CN105335662A - Method, device and equipment for hiding information - Google Patents

Method, device and equipment for hiding information Download PDF

Info

Publication number
CN105335662A
CN105335662A CN201510640540.0A CN201510640540A CN105335662A CN 105335662 A CN105335662 A CN 105335662A CN 201510640540 A CN201510640540 A CN 201510640540A CN 105335662 A CN105335662 A CN 105335662A
Authority
CN
China
Prior art keywords
application program
hide application
hide
equipment
info
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510640540.0A
Other languages
Chinese (zh)
Inventor
彭钟裔
萧浩良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201510640540.0A priority Critical patent/CN105335662A/en
Publication of CN105335662A publication Critical patent/CN105335662A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a method for hiding information, which comprises the steps of creating a hidden application program for containing the hidden information; generating an icon of the hidden application; and adding hidden information into the hidden application program, and hiding the hidden information through the hidden application program. The embodiment of the invention also discloses a device and equipment. By adopting the invention, the device can carry out centralized management on hidden information needing to be hidden through the hidden application program.

Description

A kind of method, device and equipment hidden Info
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of method, device and the equipment that hide Info.
Background technology
In recent years, along with the progress of science and technology, the smart machine such as mobile phone, panel computer also development, these smart machines have been come in huge numbers of families, become the device product of everybody indispensability.
At present, because the function of these smart machines is improved various day by day, equipment application becomes increasingly abundant especially, equipment can store a large amount of individual privacy information of user, such as: mobile phone stores the individual privacy information such as privacy application program, photograph, video, note, contact person, and user often has secret requirement to these personal informations.Such as, but because smart machine may through other people hand, mobile phone is placed on desktop and is brought by friend, relative etc. and use, this risk causing user will face individual privacy information revealing.
In order to improve the security of the individual privacy information of the device storage of user, adopt at present the secret means of the individual privacy information of equipment mainly by arranging hiding mode to realize to file.Wherein, arranging hiding mode to file can be arrange access code to file, or is carried out by file hiding display etc.But, due to each file of file dispersing apparatus, if when user need arrange hiding to the file that need hide, the path carrying out respectively that user need find respective file one by one arranges hiding, this makes user that the plenty of time need be spent to carry out arranging hiding, add the operation element amount of user, make user operation very complicated, make troubles to user.
Summary of the invention
Embodiment of the present invention technical matters to be solved is, provides a kind of method, device and the equipment that hide Info.This can make equipment carry out managing concentratedly by application program hiding Info of need carrying out hiding.
In order to solve the problems of the technologies described above, embodiments provide a kind of method hidden Info, comprising:
Create for holding the hide application program hidden Info;
Generate the icon of described hide application program;
To hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program.
Optionally, the icon of the described hide application program of described generation comprises:
Preset icon is set to the icon of described hide application program; Or
The self-defined icon that described hide application program is set.
Optionally, the icon of the described hide application program of described generation comprises:
Obtain the target icon of the application program in operating system except described hide application program,
Described target icon is set to the icon of described hide application program; Or,
Receive the image of user's input;
Described image is set to the icon of described hide application program.
Optionally, described method also comprises:
First password information is set;
According to described first password information, described hide application program is encrypted.
Optionally, describedly according to described first password information, described hide application program to be encrypted, to comprise:
Described first password information is verified when starting described hide application program; Or
Described first password information is verified when checking hiding Info in described hide application program.
Optionally, hide Info described in and comprise privacy network address;
Described hiding Info is added in described hide application program, by described hide application program, described hiding Info is carried out to hiding process and is comprised:
Described privacy network address is added in described hide application program, carries out hiding process to described privacy network address by described hide application program.
Optionally, described described privacy network address is added in described hide application program, by described hide application program, hiding process is carried out to described privacy network address and comprise:
Described privacy network address is obtained from the bookmark of the browser described operating system;
Described privacy network address is added in described hide application program; Or,
Described privacy network address is obtained from the history information of the browser described operating system;
Described privacy network address is added in described hide application program; Or,
Obtain the privacy network address of user's input;
Described privacy network address is added in described hide application program.
Optionally, described described privacy network address is added in described hide application program, by described hide application program, hiding process is carried out to described privacy network address and comprise:
The access vestige of described privacy network address is removed by described hide application program.
Optionally, described described privacy network address is added in described hide application program, by described hide application program, hiding process is carried out to described privacy network address and comprise:
By described hide application program, the second encrypted message is set,
According to described second encrypted message, described privacy network address is encrypted.
Optionally, describedly according to described second encrypted message, described privacy network address to be encrypted, to comprise:
Described second encrypted message is verified when opening described privacy network address.
Optionally, hide Info described in and comprise private file;
Described hiding Info is added in described hide application program, carries out hiding process, comprising by described hide application program to described hiding Info:
Described private file is added in described hide application program, carries out hiding process to described hiding Info by described hide application program.
Optionally, described described private file is added in described hide application program, by described hide application program, described hiding Info is carried out hiding process and comprised:
Obtain described private file;
By described hide application program, described private file is added in preset hidden folder; And/or,
By described hide application program, described private file is uploaded to cloud server.
Optionally, described described private file is added in described hide application program, carries out hiding process to described hiding Info by described hide application program, comprising:
By described hide application program, the 3rd encrypted message is set,
According to described 3rd encrypted message, described private file is encrypted.
Optionally, describedly according to described 3rd encrypted message, described private file to be encrypted, to comprise:
Described 3rd encrypted message is verified when opening described private file.
Optionally, hide Info described in and comprise locking applications;
Described hiding Info is added in described hide application program, carries out hiding process, comprising by described hide application program to described hiding Info:
Described locking applications is started icon to be added in described hide application program, carries out hiding process to described locking applications by described hide application program.
Optionally, describedly described locking applications started icon be added in described hide application program, carry out hiding process to described locking applications by described hide application program, comprising:
By described hide application program, the 4th encrypted message is set,
According to described 4th encrypted message, described locking applications is encrypted.
Optionally, describedly according to described 4th encrypted message, described locking applications to be encrypted, to comprise:
Described 4th encrypted message is verified when the startup icon triggering described locking applications starts described privacy application program.
Correspondingly, the embodiment of the present invention additionally provides a kind of device hidden Info, and described device comprises:
Creating unit, for creating for holding the hide application program hidden Info;
Generation unit, for generating the icon of described hide application program;
Hidden unit, is added into for hiding Info in described hide application program, carries out hiding process to described hiding Info by described hide application program.
Optionally, described generation unit comprises:
First arranges subelement, for preset icon being set to the icon of described hide application program;
Second arranges subelement, for the self-defined icon arranging described hide application program.
Optionally, described hidden unit comprises:
First obtains subelement, for obtaining the target icon of the application program in operating system except described hide application program,
3rd arranges subelement, for described target icon being set to the icon of described hide application program;
Receive subelement, for receiving the image of user's input;
4th arranges subelement, for described image being set to the icon of described hide application program.
Optionally, described device also comprises:
Setting unit, for arranging first password information;
Ciphering unit, for being encrypted described hide application program according to described first password information.
Optionally, described encryption comprises:
First checking subelement, verifies described first password information during for starting described hide application program;
Second checking subelement, verifies described first password information during for checking hiding Info in described hide application program.
Optionally, hide Info described in and comprise privacy network address;
Described hidden unit comprises:
First hides subelement, for being added in described hide application program by described privacy network address, carries out hiding process to described privacy network address by described hide application program.
Optionally, the described first hiding subelement comprises:
Second obtains subelement, for obtaining described privacy network address in the bookmark from the browser in described operating system;
First adds subelement, for being added in described hide application program by described privacy network address; Or,
3rd obtains subelement, for obtaining described privacy network address in the history information from the browser in described operating system;
Second adds subelement, for being added in described hide application program by described privacy network address; ,
4th obtains subelement, for obtaining the privacy network address of user's input;
3rd adds subelement, for described privacy network address being added in described hide application program.
Optionally, the described first hiding subelement comprises:
Second hides subelement, for being removed the access vestige of described privacy network address by described hide application program.
Optionally, the described first hiding subelement comprises:
5th arranges subelement, for arranging the second encrypted message by described hide application program,
First encryption sub-unit operable, for being encrypted described privacy network address according to described second encrypted message.
Optionally, described first encryption sub-unit operable specifically for:
Described second encrypted message is verified when opening described privacy network address.
Optionally, hide Info described in and comprise private file;
Described hidden unit comprises:
Second hides subelement, for being added in described hide application program by described private file, carries out hiding process to described hiding Info by described hide application program.
Optionally, the described second hiding subelement comprises:
5th obtains subelement, for obtaining described private file;
4th adds subelement, for being added in preset hidden folder by described hide application program by described private file;
Upload subelement, for described private file being uploaded to cloud server by described hide application program.
Optionally, the described second hiding subelement comprises:
6th arranges subelement, for arranging the 3rd encrypted message by described hide application program,
Second encryption sub-unit operable, for being encrypted described private file according to described 3rd encrypted message.
Optionally, described second encryption sub-unit operable specifically for:
Described 3rd encrypted message is verified when opening described private file.
Optionally, hide Info described in and comprise locking applications;
Described hidden unit comprises:
3rd hides subelement, is added in described hide application program, carries out hiding process by described hide application program to described locking applications for described locking applications is started icon.
Optionally, the described 3rd hiding subelement comprises:
7th arranges subelement, for arranging the 4th encrypted message by described hide application program,
3rd encryption sub-unit operable, for being encrypted described locking applications according to described 4th encrypted message.
Optionally, described 3rd encryption sub-unit operable specifically for:
Described 4th encrypted message is verified when the startup icon triggering described locking applications starts described privacy application program.
Correspondingly, the embodiment of the present invention additionally provides a kind of equipment, and described equipment comprises:
Housing, processor, storer, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processor and storer are arranged on circuit boards; Power circuit, for powering for each circuit of electronic equipment or device; Storer is used for stores executable programs code; Processor runs the program corresponding with executable program code by reading the executable program code stored in storer, for execution following steps:
Create for holding the hide application program hidden Info;
Generate the icon of described hide application program;
To hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program.
Implement the embodiment of the present invention, there is following beneficial effect:
In embodiments of the present invention, equipment can create for holding the hide application program hidden Info, generate the icon of described hide application program, to hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program, this can make equipment carry out managing concentratedly by hide application program hiding Info of need carrying out hiding, thus be convenient to user management and hide Info, make equipment privacy network address only can be shown to owner to check simultaneously, effective raising privacy website safety and privacy, improve Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the first embodiment schematic flow sheet of a kind of method hidden Info of the present invention;
Fig. 2 is the second embodiment schematic flow sheet of a kind of method hidden Info of the present invention;
Fig. 3 is the 3rd embodiment schematic flow sheet of a kind of method hidden Info of the present invention;
Fig. 4 is the 4th embodiment schematic flow sheet of a kind of method hidden Info of the present invention;
Fig. 5 is the 5th embodiment schematic flow sheet of a kind of method hidden Info of the present invention;
Fig. 6 is the first example structure figure of a kind of device hidden Info of the present invention;
Fig. 7 is the second example structure figure of a kind of device hidden Info of the present invention;
Fig. 8 is the 3rd example structure figure of a kind of device hidden Info of the present invention;
Fig. 9 is the 4th example structure figure of a kind of device hidden Info of the present invention;
Figure 10 is the 5th example structure figure of a kind of device hidden Info of the present invention;
Figure 11 is the first example structure figure of a kind of equipment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Equipment described in the embodiment of the present invention can comprise: mobile phone, computer, panel computer, palm PC or mobile internet device (MobileInternetDevice, MID) etc., the said equipment is only citing, and non exhaustive, including but not limited to the said equipment.
Refer to Fig. 1, the first embodiment schematic flow sheet of the method hidden Info for the present invention is a kind of.As shown in Figure 1, a kind of method hidden Info described in the present embodiment comprises step:
S100, creates for holding the hide application program hidden Info.
In embodiments of the present invention, equipment can obtain the installation kit for holding the hide application program hidden Info, and installs described installation kit, thus creates hide application program.Optionally, hide application program can also be little plug-in unit, as widget application program.
S101, generates the icon of described hide application program.
In embodiments of the present invention, when equipment creates hide application program, equipment can generate the icon of hiden application journey.Wherein, optionally, the icon that equipment generates hide application program can be: equipment obtains the icon preset, and default icon is set to the icon of hide application program, and wherein, the icon preset can be the icon entrained by installation kit.Optionally, the icon of equipment generation hide application program can also be: the self-defined icon arranging hide application program.
In embodiments of the present invention, the self-defined icon arranging hide application program of equipment can be: equipment can obtain the target icon of any one application program in operating system except hide application program, this target icon is set to the icon of hide application program.Optionally, the self-defined icon arranging hide application program of equipment can also be: equipment can obtain the icon of the application program that user specifies, and the icon of the application program of this being specified is set to the icon of hide application program.Optionally, the self-defined icon arranging hide application program of equipment can also be: equipment receives the image of user's input, this image is set to the icon of hide application program.
In embodiments of the present invention, equipment can generate the icon of hide application program at desktop, and wherein, the icon of the hide application program on desktop can be the shortcut of hide application program.User to conduct interviews hide application program by this shortcut.
