CN105447357A - Application processing method and terminal - Google Patents

Application processing method and terminal Download PDF

Info

Publication number
CN105447357A
CN105447357A CN201510883068.3A CN201510883068A CN105447357A CN 105447357 A CN105447357 A CN 105447357A CN 201510883068 A CN201510883068 A CN 201510883068A CN 105447357 A CN105447357 A CN 105447357A
Authority
CN
China
Prior art keywords
information
application program
module
privacy
described application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510883068.3A
Other languages
Chinese (zh)
Inventor
李�远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhuoyi Technology Co Ltd
Original Assignee
Shanghai Zhuoyi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhuoyi Technology Co Ltd filed Critical Shanghai Zhuoyi Technology Co Ltd
Priority to CN201510883068.3A priority Critical patent/CN105447357A/en
Publication of CN105447357A publication Critical patent/CN105447357A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

Embodiments of the invention disclose an application processing method and a terminal. The application processing method comprises: when an access request of an application is received, obtaining an encryption state of the application; if the encryption state of the application is that the application has been encrypted, receiving input verification information; if the verification information is verified unsuccessfully, marking preset privacy information in the application to be inaccessible; and opening the application and displaying a display interface not containing the privacy information. According to the method, user privacy data are protected according to user demands, so that others are prevented from viewing the user privacy data, the security is enhanced, and the user experience is improved.

