019056338A1 (en) * 2017-09-25 2019-03-28 深圳传音通讯有限公司 Application hiding system, hiding method, and starting method
CN107748843A (en) * 2017-10-27 2018-03-02 上海京颐科技股份有限公司 Application access method and device, storage medium, the terminal of medical care portable mobile termianl
CN108319865B (en) * 2018-01-17 2022-08-02 德天国际科技有限公司 Privacy protection method based on multiple roles, storage medium and terminal equipment
CN108769037B (en) * 2018-06-04 2020-11-10 厦门集微科技有限公司 Data processing method and device, computer storage medium and terminal
CN110012149B (en) * 2019-02-18 2022-02-25 深圳壹账通智能科技有限公司 Application program management method, device, terminal and storage medium
CN116627272B (en) * 2023-07-21 2024-01-26 深圳市则成电子股份有限公司 Touch control method and device and computer equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8738934B2 (en) * 2009-08-25 2014-05-27 Keeper Security, Inc. Method and apparatus for protecting account numbers and passwords
CN102387181B (en) * 2010-09-03 2015-09-23 腾讯科技(深圳)有限公司 A kind of login method and entering device
CN103377347B (en) * 2012-04-24 2016-01-06 腾讯科技(深圳)有限公司 File encryption, decryption method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device

Also Published As

Publication number Publication date
CN103617382A (en) 2014-03-05

Similar Documents

Publication Publication Date Title
CN103617382B (en) Method for secret protection and its device
ES2741513T3 (en) Software based multi-channel polymorphic data obfuscation
KR102048756B1 (en) Method and system for managing information on mobile devices
CN104125547B (en) Handle the method and short message processing device of short message
CN103455761B (en) File encryption and decryption method and device and electronic device
CN105530261B (en) The guard method of privacy information and device
US8490861B1 (en) Systems and methods for providing security information about quick response codes
CN111163094B (en) Network attack detection method, network attack detection device, electronic device, and medium
CN105809000A (en) Information processing method and electronic device
CN106030527B (en) By the system and method for application notification user available for download
US20150047019A1 (en) Information processing method and electronic device
CN105095758B (en) Screen locking applied program processing method, device and mobile terminal
CN104915594B (en) Application program operation method and device
US8485428B1 (en) Systems and methods for providing security information about quick response codes
CN106100851A (en) Password management system, intelligent wristwatch and cipher management method thereof
WO2014145186A1 (en) Methods and apparatus for securing user input in a mobile device
CN112800401B (en) Privacy processing method, privacy processing device and terminal
CN105162804A (en) Communication information protection method and apparatus
CN106503570A (en) The method and device of protection Root authority
WO2015154464A1 (en) Encryption method and device
US8464343B1 (en) Systems and methods for providing security information about quick response codes
CN105205415B (en) The processing method and processing system of file
CN106685791B (en) Secret information sending method and device
TW201833759A (en) Contact information display method and device, and information display method and device
US10909245B1 (en) Secure quarantine of potentially malicious content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220801

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right