S102, will hide Info and be added in described hide application program, carry out hiding process to described hiding Info by described hide application program.
In embodiments of the present invention, after equipment creates hide application program, equipment can obtain hiding Info of need carrying out hiding, and will hide Info and be added in hide application program.Wherein, equipment obtains hiding Info of need carrying out hiding: will hide Info be dragged in hide application program when monitoring user, then equipment can judge that information that user drags is as hiding Info and obtaining, or, when monitor user by preset interpolation hide Info the page add hide Info time, then equipment can carry out acquisition and hides Info.
In embodiments of the present invention, startup icon, private file and the privacy network address etc. that can comprise locking applications that hide Info hide Info.To hide Info to be added in hide application program and can be: the startup icon of locking applications or privacy network address are added in the preset operating list of hide application program, carry out operation with the user made by operating list and hide Info; Or, private file is added in the hidden folder that hide application program specifies, to carry out hiding Info hiding display, wherein, the identifier install beforehand of hidden folder, in operating list, triggers the identifier opened file folder of hidden folder with the user made by operating list and carries out operation and hide Info.Wherein, when equipment will hide Info be added into operating list time, equipment can will hide Info by preset classifying rules and be added in corresponding operating list.
In embodiments of the present invention, be added in hide application program when equipment adds to hide Info, equipment is hidden hiding Info by hide application program.Equipment to carry out hiding Info hiding by hide application program: when when hiding Info being the startup icon of locking applications, equipment is encrypted by the startup icon of hide application program to locking applications, to make, when the startup icon triggering application program starts privacy application program, need be decrypted; When hiding Info being privacy network address, equipment removes the access vestige of privacy network address by hide application program; When hide Info be private file time, equipment carries out hiding display to private file by hide application program, and can being encrypted private file, to make when opening private file by hidden folder, need being decrypted.
In embodiments of the present invention, equipment can create for holding the hide application program hidden Info, generate the icon of described hide application program, to hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program, this can make equipment carry out managing concentratedly by hide application program hiding Info of need carrying out hiding, thus be convenient to user management and hide Info, make equipment privacy network address only can be shown to owner to check simultaneously, effective raising privacy website safety and privacy, improve Consumer's Experience.
Refer to Fig. 2, the second embodiment schematic flow sheet of the method hidden Info for the present invention is a kind of.As shown in Figure 2, a kind of method hidden Info described in the present embodiment comprises step:
S200, creates for holding the hide application program hidden Info.
S201, generates the icon of described hide application program.
S202, arranges first password information.
In embodiments of the present invention, equipment can carry out arranging first password information, and wherein, optionally, equipment arranges first password information and can be: log-on message is set to first password information by equipment.Optionally, equipment arranges first password information: equipment gathers the encrypted message of user's input by password acquisition interface, the encrypted message that user inputs is set to first password information, wherein, the encrypted message of user's input can be gesture password, face characteristic password, numerical ciphers and key etc.In a particular application, can be, the password of user operation hide application program arranges the page, the hide application program of equipment is according to the operation display password acquisition interface of user, thus the encrypted message that reception user inputs for password acquisition interface, and the encrypted message that user inputs is set to first password information.
S203, is encrypted described hide application program according to described first password information.
In embodiments of the present invention, equipment to be encrypted hide application program according to first password information and can be: the checking first password information when starting hide application program; Or, checking first password information when checking hiding Info in hide application program.
In the embodiment of the present invention, when starting hide application program, checking first password information can be: when the first password information that equipment is arranged is the log-on message of hide application program, then when equipment Inspection is to startup hide application program instruction, the exportable login interface of equipment, inputs log-on message to point out user.When equipment receives the log-on message of user's input, log-on message can be sent to the server of hide application program by equipment, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to equipment and determines instruction, equipment can receive to be determined instruction and determines to be verified, and starts hide application program.
In embodiments of the present invention, when starting hide application program, checking first password information can also be: when the first password information that equipment is arranged be user inputted by password acquisition interface encrypted message time, then when monitoring of equipment is to startup hide application program instruction, the exportable interface for password input of equipment, inputs encrypted message to point out user.When equipment receives the encrypted message of user's input, the encrypted message that user inputs can mate with first password information by equipment, and when the match is successful, equipment can be determined to be verified, and starts hide application program.
Wherein, when starting hide application program, checking first password information also can comprise: the type of equipment determination first password information, and wherein the type of first password information can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.The type of equipment determination first password information can be specifically: equipment obtains equipment current network conditions, when equipment judge current be in the environment of network connection under, equipment can determine that first password information is the log-on message of hide application program; When equipment judge current be in network disconnect environment under, equipment can determine that first password information is the encrypted message that user is inputted by password acquisition interface.
In embodiments of the present invention, when equipment checks hiding Info in hide application program, checking first password information can be: when the first password information that equipment is arranged is the log-on message of hide application program, then when equipment Inspection to check in hide application program hide Info instruction time, the exportable login interface of equipment, inputs log-on message to point out user.When equipment receives the log-on message of user's input, log-on message can be sent to the server of hide application program by equipment, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to equipment and determines instruction, equipment can receive to be determined instruction and determines to be verified, and user can carry out checking hiding Info in hide application program.
In embodiments of the present invention, when checking hiding Info in hide application program, checking first password information can be: when the first password information that equipment is arranged be user inputted by password acquisition interface encrypted message time, then when monitoring of equipment to check in hide application program hide Info instruction time, the exportable interface for password input of equipment, inputs encrypted message to point out user.When equipment receives the encrypted message of user's input, the encrypted message that user inputs can mate with first password information by equipment, and when the match is successful, equipment can be determined to be verified, and user can carry out checking hiding Info in hide application program.
In order to easy operation, and simultaneously available protecting privacy, preferably, when starting hide application program, user, checking first password information, then check that hiding Info in hide application program does not carry out checking first password information; Checking first password information is not carried out when starting hide application program; then check that hiding Info in hide application program carries out checking first password information user, thus guarantee that equipment is equipment owner in use, effectively carry out secret protection; and easy user operation simultaneously, improve Consumer's Experience.
Certainly, in order to protect privacy, first password information can be verified when starting hide application program, checking that hiding Info in hide application program also can verify first password information user, or verifying other encrypted messages, not limiting at this.
S204, will hide Info and be added in described hide application program, carry out hiding process to described hiding Info by described hide application program.
In embodiments of the present invention, the concrete implementation content of step S200, step S201 and step S202 can participate in step S100, step S102 and step S103 in embodiment one, no longer repeats at this.
In embodiments of the present invention, equipment can create for holding the hide application program hidden Info, generate the icon of described hide application program, to hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program, this can make equipment carry out managing concentratedly by hide application program hiding Info of need carrying out hiding, thus be convenient to user management and hide Info, make equipment privacy network address only can be shown to owner to check simultaneously, effective raising privacy website safety and privacy, improve Consumer's Experience.
Refer to Fig. 3, the 3rd embodiment schematic flow sheet of the method hidden Info for the present invention is a kind of.As shown in Figure 3, a kind of method hidden Info described in the present embodiment comprises step:
S300, creates for holding the hide application program hidden Info.
S301, generates the icon of described hide application program.
S302, is added into privacy network address in described hide application program, carries out hiding process to described privacy network address by described hide application program.
In embodiments of the present invention, hide Info and can comprise privacy network address.When user need carry out hiding to the privacy network address in the bookmark of browser, equipment can obtain privacy network address from the bookmark of the browser operating system.Wherein, equipment obtains privacy network address from the bookmark of the browser operating system: user is by controlling page input instruction, the bookmark of the browser in opertaing device read operation system, when equipment reads the bookmark of browser, equipment is undertaken showing read bookmark by display page, user can carry out choosing privacy network address for the bookmark shown by display page, makes the hide application program of equipment can get privacy network address in the bookmark of browser.
In embodiments of the present invention, when equipment user need carry out hiding to the privacy network address of the history information of browser, equipment can obtain privacy network address from the history information of the browser operating system.Wherein, equipment obtains privacy network address from the history information of the browser operating system: user is by controlling page input instruction, the history information of the browser in opertaing device read operation system, when equipment reads the history information of browser, equipment is undertaken showing read history information by display page, user can carry out choosing privacy network address for the history information shown by display page, makes equipment can get privacy network address in the historical record of browser.
In embodiments of the present invention, when equipment user need carry out hiding to the privacy network address of input, the privacy network address that equipment can receive user's input obtains privacy network address.Wherein, the privacy network address acquisition privacy network address that equipment receives user's input can be: user is by the control page input instruction of hide application program, opertaing device display obtains the page of privacy network address, when equipment display obtains the page of privacy network address, user can, for the page input privacy network address obtaining privacy network address, make equipment can obtain the privacy network address of user's input from the page obtaining privacy network address.
In embodiments of the present invention, after equipment gets privacy network address, privacy network address can be added in hide application program by equipment.Wherein, privacy network address can be added in the operating list of hide application program by equipment, and user to be conducted interviews privacy network address by operating list.
In embodiments of the present invention, equipment arranges the second encrypted message by hide application program, and wherein, optionally, the first password information in above embodiment can be set to the second encrypted message by the hide application program of equipment.Optionally, equipment arranges the second encrypted message by hide application program and can also be: log-on message can be set to the second encrypted message by the hide application program of equipment.Optionally, equipment arranges first password information by hide application program: the hide application program of equipment gathers the encrypted message of user's input by password acquisition interface, the encrypted message that user inputs is set to the second encrypted message, wherein, the encrypted message of user's input can be gesture password, face characteristic password, numerical ciphers and key etc.In a particular application, can be, the password of user operation hide application program arranges the page, the hide application program of equipment is according to the operation display password acquisition interface of user, thus the encrypted message that reception user inputs for password acquisition interface, and the encrypted message that user inputs is set to the second encrypted message.
In embodiments of the present invention, when privacy network address is added in hide application program by equipment, equipment carries out hiding process to privacy network address by hide application program.Wherein, equipment carries out hiding process by hide application program to privacy network address and can be: the hide application program of equipment is encrypted privacy network address according to the second encrypted message arranged, and/or removes the access vestige of privacy network address by hide application program.
In embodiments of the present invention, equipment to be encrypted privacy network address according to the second encrypted message by hide application program and can be: verify the second encrypted message when opening privacy network address.
In embodiments of the present invention, verify when opening privacy network address that the second encrypted message can be: when the second encrypted message that the hide application program of equipment is arranged is the log-on message of hide application program, then when the hide application program of equipment detects that the instruction of privacy network address is opened in the operating list input of user operation hide application program, the exportable login interface of hide application program of equipment, inputs log-on message to point out user.When the hide application program of equipment receives the log-on message of user's input, log-on message can be sent to the server of hide application program by the hide application program of equipment, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to the hide application program of equipment and determines instruction, the hide application program of equipment can receive to be determined instruction and determines to be verified, open privacy network address.
In embodiments of the present invention, verify when opening privacy network address that the second encrypted message can also be: when the second encrypted message that the hide application program of equipment is arranged be user inputted by password acquisition interface encrypted message time, then when the instruction of privacy network address is opened in the operating list input that the hide application program of equipment monitors user operation hide application program, the exportable interface for password input of hide application program of equipment, inputs encrypted message to point out user.When the hide application program of equipment receives the encrypted message of user's input, the encrypted message that user inputs can mate with first password information by the hide application program of equipment, when the match is successful, the hide application program of equipment can be determined to be verified, and opens privacy network address.
Wherein, verify that when opening privacy network address the second encrypted message also can comprise: equipment determines the type of the second encrypted message, wherein the type of the second encrypted message can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.Equipment determines that the type of the second encrypted message can be specifically: equipment obtains equipment current network conditions, when equipment judge current be in the environment of network connection under, equipment can determine that the second encrypted message is the log-on message of hide application program; When equipment judge current be in network disconnect environment under, equipment can determine that the second encrypted message is the encrypted message that user is inputted by password acquisition interface.
In embodiments of the present invention, when privacy network address is added in hide application program by equipment, the access vestige that equipment removes privacy network address by hide application program can be: when the hide application program of equipment monitor privacy network address be opened time, the hide application program of equipment can monitor preset interactive button or whether mutual button triggers, when preset interactive button or mutual button are triggered, the hide application program of equipment can carry out the access vestige removing privacy network address.Wherein, interactive button can be exit button, return push-button etc., and mutual button can be exit button or home key etc.Wherein, when equipment hide application program monitor privacy network address be opened time, the hide application program of equipment can start built-in browser and carry out privacy network address, and the browser not carrying out notice system carries out activating to open network address.This makes the hide application program of equipment can available protecting privacy.