Description

A kind of applied program processing method and terminal
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of applied program processing method and terminal.
Background technology
Present stage, the application of smart mobile phone is day by day universal, and people in use inevitably exist some privacy informations not wanting to allow other people know.In prior art, can be encrypted by the form of numeral, nine grids or encrypting fingerprint, but existing encryption can only carry out screen locking encryption for whole smart mobile phone, cannot be encrypted according to the demand of user, Consumer's Experience is not high.
Summary of the invention
The embodiment of the present invention provides a kind of applied program processing method and terminal, can be encrypted according to the demand of user easily.
First aspect present invention provides a kind of applied program processing method, comprising:
When receiving the request of access of application program, obtain the encrypted state of described application program;
If the encrypted state of described application program is for encrypt, then receive the authorization information of input;
If described authorization information authentication failed, then the privacy information preset in described application program is labeled as inaccessible;
Open described application program and show the display interface not comprising described privacy information.
Preferably, the encrypted state of the described application program of described acquisition, comprising:
Resolve the module information that described application program is corresponding;
Judge whether there is encryption identification in described module information;
If so, then determine that the encrypted state of described application program is for encrypt;
If not, then determine that the encrypted state of described application program is unencryption.
Preferably, the described authorization information receiving input, comprising:
Gather biological information, wherein, described biological information comprises at least one in finger print information, voiceprint and iris information;
Authorization information is generated according to described biological information;
Judge whether described authorization information mates with the enciphered message preset, and wherein, described default enciphered message comprises finger print information, voiceprint and iris information;
If so, then determine that described authorization information is proved to be successful;
If not, then described authorization information authentication failed is determined.
Preferably, described by described application program preset privacy information be labeled as inaccessible, comprising:
Obtain the module information that privacy information that described application program presets is corresponding, wherein, described default privacy information comprises private data and privacy function;
Lock the module information that described default privacy information is corresponding.
Preferably, described applied program processing method also comprises:
If the encrypted state of described application program is unencryption, or
If described authorization information is proved to be successful, then opens described application program and show the display interface comprising described default privacy information.
Second aspect present invention provides a kind of terminal, it is characterized in that, comprising:
Acquisition module, for when receiving the request of access of application program, obtains the encrypted state of described application program;
Receiver module, for when the encrypted state of described application program is for encrypting, receives the authorization information of input;
Mark module, for when described authorization information authentication failed, is labeled as inaccessible by the privacy information preset in described application program;
First starts module, for opening described application program and showing the display interface not comprising described privacy information.
Preferably, described acquisition module comprises:
Resolution unit, for resolving module information corresponding to described application program;
Judging unit, for judging whether there is encryption identification in described module information;
Determining unit, for when there is encryption identification in described module information, determines that the encrypted state of described application program is for encrypt; When there is not encryption identification in described module information, determine that the encrypted state of described application program is unencryption.
Preferably, described receiver module comprises:
Collecting unit, for gathering biological information, wherein, described biological information comprises at least one in finger print information, voiceprint and iris information;
Generation unit, for generating authorization information according to described biological information;
Matching unit, for judging whether described authorization information mates with the enciphered message preset, and wherein, described default enciphered message comprises finger print information, voiceprint and iris information;
Authentication unit, for when described authorization information is mated with the enciphered message preset, determines that described authorization information is proved to be successful; When described authorization information is not mated with the enciphered message preset, determine described authorization information authentication failed.
Preferably, described mark module comprises:
Acquiring unit, for obtaining module information corresponding to privacy information that described application program presets, wherein, described default privacy information comprises private data and privacy function;
Lock cell, for locking module information corresponding to described default privacy information.
Preferably, described terminal also comprises:
Second starts module, for when the encrypted state of described application program is unencryption, or when described authorization information is proved to be successful, opens described application program and shows the display interface comprising described default privacy information.
Implement the embodiment of the present invention, there is following beneficial effect:
In the embodiment of the present invention; when detecting the request of access of application programs; if the encrypted state of application program is for encrypt, then obtain authorization information, when failing the authentication; then the private data in described application program is labeled as inaccessible; thus the private data hidden in described application program, and then can, according to the private data of the demand protection user of user, avoid being checked by other people; enhance security, improve Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The process flow diagram of a kind of applied program processing method first embodiment that Fig. 1 provides for the embodiment of the present invention.
The process flow diagram of a kind of applied program processing method second embodiment that Fig. 2 provides for the embodiment of the present invention.
The process flow diagram of a kind of applied program processing method the 3rd embodiment that Fig. 3 provides for the embodiment of the present invention.
The structural representation of a kind of terminal first embodiment that Fig. 4 provides for the embodiment of the present invention.
The structural representation of a kind of terminal second embodiment that Fig. 5 provides for the embodiment of the present invention.
The structural representation of a kind of terminal the 3rd embodiment that Fig. 6 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The process flow diagram of a kind of applied program processing method first embodiment that Fig. 1 provides for the embodiment of the present invention.This applied program processing method is applied to terminal, and described terminal can be smart mobile phone, panel computer, computer, e-book or other Wearable device etc., and described terminal can realize various different function by set up applications.In the present embodiment, be encrypted by application programs, when opening application program, user's input validation information can be pointed out, if checking is not passed through, then can hide the privacy information of this application program, thus reach the object of the demand protection privacy according to user.Be understandable that, in order to obtain authorization information, described terminal can be provided with fingerprint sensor, vocal print sensor, first-class device of making a video recording, be respectively used to identify the biological characteristic such as fingerprint, vocal print, iris.This applied program processing method comprises the following steps S101-S104.