In embodiments of the present invention, the concrete implementation content of step S300, step S301 see the concrete implementation content of the step S100 in embodiment one and S101, can not repeat at this.Wherein, step S302 is the refinement step of the step S102 in embodiment one, and therefore, the concrete implementation content of step S302 also can see the concrete implementation content of the step S102 in embodiment one.
In embodiments of the present invention, equipment can create the hide application program for holding privacy network address, generate the icon of described hide application program, privacy network address is added in described hide application program, and carry out hiding process to described privacy network address by described hide application program, this can make equipment be undertaken by hide application program managing the privacy network address need carrying out hiding concentratedly, thus be convenient to user management privacy network address, and also make equipment privacy network address only can be shown to owner to check, effective raising privacy website safety and privacy, improve Consumer's Experience.
Refer to Fig. 4, the 4th embodiment schematic flow sheet of the method hidden Info for the present invention is a kind of.As shown in Figure 4, a kind of method hidden Info described in the present embodiment comprises step:
S400, creates for holding the hide application program hidden Info.
S401, generates the icon of described hide application program.
S402, is added into described private file in described hide application program, carries out hiding process to described hiding Info by described hide application program.
In embodiments of the present invention, hide Info and can comprise private file, wherein, private file can be the files such as document, picture, video.When user need carry out hiding to private file, user selects private file by the control page of hide application program, thus the hide application program of equipment can get private file.Wherein, user by the control page selection private file of hide application program can be: user obtains the file under certain catalogue of equipment by the button on the control page of the hide application program of equipment, thus the hide application program of equipment shows the file under certain catalogue by the preview window, user can carry out selection private file according to the file of the preview window display, thus the hide application program of equipment can get private file.
In embodiments of the present invention, when the hide application program of equipment gets private file, private file is added in hide application program by the hide application program of equipment.Wherein, private file is added in hide application program and can is by the hide application program of equipment: private file can be added in preset hidden folder by the hide application program of equipment, wherein, the identifier install beforehand of hidden folder, in the operating list of hide application program, makes user by list access hidden folder thus the private file that conducts interviews.After private file is stored to hidden folder by the hide application program of equipment, equipment will carry out hiding display to private file, and namely display private file will not be carried out in equipment other interfaces except hidden folder interface.As: in android system, when private file is picture, the hide application program of equipment picture can be moved to catalogue be called .xxx under file, now android system can judge that the file that catalogue is called under .xxx is hidden folder, will carry out hiding display to the file in hidden folder in other display interfaces.Further, after private file is added into hidden folder by the hide application program of equipment, equipment cannot be deleted private file.As: as in android system, when under the .Vault catalogue under private file is moved to DCIM file by the hide application program of equipment, now android system can not be deleted the file under this catalogue, unless under private file is moved out of under DCIM file .Vault catalogue.
In embodiments of the present invention, when the hide application program of equipment gets private file, private file is uploaded to the cloud server with equipment connection by hide application program by equipment.Wherein, when the hide application program of equipment gets private file, whether the exportable information of hide application program of equipment, upload cloud server as equipment connection for pointing out user by private file.When the hide application program of equipment receives the confirmation instruction that user returns for information, private file can be uploaded to cloud server by equipment.Thus can back up private file.
In embodiments of the present invention, equipment arranges the 3rd encrypted message by hide application program, wherein, optionally, equipment arranges the 3rd encrypted message by hide application program and can be: the first password information in above embodiment or the second encrypted message can be set to the 3rd encrypted message by the hide application program of equipment.Optionally, equipment arranges the 3rd encrypted message by hide application program and can also be: log-on message can be set to the 3rd encrypted message by the hide application program of equipment.Optionally, equipment arranges the 3rd encrypted message by hide application program: the hide application program of equipment gathers the encrypted message of user's input by password acquisition interface, the encrypted message that user inputs is set to the 3rd encrypted message, wherein, the encrypted message of user's input can be gesture password, face characteristic password, numerical ciphers and key etc.In a particular application, can be, the password of user operation hide application program arranges the page, the hide application program of equipment is according to the operation display password acquisition interface of user, thus the encrypted message that reception user inputs for password acquisition interface, and the encrypted message that user inputs is set to the 3rd encrypted message.
In embodiments of the present invention, when private file is added into hide application program by equipment, equipment carries out hiding process to private file by hide application program.Wherein, equipment carries out hiding process by hide application program to private file and can be: the hide application program of equipment is encrypted private file according to the 3rd encrypted message arranged.
In embodiments of the present invention, the hide application program of equipment to be encrypted private file according to the 3rd encrypted message and can be: checking the 3rd encrypted message when opening private file.
In embodiments of the present invention, when opening private file, checking the 3rd encrypted message can be: when the 3rd encrypted message that the hide application program of equipment is arranged is the log-on message of hide application program, then when the hide application program of equipment detects that private file instruction is opened in the operating list input of user operation hide application program, the exportable login interface of hide application program of equipment, inputs log-on message to point out user.When the hide application program of equipment receives the log-on message of user's input, log-on message can be sent to the server of hide application program by the hide application program of equipment, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to the hide application program of equipment and determines instruction, the hide application program of equipment can receive to be determined instruction and determines to be verified, open private file.
In embodiments of the present invention, when opening private file, checking the 3rd encrypted message can also be: when the 3rd encrypted message that the hide application program of equipment is arranged be user inputted by password acquisition interface encrypted message time, then when private file instruction is opened in the operating list input that the hide application program of equipment monitors user operation hide application program, the exportable interface for password input of hide application program of equipment, inputs encrypted message to point out user.When the hide application program of equipment receives the encrypted message of user's input, the encrypted message that user inputs can mate with the 3rd encrypted message by the hide application program of equipment, when the match is successful, the hide application program of equipment can be determined to be verified, and opens private file.
Wherein, when opening private file, checking the 3rd encrypted message also can comprise: the type of equipment determination first password information, and wherein the type of the 3rd encrypted message can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.Equipment determines that the type of the 3rd encrypted message can be specifically: equipment obtains equipment current network conditions, when equipment judge current be in the environment of network connection under, equipment can determine that the 3rd encrypted message is the log-on message of hide application program; When equipment judge current be in network disconnect environment under, equipment can determine that the 3rd encrypted message is the encrypted message that user is inputted by password acquisition interface.
In embodiments of the present invention, the concrete implementation content of step S400, step S401 see the concrete implementation content of the step S100 in embodiment one and S101, can not repeat at this.Wherein, step S402 is the refinement step of the step S102 in embodiment one, and therefore, the concrete implementation content of step S402 also can see the concrete implementation content of the step S102 in embodiment one.
In embodiments of the present invention, equipment can create the hide application program for holding private file, generate the icon of described hide application program, private file is added in described hide application program, and carry out hiding process to described private file by described hide application program, this can make equipment be undertaken by hide application program managing the private file need carrying out hiding concentratedly, thus be convenient to user management private file, and also make equipment private file only can be shown to owner to check, the security of effective raising private file and privacy, improve Consumer's Experience.
Refer to Fig. 5, the 5th embodiment schematic flow sheet of the method hidden Info for the present invention is a kind of.As shown in Figure 4, a kind of method hidden Info described in the present embodiment comprises step:
S500, creates for holding the hide application program hidden Info.
S501, generates the icon of described hide application program.
S502, starts icon by described locking applications and is added in described hide application program, carries out hiding process to described locking applications by described hide application program.
In embodiments of the present invention, hide Info can comprise locking applications start icon.When user need carry out hiding to the startup icon of locking applications, user is by the startup icon of the control page selection locking applications of hide application program, thus the hide application program of equipment can get the startup icon of locking applications.Wherein, user by the startup icon of the control page selection locking applications of hide application program can be: user obtains the startup icon of all application programs that equipment is installed by the button on the control page of the hide application program of equipment, thus the startup icon of all application programs that the hide application program of equipment is installed by the preview window display device, user can carry out according to the startup icon of the application program of the preview window display the startup icon selecting locking applications, thus the hide application program of equipment can get locking applications startup icon.
In embodiments of the present invention, after equipment gets the startup icon of locking applications, the startup icon of locking applications can be added in the operating list of hide application program by equipment, makes user carry out starting privacy application program corresponding to the startup icon of locking applications by the startup icon of the locking applications of operating list.
In embodiments of the present invention, equipment arranges the 4th encrypted message by hide application program, optionally, equipment arranges the 4th encrypted message by hide application program and can be: the first password information in above embodiment or the second encrypted message or the 3rd encrypted message can be set to the 4th encrypted message by the hide application program of equipment.Optionally, equipment arranges the 4th encrypted message by hide application program and can also be: log-on message can be set to the 4th encrypted message by the hide application program of equipment.Optionally, equipment arranges the 4th encrypted message by hide application program: the hide application program of equipment gathers the encrypted message of user's input by password acquisition interface, the encrypted message that user inputs is set to the 4th encrypted message, wherein, the encrypted message of user's input can be gesture password, face characteristic password, numerical ciphers and key etc.In a particular application, can be, the password of user operation hide application program arranges the page, the hide application program of equipment is according to the operation display password acquisition interface of user, thus the encrypted message that reception user inputs for password acquisition interface, and the encrypted message that user inputs is set to the 4th encrypted message.
In embodiments of the present invention, when the startup icon of locking applications is added into hide application program by equipment, equipment is undertaken hiding process by the startup icon of hide application program to locking applications.Wherein, equipment carries out hiding process by the startup icon of hide application program to locking applications and can be: the hide application program of equipment is encrypted according to the startup icon of the 4th encrypted message to locking applications arranged.
In embodiments of the present invention, the hide application program of equipment is encrypted according to the startup icon of the 4th encrypted message to locking applications and can is: verify described 4th encrypted message when the startup icon triggering described locking applications starts described privacy application program.
In embodiments of the present invention, verify that described 4th encrypted message can be when the startup icon triggering described locking applications starts described privacy application program: when the 4th encrypted message that the hide application program of equipment is arranged is the log-on message of hide application program, then when the hide application program of equipment detects that user triggers the startup icon instruction of locking applications by the operating list input of hide application program, the exportable login interface of hide application program of equipment, inputs log-on message to point out user.When the hide application program of equipment receives the log-on message of user's input, log-on message can be sent to the server of hide application program by the hide application program of equipment, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to the hide application program of equipment and determines instruction, the hide application program of equipment can receive to be determined instruction and determines to be verified, start privacy application program.
In embodiments of the present invention, verify that described 4th encrypted message can also be when the startup icon triggering described locking applications starts described privacy application program: when the 4th encrypted message that the hide application program of equipment is arranged be user inputted by password acquisition interface encrypted message time, then when the hide application program of equipment monitors the startup icon instruction of operating list input input triggering locking applications of user operation hide application program, the exportable interface for password input of hide application program of equipment, inputs encrypted message to point out user.When the hide application program of equipment receives the encrypted message of user's input, the encrypted message that user inputs can mate with the 4th encrypted message by the hide application program of equipment, when the match is successful, the hide application program of equipment can be determined to be verified, and starts privacy application program.
Wherein, verify that described 4th encrypted message also can comprise when the startup icon triggering described locking applications starts described privacy application program: equipment determines the type of the 4th encrypted message, and wherein the type of the 4th encrypted message can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.Equipment determines that the type of the 4th encrypted message can be specifically: equipment obtains equipment current network conditions, when equipment judge current be in the environment of network connection under, equipment can determine that the 4th encrypted message is the log-on message of hide application program; When equipment judge current be in network disconnect environment under, equipment can determine that the 4th encrypted message is the encrypted message that user is inputted by password acquisition interface.
In embodiments of the present invention, the concrete implementation content of step S500, step S501 see the concrete implementation content of the step S100 in embodiment one and S101, can not repeat at this.Wherein, step S502 is the refinement step of the step S102 in embodiment one, and therefore, the concrete implementation content of step S502 also can see the concrete implementation content of the step S102 in embodiment one.
In embodiments of the present invention, equipment can create the hide application program of the startup icon for holding locking applications, generate the icon of described hide application program, the startup icon of locking applications is added in described hide application program, and undertaken hiding process by the startup icon of described hide application program to described locking applications, this can make equipment be undertaken by hide application program managing the startup icon that need carry out the locking applications hidden concentratedly, thus be convenient to the startup icon of user management locking applications, and also make equipment the application of the privacy of the startup icon of locking applications only can be shown to owner and check, the security of effective raising private file and privacy, improve Consumer's Experience.
Refer to Fig. 6, the first example structure figure of the device hidden Info for the present invention is a kind of.As shown in Figure 6, the device described in the present embodiment comprises:
Creating unit 100, for creating for holding the hide application program hidden Info.
Generation unit 200, for generating the icon of described hide application program.
Hidden unit 300, is added into for hiding Info in described hide application program, carries out hiding process to described hiding Info by described hide application program.
In embodiments of the present invention, creating unit 100 can obtain the installation kit for holding the hide application program hidden Info, and installs described installation kit, thus creates hide application program.Optionally, hide application program can also be little plug-in unit, as widget application program.
In embodiments of the present invention, when creating unit 100 creates hide application program, generation unit 200 can generate the icon of hiden application journey.Wherein, optionally, the icon that generation unit 200 generates hide application program can be: generation unit 200 obtains the icon preset, and default icon is set to the icon of hide application program, and wherein, the icon preset can be the icon entrained by installation kit.Optionally, generation unit 200 generates the icon of hide application program and can also be: the self-defined icon arranging hide application program of generation unit 200.
In embodiments of the present invention, the self-defined icon arranging hide application program of generation unit 200 can be: generation unit 200 can obtain the target icon of any one application program in operating system except hide application program, this target icon is set to the icon of hide application program.Optionally, the self-defined icon arranging hide application program of generation unit 200 can also be: generation unit 200 can obtain the icon of the application program that user specifies, and the icon of the application program of this being specified is set to the icon of hide application program.Optionally, the self-defined icon arranging hide application program of generation unit 200 can also be: generation unit 200 receives the image of user's input, this image is set to the icon of hide application program.
In embodiments of the present invention, generation unit 200 can generate the icon of hide application program at desktop, and wherein, the icon of the hide application program on desktop can be the shortcut of hide application program.User to conduct interviews hide application program by this shortcut.
In embodiments of the present invention, after creating unit 100 creates hide application program, hidden unit 300 can obtain hiding Info of need carrying out hiding, and will hide Info and be added in hide application program.Wherein, hidden unit 300 obtains hiding Info of need carrying out hiding: will hide Info be dragged in hide application program when monitoring user, then hidden unit 300 can judge that information that user drags is as hiding Info and obtaining, or, when monitor user by preset interpolation hide Info the page add hide Info time, then hidden unit 300 can carry out acquisition and hides Info.
In embodiments of the present invention, startup icon, private file and the privacy network address etc. that can comprise locking applications that hide Info hide Info.Hidden unit 300 will hide Info to be added in hide application program: the startup icon of locking applications or privacy network address are added in the preset operating list of hide application program by hidden unit 300, carry out operation hide Info with the user made by operating list; Or, private file is added in the hidden folder that hide application program specifies by hidden unit 300, to carry out hiding Info hiding display, wherein, the identifier install beforehand of hidden folder, in operating list, triggers the identifier opened file folder of hidden folder with the user made by operating list and carries out operation and hide Info.Wherein, when hidden unit 300 will hide Info be added into operating list time, hidden unit 300 can will hide Info by preset classifying rules and be added in corresponding operating list.
In embodiments of the present invention, be added in hide application program when hidden unit 300 adds to hide Info, hidden unit 300 is hidden hiding Info by hide application program.Hidden unit 300 to carry out hiding Info hiding by hide application program: when when hiding Info being the startup icon of locking applications, hidden unit 300 is encrypted by the startup icon of hide application program to locking applications, to make, when the startup icon triggering application program starts privacy application program, need be decrypted; When hiding Info being privacy network address, hidden unit 300 removes the access vestige of privacy network address by hide application program; When hide Info be private file time, hidden unit 300 carries out hiding display to private file by hide application program, and can being encrypted private file, to make when opening private file by hidden folder, need being decrypted.
In embodiments of the present invention, preferably, described generation unit 200 can comprise:
First arranges subelement, for preset icon being set to the icon of described hide application program.
Second arranges subelement, for the self-defined icon arranging described hide application program.
Described second arranges subelement can comprise:
First obtains subelement, for obtaining the target icon of the application program in operating system except described hide application program.
3rd arranges subelement, for described target icon being set to the icon of described hide application program.
Receive subelement, for receiving the image of user's input.
4th arranges subelement, for described image being set to the icon of described hide application program.
Wherein, be understandable that, the function of each functional module of the present embodiment also according to the associated description with reference to said method embodiment, no longer can repeat herein.
In embodiments of the present invention, equipment can create for holding the hide application program hidden Info, generate the icon of described hide application program, to hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program, this can make equipment carry out managing concentratedly by hide application program hiding Info of need carrying out hiding, thus be convenient to user management and hide Info, make equipment privacy network address only can be shown to owner to check simultaneously, effective raising privacy website safety and privacy, improve Consumer's Experience.
Refer to Fig. 7, the second example structure figure of the device hidden Info for the present invention is a kind of.As shown in Figure 7, a kind of device described in the present embodiment comprises:
Creating unit 100, generation unit 200 and hidden unit 300.
Wherein, described device also comprises:
Setting unit 400, for arranging first password information.
Ciphering unit 500, for being encrypted described hide application program according to described first password information.
Wherein, described ciphering unit 500 comprises:
First checking subelement 10, verifies described first password information during for starting described hide application program;
Second checking subelement 20, verifies described first password information during for checking hiding Info in described hide application program.
In embodiments of the present invention, setting unit 400 can carry out arranging first password information, and wherein, optionally, setting unit 400 arranges first password information and can be: log-on message is set to first password information by setting unit 400.Optionally, setting unit 400 arranges first password information: setting unit 400 gathers the encrypted message of user's input by password acquisition interface, the encrypted message that user inputs is set to first password information, wherein, the encrypted message of user's input can be gesture password, face characteristic password, numerical ciphers and key etc.In a particular application, can be, the password of user operation hide application program arranges the page, the hide application program of equipment is according to the operation display password acquisition interface of user, thus the encrypted message that reception user inputs for password acquisition interface, and the encrypted message that user inputs is set to first password information.
In embodiments of the present invention, ciphering unit 500 to be encrypted hide application program according to first password information and can be: when starting hide application program, first verifies that first password information verified by subelement 10; Or second verifies that first password information verified by subelement 20 when checking hiding Info in hide application program.
In the embodiment of the present invention, when starting hide application program, first verifies that subelement 10 verifies that first password information can be: when the first password information that setting unit 400 is arranged is the log-on message of hide application program, then when the first checking subelement 10 detects startup hide application program instruction, the exportable login interface of first checking subelement 10, inputs log-on message to point out user.When the first checking subelement 10 receives the log-on message of user's input, log-on message can be sent to the server of hide application program by the first checking subelement 10, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to equipment and determines instruction, first checking subelement 10 can receive to be determined instruction and determines to be verified, and starts hide application program.
In embodiments of the present invention, first verify that subelement 10 verifies that first password information can also be when starting hide application program: when the first password information that setting unit 400 is arranged be user inputted by password acquisition interface encrypted message time, then when the first checking subelement 10 monitors startup hide application program instruction, the exportable interface for password input of first checking subelement 10, inputs encrypted message to point out user.When the first checking subelement 10 receives the encrypted message of user's input, the encrypted message that user inputs can mate with first password information by the first checking subelement 10, when the match is successful, the first checking subelement 10 can be determined to be verified, and starts hide application program.
Wherein, first verify that subelement 10 verifies that first password information also can comprise when starting hide application program: the type of first password information determined by the first checking subelement 10, and wherein the type of first password information can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.First checking subelement 10 determines that the type of first password information can be specifically: the first checking subelement 10 obtains equipment current network conditions, when first checking subelement 10 judge current be in network connect environment under, first checking subelement 10 can determine that first password information is the log-on message of hide application program; When first checking subelement 10 judge current be in network disconnect environment under, first checking subelement 10 can determine that first password information is the encrypted message that user is inputted by password acquisition interface.
In embodiments of the present invention, when checking hiding Info in hide application program, second verifies that subelement 20 verifies that first password information can be: when the first password information that setting unit 400 is arranged is the log-on message of hide application program, then when second checking subelement 20 detect check in hide application program hide Info instruction time, the exportable login interface of second checking subelement 20, inputs log-on message to point out user.When the second checking subelement 20 receives the log-on message of user's input, log-on message can be sent to the server of hide application program by the second checking subelement 20, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to the second checking subelement 20 and determines instruction, second checking subelement 20 can receive to be determined instruction and determines to be verified, user can carry out checking hiding Info in hide application program.
In embodiments of the present invention, when checking hiding Info in hide application program, second verifies that subelement 20 verifies that first password information can be: when the first password information that setting unit 400 is arranged be user inputted by password acquisition interface encrypted message time, then when second checking subelement 20 monitor check in hide application program hide Info instruction time, the exportable interface for password input of second checking subelement 20, inputs encrypted message to point out user.When the second checking subelement 20 receives the encrypted message of user's input, the encrypted message that user inputs can mate with first password information by the second checking subelement 20, when the match is successful, second checking subelement 20 can be determined to be verified, and user can carry out checking hiding Info in hide application program.
Wherein, when checking hiding Info in hide application program, second verifies that subelement 20 verifies that first password information also can comprise the type that first password information determined by the second checking subelement 20, and wherein the type of first password information can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.Second checking subelement 20 determines that the type of first password information can be specifically: the second checking subelement 20 obtains equipment current network conditions, when second checking subelement 20 judge current be in network connect environment under, second checking subelement 20 can determine that first password information is the log-on message of hide application program; When second checking subelement 20 judge current be in network disconnect environment under, second checking subelement 20 can determine that first password information is the encrypted message that user is inputted by password acquisition interface.
In order to easy operation, and simultaneously available protecting privacy, preferably, when starting hide application program, first verifies that first password information verified by subelement 10, then the second checking subelement 20 that hides Info checked in hide application program user does not carry out checking first password information; When starting hide application program, first verifies that first password information do not verified by subelement 10; the second checking subelement 20 that hides Info then checked in hide application program user carries out checking first password information; thus guarantee that equipment is that equipment owner is in use; effectively carry out secret protection; and easy user operation simultaneously, improve Consumer's Experience.
Certainly; in order to protect privacy; when starting hide application program, first verifies that subelement 10 can verify first password information; the second checking subelement 20 that hides Info simultaneously checked in hide application program user also can verify first password information; or verify other encrypted messages, do not limit at this.
Wherein, be understandable that, the function of each functional module of the present embodiment also according to the associated description with reference to said method embodiment, no longer can repeat herein.
In embodiments of the present invention, equipment can create for holding the hide application program hidden Info, generate the icon of described hide application program, to hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program, this can make equipment carry out managing concentratedly by hide application program hiding Info of need carrying out hiding, thus be convenient to user management and hide Info, make equipment privacy network address only can be shown to owner to check simultaneously, effective raising privacy website safety and privacy, improve Consumer's Experience.
Refer to Fig. 8, the 3rd example structure figure of the device hidden Info for the present invention is a kind of.As shown in Figure 8, a kind of device described in the present embodiment comprises:
Creating unit 100, generation unit 200 and hidden unit 300.
Wherein, described hidden unit also comprises:
First hides subelement 30, for being added in described hide application program by described privacy network address, carries out hiding process to described privacy network address by described hide application program.
In embodiments of the present invention, hide Info and can comprise privacy network address.When user need carry out hiding to the privacy network address in the bookmark of browser, first hides subelement 30 can obtain privacy network address from the bookmark of the browser operating system.Wherein, first hiding subelement 30 obtains privacy network address and can be from the bookmark of the browser operating system: user is by controlling page input instruction, control the bookmark that first hides the browser in subelement 30 read operation system, when the first hiding subelement 30 reads the bookmark of browser, first hides subelement 30 is undertaken showing read bookmark by display page, user can carry out choosing privacy network address for the bookmark shown by display page, makes first to hide subelement 30 and can get privacy network address in the bookmark of browser.
In embodiments of the present invention, when user need carry out hiding to the privacy network address of the history information of browser, first hides subelement 30 can obtain privacy network address from the history information of the browser operating system.Wherein, first hiding subelement 30 obtains privacy network address and can be from the history information of the browser operating system: user is by controlling page input instruction, control the history information that first hides the browser in subelement 30 read operation system, when the first hiding subelement 30 reads the history information of browser, first hides subelement 30 is undertaken showing read history information by display page, user can carry out choosing privacy network address for the history information shown by display page, make first to hide subelement 30 and can get privacy network address in the historical record of browser.
In embodiments of the present invention, when user need carry out hiding to the privacy network address of input, first hides the privacy network address acquisition privacy network address that subelement 30 can receive user's input.Wherein, the privacy network address acquisition privacy network address that first hiding subelement 30 receives user's input can be: user is by the control page input instruction of hide application program, opertaing device display obtains the page of privacy network address, when equipment display obtains the page of privacy network address, user can, for the page input privacy network address obtaining privacy network address, make the first hiding subelement 30 can obtain the privacy network address of user's input from the page obtaining privacy network address.
In embodiments of the present invention, after the first hiding subelement 30 gets privacy network address, first hides subelement 30 can be added into privacy network address in hide application program.Wherein, first hides subelement 30 can be added in the operating list of hide application program by privacy network address, and user to be conducted interviews privacy network address by operating list.
In embodiments of the present invention, first hides subelement 30 arranges the second encrypted message by hide application program, wherein, optionally, the first password information in above embodiment can be set to the second encrypted message by hide application program by the first hiding subelement 30.Optionally, first hides subelement 30 and arranges the second encrypted message by hide application program and can also be: first hides subelement 30 can be set to the second encrypted message by log-on message by hide application program.Optionally, first hiding subelement 30 arranges first password information by hide application program and can also be: first hides subelement 30 gathers user's input by password acquisition interface encrypted message by hide application program, the encrypted message that user inputs is set to the second encrypted message, wherein, the encrypted message of user's input can be gesture password, face characteristic password, numerical ciphers and key etc.In a particular application, can be, the password of user operation hide application program arranges the page, the hide application program of equipment is according to the operation display password acquisition interface of user, thus the encrypted message that reception user inputs for password acquisition interface, and the encrypted message that user inputs is set to the second encrypted message.
In embodiments of the present invention, when privacy network address is added in hide application program by the first hiding subelement 30, first hides subelement 30 carries out hiding process to privacy network address by hide application program.Wherein, first hiding subelement 30 carries out hiding process by hide application program to privacy network address and can be: first hides subelement 30 is encrypted privacy network address according to the second encrypted message arranged by hide application program, and/or first hides privacy network address removed by subelement 30 access vestige by hide application program.
In embodiments of the present invention, first is hidden subelement 30 and to be encrypted privacy network address according to the second encrypted message by hide application program and can be: when opening privacy network address, first hides subelement 30 and verify the second encrypted message.
In embodiments of the present invention, when opening privacy network address, first hides subelement 30 and verifies that the second encrypted message can be: when first to hide subelement 30 be the log-on message of hide application program by the second encrypted message that hide application program is arranged, then when by hide application program, the first hiding subelement 30 detects that the instruction of privacy network address is opened in the operating list input of user operation hide application program, first hides subelement 30 by the exportable login interface of hide application program, inputs log-on message to point out user.When the first hiding subelement 30 receives the log-on message of user's input by hide application program, first hides log-on message can be sent to hide application program by subelement 30 server by hide application program, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to the hide application program of equipment and determines instruction, first hiding subelement 30 can be received by hide application program to be determined instruction and determines to be verified, open privacy network address.
In embodiments of the present invention, when opening privacy network address, first hides subelement 30 and verifies that the second encrypted message can also be: when first hide subelement 30 by the second encrypted message that hide application program is arranged be user inputted by password acquisition interface encrypted message time, then when first hide subelement 30 by hide application program monitor user operation hide application program operating list input open the instruction of privacy network address time, first hides subelement 30 by the exportable interface for password input of hide application program, inputs encrypted message to point out user.When the first hiding subelement 30 receives the encrypted message of user's input by hide application program, first hides subelement 30 can be mated the encrypted message that user inputs with first password information by hide application program, when the match is successful, first hides subelement 30 can determine to be verified by hide application program, opens privacy network address.
Wherein, when opening privacy network address, first hides subelement 30 and verifies that the second encrypted message also can comprise: first hides the type that the second encrypted message determined by subelement 30, and wherein the type of the second encrypted message can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.First hides subelement 30 determines that the type of the second encrypted message can be specifically: first hides subelement 30 obtains equipment current network conditions, when first hide subelement 30 judge current be in network connect environment under, first hide subelement 30 can determine that the second encrypted message is the log-on message of hide application program; When first hide subelement 30 judge current be in network disconnect environment under, first hide subelement 30 can determine that the second encrypted message is the encrypted message that user is inputted by password acquisition interface.
In embodiments of the present invention, when privacy network address is added in hide application program by the first hiding subelement 30, first hides the access vestige that subelement 30 removes privacy network address by hide application program can be: when first hide subelement 30 by hide application program monitor privacy network address be opened time, first hiding subelement 30 can monitor preset interactive button by hide application program or whether mutual button triggers, when preset interactive button or mutual button are triggered, first hides subelement 30 can carry out removing privacy network address access vestige by hide application program.Wherein, interactive button can be exit button, return push-button etc., and mutual button can be exit button or home key etc.Wherein, when first hide subelement 30 by hide application program monitor privacy network address be opened time, first hiding subelement 30 can start built-in browser by hide application program and carry out privacy network address, and the browser not carrying out notice system carries out activating to open network address.This makes the hide application program of equipment can available protecting privacy.
In embodiments of the present invention, preferably, the described first hiding subelement 30 can comprise:
Second obtains subelement, for obtaining described privacy network address in the bookmark from the browser in described operating system.
First adds subelement, for described privacy network address being added in described hide application program.
3rd obtains subelement, for obtaining described privacy network address in the history information from the browser in described operating system.
Second adds subelement, for described privacy network address being added in described hide application program.
4th obtains subelement, for obtaining the privacy network address of user's input.
3rd adds subelement, for described privacy network address being added in described hide application program.
Preferably, the described first hiding subelement 30 can comprise:
Remove subelement, for being removed the access vestige of described privacy network address by described hide application program.
Preferably, the described first hiding subelement 30 can comprise:
5th arranges subelement, for arranging the second encrypted message by described hide application program,
First encryption sub-unit operable, for being encrypted described privacy network address according to described second encrypted message.
Preferably, described first encryption sub-unit operable specifically for:
Described second encrypted message is verified when opening described privacy network address.
Wherein, be understandable that, the function of each functional module of the present embodiment also according to the associated description with reference to said method embodiment, no longer can repeat herein.
In embodiments of the present invention, equipment can create the hide application program for holding privacy network address, generate the icon of described hide application program, privacy network address is added in described hide application program, and carry out hiding process to described privacy network address by described hide application program, this can make equipment be undertaken by hide application program managing the privacy network address need carrying out hiding concentratedly, thus be convenient to user management privacy network address, and also make equipment privacy network address only can be shown to owner to check, effective raising privacy website safety and privacy, improve Consumer's Experience.
Refer to Fig. 9, the 3rd example structure figure of the device hidden Info for the present invention is a kind of.As shown in Figure 9, a kind of device described in the present embodiment comprises:
Creating unit 100, generation unit 200 and hidden unit 300.
Wherein, described hidden unit 300 comprises:
Second hides subelement 40, for being added in described hide application program by described private file, carries out hiding process to described hiding Info by described hide application program.
In embodiments of the present invention, hide Info and can comprise private file, wherein, private file can be the files such as document, picture, video.When user need carry out hiding to private file, user selects private file by the control page of hide application program, thus the second hiding subelement 40 can get private file by hide application program.Wherein, user by the control page selection private file of hide application program can be: user obtains the file under certain catalogue of equipment by the button on the control page of the hide application program of equipment, thus hide application program shows the file under certain catalogue by the preview window, user can carry out selection private file according to the file of the preview window display, thus the second hiding subelement 40 can get private file by hide application program.
In embodiments of the present invention, when the second hiding subelement 40 gets private file, second hides subelement 40 is added into private file in hide application program.Wherein, private file is added in hide application program and can is by the second hiding subelement 40: second hides subelement 40 can be added in preset hidden folder by hide application program by private file, wherein, the identifier install beforehand of hidden folder, in the operating list of hide application program, makes user by list access hidden folder thus the private file that conducts interviews.After private file is stored to hidden folder by hide application program by the second hiding subelement 40, second hides subelement 40 will carry out hiding display to private file by hide application program, and namely except hidden folder interface, display private file will not be carried out in other interfaces.As: in android system, when private file is picture, second hides subelement 40 can move to catalogue by hide application program and be called file under .xxx by picture, now android system can judge that the file that catalogue is called under .xxx is hidden folder, will carry out hiding display to the file in hidden folder in other display interfaces.Further, after private file is added into hidden folder by hide application program by the second hiding subelement 40, equipment cannot be deleted private file.As: as in android system, under hiding when second the .Vault catalogue that private file to be moved to by hide application program under DCIM file by subelement 40, now android system can not be deleted the file under this catalogue, unless under private file is moved out of under DCIM file .Vault catalogue.
In embodiments of the present invention, when the second hiding subelement 40 gets private file, second hides subelement 40 is uploaded to the cloud server with equipment connection by hide application program by private file.Wherein, when second hide subelement 40 get private file time, second hides subelement 40 by the exportable information of hide application program, whether private file is uploaded cloud server as equipment connection for pointing out user.When second hide subelement 40 receive by hide application program the confirmation instruction that user returns for information time, second hides subelement 40 can be uploaded to cloud server by private file by hide application program.Thus can back up private file.
In embodiments of the present invention, second hides subelement 40 arranges the 3rd encrypted message by hide application program, wherein, optionally, second hides subelement 40 and arranges the 3rd encrypted message by hide application program and can be: second hides subelement 40 can be set to the 3rd encrypted message by the first password information in above embodiment or the second encrypted message by hide application program.Optionally, second hides subelement 40 and arranges the 3rd encrypted message by hide application program and can also be: second hides subelement 40 can be set to the 3rd encrypted message by hide application program by log-on message.Optionally, second hiding subelement 40 arranges the 3rd encrypted message by hide application program and can also be: second hides subelement 40 gathers user's input by password acquisition interface encrypted message by hide application program, the encrypted message that user inputs is set to the 3rd encrypted message, wherein, the encrypted message of user's input can be gesture password, face characteristic password, numerical ciphers and key etc.In a particular application, can be, the password of user operation hide application program arranges the page, second hides subelement 40 by the operation display password acquisition interface of hide application program according to user, thus the encrypted message that reception user inputs for password acquisition interface, and the encrypted message that user inputs is set to the 3rd encrypted message.
In embodiments of the present invention, when private file is added into hide application program by the second hiding subelement 40, second hides subelement 40 carries out hiding process to private file by hide application program.Wherein, second hides subelement 40 and carries out hiding process by hide application program to private file and can be: second hides subelement 40 is encrypted private file according to the 3rd encrypted message arranged by hide application program.
In embodiments of the present invention, second is hidden subelement 40 and to be encrypted private file according to the 3rd encrypted message by hide application program and can be: when opening private file, second hides subelement 40 and verify the 3rd encrypted message.
In embodiments of the present invention, when opening private file, second hides subelement 40 and verifies that the 3rd encrypted message can be: when second to hide subelement 40 be the log-on message of hide application program by the 3rd encrypted message that hide application program is arranged, then when by hide application program, the second hiding subelement 40 detects that private file instruction is opened in the operating list input of user operation hide application program, second hides subelement 40 by the exportable login interface of hide application program, inputs log-on message to point out user.When the second hiding subelement 40 receives the log-on message of user's input by hide application program, second hides log-on message can be sent to hide application program by subelement 40 server by hide application program, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to the hide application program of equipment and determines instruction, second hiding subelement 40 can be received by hide application program to be determined instruction and determines to be verified, open private file.
In embodiments of the present invention, when opening private file, second hides subelement 40 and verifies that the 3rd encrypted message can also be: when second hide subelement 40 by the 3rd encrypted message that hide application program is arranged be user inputted by password acquisition interface encrypted message time, then when second hide subelement 40 by hide application program monitor user operation hide application program operating list input open private file instruction time, second hides subelement 40 by the exportable interface for password input of hide application program, inputs encrypted message to point out user.When the second hiding subelement 40 receives the encrypted message of user's input by hide application program, second hides subelement 40 can be mated the encrypted message that user inputs with the 3rd encrypted message by hide application program, when the match is successful, second hides subelement 40 can determine to be verified by hide application program, opens private file.
Wherein, when opening private file, second hides subelement 40 and verifies that the 3rd encrypted message also can comprise: second hides the type that first password information determined by subelement 40, wherein, the type of the 3rd encrypted message can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.Second hides subelement 40 determines that the type of the 3rd encrypted message can be specifically: second hides subelement 40 obtains equipment current network conditions, when second hide subelement 40 judge current be in network connect environment under, second hide subelement 40 can determine that the 3rd encrypted message is the log-on message of hide application program; When second hide subelement 40 judge current be in network disconnect environment under, second hide subelement 40 can determine that the 3rd encrypted message is the encrypted message that user is inputted by password acquisition interface.
In embodiments of the present invention, preferably, the described second hiding subelement 40 can comprise:
5th obtains subelement, for obtaining described private file.
4th adds subelement, for described private file being added in preset hidden folder by described hide application program.
Upload subelement, for described private file being uploaded to cloud server by described hide application program.
Described second hides subelement 40 can comprise:
6th arranges subelement, for arranging the 3rd encrypted message by described hide application program.
Second encryption sub-unit operable, for being encrypted described private file according to described 3rd encrypted message.
Described second encryption sub-unit operable specifically for:
Described 3rd encrypted message is verified when opening described private file.
Wherein, be understandable that, the function of each functional module of the present embodiment also according to the associated description with reference to said method embodiment, no longer can repeat herein.
In embodiments of the present invention, equipment can create the hide application program for holding private file, generate the icon of described hide application program, private file is added in described hide application program, and carry out hiding process to described private file by described hide application program, this can make equipment be undertaken by hide application program managing the private file need carrying out hiding concentratedly, thus be convenient to user management private file, and also make equipment private file only can be shown to owner to check, the security of effective raising private file and privacy, improve Consumer's Experience.
Refer to Fig. 9, the 3rd example structure figure of the device hidden Info for the present invention is a kind of.As shown in Figure 9, a kind of device described in the present embodiment comprises:
Creating unit 100, generation unit 200 and hidden unit 300.
Wherein, described hidden unit comprises:
3rd hides subelement 50, is added in described hide application program, carries out hiding process by described hide application program to described locking applications for described locking applications is started icon.
In embodiments of the present invention, hide Info can comprise locking applications start icon.When user need carry out hiding to the startup icon of locking applications, user is by the startup icon of the control page selection locking applications of hide application program, thus the 3rd hides subelement 50 can get locking applications startup icon by hide application program.Wherein, user by the startup icon of the control page selection locking applications of hide application program can be: user obtains the startup icon of all application programs that equipment is installed by the button on the control page of hide application program, thus the 3rd hides the startup icon of all application programs that subelement 50 installed by the preview window display device by hide application program, user can carry out according to the startup icon of the application program of the preview window display the startup icon selecting locking applications, thus the 3rd hiding subelement 50 can get locking applications startup icon by hide application program.
In embodiments of the present invention, after the 3rd hiding subelement 50 gets the startup icon of locking applications, 3rd hides subelement 50 can be added in the operating list of hide application program by the startup icon of locking applications, makes user carry out starting privacy application program corresponding to the startup icon of locking applications by the startup icon of the locking applications of operating list.
In embodiments of the present invention, 3rd hides subelement 50 arranges the 4th encrypted message by hide application program, optionally, the 3rd hides subelement 50 and arranges the 4th encrypted message by hide application program and can be: the 3rd hides subelement 50 can be set to the 4th encrypted message by the first password information in above embodiment or the second encrypted message or the 3rd encrypted message by hide application program.Optionally, the 3rd hides subelement 50 and arranges the 4th encrypted message by hide application program and can also be: the 3rd hides subelement 50 can be set to the 4th encrypted message by hide application program by log-on message.Optionally, 3rd hiding subelement 50 arranges the 4th encrypted message by hide application program and can also be: the 3rd hides subelement 50 gathers user's input by password acquisition interface encrypted message by hide application program, the encrypted message that user inputs is set to the 4th encrypted message, wherein, the encrypted message of user's input can be gesture password, face characteristic password, numerical ciphers and key etc.In a particular application, can be, the password of user operation hide application program arranges the page, 3rd hides subelement 50 by the operation display password acquisition interface of hide application program according to user, thus the encrypted message that reception user inputs for password acquisition interface, and the encrypted message that user inputs is set to the 4th encrypted message.
In embodiments of the present invention, when the startup icon of locking applications is added into hide application program by the 3rd hiding subelement 50, the 3rd hides subelement 50 is undertaken hiding process by the startup icon of hide application program to locking applications.Wherein, the 3rd hides subelement 50 and carries out hiding process by the startup icon of hide application program to locking applications and can be: the 3rd hides subelement 50 is encrypted according to the startup icon of the 4th encrypted message to locking applications arranged by hide application program.
In embodiments of the present invention, the 3rd is hidden subelement 50 and to be encrypted according to the startup icon of the 4th encrypted message to locking applications by hide application program and can be: when the startup icon triggering described locking applications starts described privacy application program, the 3rd hides subelement 50 and verify described 4th encrypted message.
In embodiments of the present invention, when the startup icon triggering described locking applications starts described privacy application program, the 3rd hides subelement 50 and verifies that described 4th encrypted message can be: when the 3rd to hide subelement 50 be the log-on message of hide application program by the 4th encrypted message that hide application program is arranged, then when by hide application program, the 3rd hiding subelement 50 detects that user triggers the startup icon instruction of locking applications by the operating list input of hide application program, 3rd hides subelement 50 by the exportable login interface of hide application program, log-on message is inputted to point out user.When the 3rd hiding subelement 50 receives the log-on message of user's input by hide application program, 3rd hides log-on message can be sent to hide application program by subelement 50 server by hide application program, judge to make the server of hide application program whether log-on message matches with preset log-on message, the server of hide application program judges that the log-on message that receives and preset log-on message match, then the server of hide application program returns to the hide application program of equipment and determines instruction, 3rd hiding subelement 50 can be received by hide application program to be determined instruction and determines to be verified, start privacy application program.
In embodiments of the present invention, when the startup icon triggering described locking applications starts described privacy application program, the 3rd hides subelement 50 and verifies that described 4th encrypted message can also be: when the 3rd hide subelement 50 by the 4th encrypted message that hide application program is arranged be user inputted by password acquisition interface encrypted message time, then when the 3rd hide subelement 50 trigger the startup icon instruction of locking applications by the operating list input input that hide application program monitors user operation hide application program time, 3rd hides subelement 50 by the exportable interface for password input of hide application program, encrypted message is inputted to point out user.When the 3rd hiding subelement 50 receives the encrypted message of user's input by hide application program, 3rd hides subelement 50 can be mated the encrypted message that user inputs with the 4th encrypted message by hide application program, when the match is successful, 3rd hides subelement 50 can determine to be verified by hide application program, starts privacy application program.
Wherein, when the startup icon triggering described locking applications starts described privacy application program, the 3rd hides subelement 50 and verifies that described 4th encrypted message also can comprise: the 3rd hides the type that the 4th encrypted message determined by subelement 50, and wherein the type of the 4th encrypted message can comprise: the log-on message of the encrypted message that user is inputted by password acquisition interface and hide application program.3rd hides subelement 50 determines that the type of the 4th encrypted message can be specifically: the 3rd hides subelement 50 obtains equipment current network conditions, when the 3rd hide subelement 50 judge current be in network connect environment under, the 3rd hide subelement 50 can determine that the 4th encrypted message is the log-on message of hide application program; When the 3rd hide subelement 50 judge current be in network disconnect environment under, the 3rd hide subelement 50 can determine that the 4th encrypted message is the encrypted message that user is inputted by password acquisition interface.
In embodiments of the present invention, preferably, the 3rd hiding subelement 50 can comprise:
7th arranges subelement, for arranging the 4th encrypted message by described hide application program.
3rd encryption sub-unit operable, for being encrypted described locking applications according to described 4th encrypted message.
Described 3rd encryption sub-unit operable specifically for:
Described 4th encrypted message is verified when the startup icon triggering described locking applications starts described privacy application program.
Wherein, be understandable that, the function of each functional module of the present embodiment also according to the associated description with reference to said method embodiment, no longer can repeat herein.
In embodiments of the present invention, equipment can create the hide application program of the startup icon for holding locking applications, generate the icon of described hide application program, the startup icon of locking applications is added in described hide application program, and undertaken hiding process by the startup icon of described hide application program to described locking applications, this can make equipment be undertaken by hide application program managing the startup icon that need carry out the locking applications hidden concentratedly, thus be convenient to the startup icon of user management locking applications, and also make equipment the application of the privacy of the startup icon of locking applications only can be shown to owner and check, the security of effective raising private file and privacy, improve Consumer's Experience.
Referring to Figure 11, is the first example structure figure of a kind of equipment of the present invention.As shown in figure 11, a kind of equipment described in the present embodiment comprises:
Described equipment comprises: housing 901, processor 902, storer 903, circuit board 904 and power circuit 905, and wherein, circuit board 904 is placed in the interior volume that housing 901 surrounds, and processor 902 and storer 903 are arranged on circuit board 904; Power circuit 905, for powering for each circuit of electronic equipment or device; Storer 903 is for stores executable programs code; Processor 902 runs the program corresponding with executable program code by reading the executable program code stored in storer 903, for execution following steps:
Create for holding the hide application program hidden Info;
Generate the icon of described hide application program;
To hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program.
Wherein, the icon that described processor 902 generates described hide application program comprises:
Preset icon is set to the icon of described hide application program; Or
The self-defined icon that described hide application program is set.
Wherein, described processor 902 generates the icon of described hide application program, comprising:
Obtain the target icon of the application program in operating system except described hide application program,
Described target icon is set to the icon of described hide application program; Or,
Receive the image of user's input;
Described image is set to the icon of described hide application program.
Wherein, described processor 902 also performs following steps:
First password information is set;
According to described first password information, described hide application program is encrypted.
Wherein, described processor 902 is encrypted described hide application program according to described first password information, comprising:
Described first password information is verified when starting described hide application program; Or
Described first password information is verified when checking hiding Info in described hide application program.
Wherein, hide Info described in and comprise privacy network address;
Described processor 902 will hide Info and be added in described hide application program, by described hide application program, described hiding Info be carried out to hiding process and will be comprised:
Described privacy network address is added in described hide application program, carries out hiding process to described privacy network address by described hide application program.
Wherein, described privacy network address is added in described hide application program by described processor 902, carries out hiding process comprise by described hide application program to described privacy network address:
Described privacy network address is obtained from the bookmark of the browser described operating system;
Described privacy network address is added in described hide application program; Or,
Described privacy network address is obtained from the history information of the browser described operating system;
Described privacy network address is added in described hide application program; Or,
Obtain the privacy network address of user's input;
Described privacy network address is added in described hide application program.
Wherein, described privacy network address is added in described hide application program by described processor 902, carries out hiding process comprise by described hide application program to described privacy network address:
The access vestige of described privacy network address is removed by described hide application program.
Wherein, described privacy network address is added in described hide application program by described processor 902, carries out hiding process comprise by described hide application program to described privacy network address:
By described hide application program, the second encrypted message is set,
According to described second encrypted message, described privacy network address is encrypted.
Wherein, described processor 902 is encrypted described privacy network address according to described second encrypted message, comprising:
Described second encrypted message is verified when opening described privacy network address.
Wherein, hide Info described in and comprise private file;
Described processor 902 will hide Info and be added in described hide application program, carry out hiding process, comprising by described hide application program to described hiding Info:
Described private file is added in described hide application program, carries out hiding process to described hiding Info by described hide application program.
Wherein, described private file is added in described hide application program by described processor 902, by described hide application program, described hiding Info is carried out to hiding process and is comprised:
Obtain described private file;
By described hide application program, described private file is added in preset hidden folder; And/or,
By described hide application program, described private file is uploaded to cloud server.
Wherein, described private file is added in described hide application program by described processor 902, carries out hiding process, comprising by described hide application program to described hiding Info:
By described hide application program, the 3rd encrypted message is set,
According to described 3rd encrypted message, described private file is encrypted.
Wherein, described processor 902 is encrypted described private file according to described 3rd encrypted message, comprising:
Described 3rd encrypted message is verified when opening described private file.
Wherein, hide Info described in and comprise locking applications;
Described processor 902 will hide Info and be added in described hide application program, carry out hiding process, comprising by described hide application program to described hiding Info:
Described locking applications is started icon to be added in described hide application program, carries out hiding process to described locking applications by described hide application program.
Wherein, described locking applications is started icon and is added in described hide application program by described processor 902, carries out hiding process, comprising by described hide application program to described locking applications:
By described hide application program, the 4th encrypted message is set,
According to described 4th encrypted message, described locking applications is encrypted.
Wherein, described processor 902 is encrypted described locking applications according to described 4th encrypted message, comprising:
Described 4th encrypted message is verified when the startup icon triggering described locking applications starts described privacy application program.
Be understandable that, the function of each functional module of the equipment of the present embodiment can according to the method specific implementation in said method embodiment, and its specific implementation process with reference to the associated description of said method embodiment, no longer can repeat herein.
In embodiments of the present invention, equipment can create for holding the hide application program hidden Info, generate the icon of described hide application program, to hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program, this can make equipment carry out managing concentratedly by hide application program hiding Info of need carrying out hiding, thus be convenient to user management and hide Info, make equipment privacy network address only can be shown to owner to check simultaneously, effective raising privacy website safety and privacy, improve Consumer's Experience.
In the description of this instructions, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not must for be identical embodiment or example.And the specific features of description, structure, material or feature can combine in one or more embodiment in office or example in an appropriate manner.In addition, when not conflicting, the feature of the different embodiment described in this instructions or example and different embodiment or example can carry out combining and combining by those skilled in the art.
In addition, term " first ", " second " only for describing object, and can not be interpreted as instruction or hint relative importance or imply the quantity indicating indicated technical characteristic.Thus, be limited with " first ", the feature of " second " can express or impliedly comprise at least one this feature.In describing the invention, the implication of " multiple " is at least two, such as two, three etc., unless otherwise expressly limited specifically.
Describe and can be understood in process flow diagram or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by embodiments of the invention person of ordinary skill in the field.
In flow charts represent or in this logic otherwise described and/or step, such as, the sequencing list of the executable instruction for realizing logic function can be considered to, may be embodied in any computer-readable medium, for instruction execution system, device or equipment (as computer based system, comprise the system of processor or other can from instruction execution system, device or equipment instruction fetch and perform the system of instruction) use, or to use in conjunction with these instruction execution systems, device or equipment.With regard to this instructions, " computer-readable medium " can be anyly can to comprise, store, communicate, propagate or transmission procedure for instruction execution system, device or equipment or the device that uses in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wiring, portable computer diskette box (magnetic device), random access memory (RAM), ROM (read-only memory) (ROM), erasablely edit ROM (read-only memory) (EPROM or flash memory), fiber device, and portable optic disk ROM (read-only memory) (CDROM).In addition, computer-readable medium can be even paper or other suitable media that can print described program thereon, because can such as by carrying out optical scanning to paper or other media, then carry out editing, decipher or carry out process with other suitable methods if desired and electronically obtain described program, be then stored in computer memory.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple step or method can with to store in memory and the software performed by suitable instruction execution system or firmware realize.Such as, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: the discrete logic with the logic gates for realizing logic function to data-signal, there is the special IC of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is that the hardware that can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, this program perform time, step comprising embodiment of the method one or a combination set of.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, also can be that the independent physics of unit exists, also can be integrated in a module by two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.If described integrated module using the form of software function module realize and as independently production marketing or use time, also can be stored in a computer read/write memory medium.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (10)

1. the method hidden Info, is characterized in that, described method comprises:
Create for holding the hide application program hidden Info;
Generate the icon of described hide application program;
To hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program.
2. the method for claim 1, is characterized in that, the icon of the described hide application program of described generation comprises:
Preset icon is set to the icon of described hide application program; Or
The self-defined icon that described hide application program is set.
3. method as claimed in claim 2, it is characterized in that, the icon of the described hide application program of described generation, comprising:
Obtain the target icon of the application program in operating system except described hide application program,
Described target icon is set to the icon of described hide application program; Or,
Receive the image of user's input;
Described image is set to the icon of described hide application program.
4. the method for claim 1, is characterized in that, described method also comprises:
First password information is set;
According to described first password information, described hide application program is encrypted.
5. method as claimed in claim 4, is characterized in that, is describedly encrypted described hide application program according to described first password information, comprising:
Described first password information is verified when starting described hide application program; Or
Described first password information is verified when checking hiding Info in described hide application program.
6. the method for claim 1, is characterized in that, described in hide Info and comprise privacy network address;
Described hiding Info is added in described hide application program, by described hide application program, described hiding Info is carried out to hiding process and is comprised:
Described privacy network address is added in described hide application program, carries out hiding process to described privacy network address by described hide application program.
7. method as claimed in claim 6, is characterized in that, is describedly added in described hide application program by described privacy network address, carries out hiding process comprise by described hide application program to described privacy network address:
Described privacy network address is obtained from the bookmark of the browser described operating system;
Described privacy network address is added in described hide application program; Or,
Described privacy network address is obtained from the history information of the browser described operating system;
Described privacy network address is added in described hide application program; Or,
Obtain the privacy network address of user's input;
Described privacy network address is added in described hide application program.
8. method as claimed in claim 6, is characterized in that, is describedly added in described hide application program by described privacy network address, carries out hiding process comprise by described hide application program to described privacy network address:
The access vestige of described privacy network address is removed by described hide application program.
9. the device hidden Info, is characterized in that, described device comprises:
Creating unit, for creating for holding the hide application program hidden Info;
Generation unit, for generating the icon of described hide application program;
Hidden unit, is added into for hiding Info in described hide application program, carries out hiding process to described hiding Info by described hide application program.
10. an equipment, is characterized in that, described equipment comprises: housing, processor, storer, circuit board and power circuit, and wherein, circuit board is placed in the interior volume that housing surrounds, and processor and storer are arranged on circuit boards; Power circuit, for powering for each circuit of electronic equipment or device; Storer is used for stores executable programs code; Processor runs the program corresponding with executable program code by reading the executable program code stored in storer, for execution following steps:
Create for holding the hide application program hidden Info;
Generate the icon of described hide application program;
To hide Info and be added in described hide application program, and carry out hiding process to described hiding Info by described hide application program.
CN201510640540.0A 2015-09-30 2015-09-30 Method, device and equipment for hiding information Pending CN105335662A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510640540.0A CN105335662A (en) 2015-09-30 2015-09-30 Method, device and equipment for hiding information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510640540.0A CN105335662A (en) 2015-09-30 2015-09-30 Method, device and equipment for hiding information

Publications (1)

Publication Number Publication Date
CN105335662A true CN105335662A (en) 2016-02-17

Family

ID=55286181

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510640540.0A Pending CN105335662A (en) 2015-09-30 2015-09-30 Method, device and equipment for hiding information

Country Status (1)

Country Link
CN (1) CN105335662A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105843483A (en) * 2016-04-06 2016-08-10 上海斐讯数据通信技术有限公司 Method for managing APP icons and mobile terminal
CN106168967A (en) * 2016-07-04 2016-11-30 北京金山安全软件有限公司 Webpage information collection method, webpage information protection device and mobile terminal
WO2017143816A1 (en) * 2016-02-25 2017-08-31 上海斐讯数据通信技术有限公司 Privacy protection method and system for intelligent terminal
CN109165494A (en) * 2018-09-14 2019-01-08 深圳市泰衡诺科技有限公司 Privacy content guard method and terminal
WO2019011083A1 (en) * 2017-07-14 2019-01-17 格力电器(武汉)有限公司 Private information processing method and apparatus, and mobile terminal
CN109885997A (en) * 2019-03-29 2019-06-14 云深互联(北京)科技有限公司 A kind of user information guard method, client and electronic equipment
EP3519931A4 (en) * 2017-01-16 2019-10-23 Samsung Electronics Co., Ltd. Electronic device and method for creating shortcut to web page in electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500302A (en) * 2013-10-12 2014-01-08 广州市久邦数码科技有限公司 System and method of safety lock hidden programs
CN103810437A (en) * 2014-03-04 2014-05-21 深圳市金立通信设备有限公司 Method and terminal for hiding application program
CN103984885A (en) * 2014-05-30 2014-08-13 深圳市欧珀通信软件有限公司 Application program hiding method applied to touch screen terminal and touch screen terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500302A (en) * 2013-10-12 2014-01-08 广州市久邦数码科技有限公司 System and method of safety lock hidden programs
CN103810437A (en) * 2014-03-04 2014-05-21 深圳市金立通信设备有限公司 Method and terminal for hiding application program
CN103984885A (en) * 2014-05-30 2014-08-13 深圳市欧珀通信软件有限公司 Application program hiding method applied to touch screen terminal and touch screen terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017143816A1 (en) * 2016-02-25 2017-08-31 上海斐讯数据通信技术有限公司 Privacy protection method and system for intelligent terminal
CN105843483A (en) * 2016-04-06 2016-08-10 上海斐讯数据通信技术有限公司 Method for managing APP icons and mobile terminal
CN106168967A (en) * 2016-07-04 2016-11-30 北京金山安全软件有限公司 Webpage information collection method, webpage information protection device and mobile terminal
CN106168967B (en) * 2016-07-04 2019-11-26 北京金山安全软件有限公司 Webpage information collection method, webpage information protection device and mobile terminal
EP3519931A4 (en) * 2017-01-16 2019-10-23 Samsung Electronics Co., Ltd. Electronic device and method for creating shortcut to web page in electronic device
WO2019011083A1 (en) * 2017-07-14 2019-01-17 格力电器(武汉)有限公司 Private information processing method and apparatus, and mobile terminal
CN109165494A (en) * 2018-09-14 2019-01-08 深圳市泰衡诺科技有限公司 Privacy content guard method and terminal
CN109885997A (en) * 2019-03-29 2019-06-14 云深互联(北京)科技有限公司 A kind of user information guard method, client and electronic equipment

Similar Documents

Publication Publication Date Title
CN105335662A (en) Method, device and equipment for hiding information
CN106605232B (en) Utilization strategies keep data protection
CN104115152B (en) The method and apparatus that digital content is protected for use device certification
CN102622311B (en) USB (universal serial bus) mobile memory device access control method, USB mobile memory device access control device and USB mobile memory device access control system
JP5895471B2 (en) Information processing apparatus and program
CN105243326A (en) Display method and device of screen locking interface and electronic equipment
CN101529366A (en) Identification and visualization of trusted user interface objects
CN104333449A (en) Picture encryption method and system
JP2009259153A (en) Information processing apparatus, method of controlling the same, and control program
TWI476625B (en) Data security management systems and methods
CN111131216A (en) File encryption and decryption method and device
CN113177190A (en) Document content sharing method and electronic equipment
CN102857495A (en) Document playing method and device
AU2012393494A1 (en) Content management system
CN103036852A (en) Method and device for achieving network login
JP5041516B2 (en) USB memory for computer screen monitoring
JPWO2007142072A1 (en) Terminal apparatus and data management system provided with the same
CN103530550B (en) File/applied program processing method on communication terminal and device
CN108011978A (en) A kind of method and system using mobile terminal APP control spliced display walls
CN106657385A (en) Plug-in calling method, plug-in management method, client side and management server
JP2009086871A (en) Information processing system and information processing program
CN102761496A (en) Community information issuing method, device and system for network communities
JP2010020698A (en) Information processing system, information processing method, information processing program and recording medium
CN104317233A (en) Programmable display
CN112416210A (en) Information encryption and decryption method, system, storage medium and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160217