In step S101, when receiving the request of access of application program, obtain the encrypted state of described application program.
Concrete, first detect the request of access whether receiving application programs, such as, whether be there is the single-click operation of the icon of application programs by detecting, judge whether to receive request of access.When receiving request of access, obtain the encrypted state of this application program.Wherein, encrypted state is divided into and encrypts and unencryption.Whether application program encrypts is pre-set by user, and in present embodiment, important application program can be encrypted by user, class of such as chatting, picture category, Net silver class etc.When application programs is encrypted, user can be pointed out to arrange corresponding enciphered message, and wherein, enciphered message comprises: character information, finger print information, voiceprint and iris information.
In step s 102, if the encrypted state of described application program is for encrypt, then the authorization information of input is received.
Concrete, if the encrypted state of described application program is for encrypt, then points out user's input validation information, and receive the authorization information of user's input.In the present embodiment, user's input validation information is pointed out can to remind by the dialog box on display interface or by voice message.The authorization information of user's input can be common character type information, such as English or digital etc.; Also can be biological characteristic class authorization information, such as fingerprint, vocal print, iris etc.Be understandable that, terminal can by fingerprint sensor gather user finger print information, by the voiceprint of vocal print sensor or microphone collection user, can be gathered the iris information of user by camera.
In step s 103, if described authorization information authentication failed, then the privacy information preset in described application program is labeled as inaccessible.
Concrete, judge whether described authorization information mates with enciphered message, if do not mate with enciphered message, then represents authentication failed.Now, the privacy information preset in application program is labeled as inaccessible.In the present embodiment, user can arrange privacy information according to the demand of self in advance in the application, and privacy information comprises private data and privacy function.Such as, some chat record in chat class software can be set to privacy by user; Can be privacy by some function setting in application class software.
In step S104, open described application program and show the display interface not comprising described privacy information.
Concrete, due to authorization information authentication failed, privacy information is marked as inaccessible, now opens described application program, and shows the display interface not comprising described privacy information, thus can protect the privacy information of user.
Above-mentioned known; applied program processing method in the embodiment of the present invention, when detecting the request of access of application programs, if the encrypted state of application program is for encrypt; then obtain authorization information; when failing the authentication, then the private data in described application program is labeled as unavailable, thus hides the private data in described application program; and then can according to the private data of the demand protection user of user; avoid being checked by other people, enhance security, improve Consumer's Experience.
Figure 2 shows that the process flow diagram of a kind of applied program processing method second embodiment that the embodiment of the present invention provides.In present embodiment, this applied program processing method comprises step S201-S208.
In step s 201, when receiving the request of access of application program, resolve the module information that described application program is corresponding.
Concrete, when receiving the request of access of application program, resolve the module information that described application program is corresponding, wherein, necessary related data information when module information refers to and starts application program.Module information is formed by each independent packet encapsulation, starts corresponding application program by executive module information.In the present embodiment, when receiving the request of access of application program, resolve the module information of this application program.
In step S202, judge whether there is encryption identification in described module information.
Concrete, whether determination component information exists encryption identification.Wherein, whether described encryption identification is encrypted for characterizing this application program.In the present embodiment, if user wants to encrypt a certain application program, after user is provided with, namely this encryption identification can be there is in the module information that this application program is corresponding.Therefore, by judging whether that there is encryption identification can judge that whether application program is encrypted.If there is encryption identification, then determine that the encrypted state of described application program is for encrypt, and enters in step S203; If there is not encryption identification, then determine that the encrypted state of described application program is unencryption, enter in step S208.
In step S203, gather biological information.
Concrete, when determining the encrypted state of this application program for encrypting, now need to verify.In the present embodiment, need the biological information gathering user, wherein, biological information comprises at least one in finger print information, voiceprint and iris information.Such as, can be independent employing fingerprint, vocal print or iris; Also can be two or more the combination adopting fingerprint, vocal print or iris, such as first gather fingerprint, gather vocal print etc. again, the embodiment of the present invention be as limit.
In step S204, generate authorization information according to described biological information.
Concrete, generate corresponding authorization information according to the biological information gathered.
In step S205, judge whether described authorization information mates with the enciphered message preset.
Concrete, authorization information and the enciphered message preset are contrasted, judges whether coupling.In the present embodiment, when user arrange a certain application program is encrypted time, pointing out user that cipher mode to this application program is set simultaneously, gathering the enciphered message of user when arranging cipher mode, wherein, enciphered message comprises: finger print information, voiceprint and iris information.Such as, employing fingerprint, vocal print or iris that can be independent; In order to further strengthen security, also can be two or more the combination adopting fingerprint, vocal print or iris, such as first gathering fingerprint, gather vocal print etc. again.How to encrypt by arranging, forming the enciphered message preset.Whether when authorization information being contrasted with the enciphered message preset, identical both judging with regard to a needs, if identical, then represent that authorization information is mated with default enciphered message, authorization information is proved to be successful, and enters in step S208; If both are not identical, do not mate, then show authorization information authentication failed, now enter in step S206.
In step S206, the privacy information preset in described application program is labeled as inaccessible.
Concrete, when authorization information authentication failed, showing that current access is unauthorized, in order to protect the privacy information of user, now needing default privacy information to be labeled as inaccessible.In the present embodiment, user can arrange privacy information in advance in the application, and privacy information comprises private data and privacy function.Such as, some chat record in chat class software can be set to privacy by user; Can be privacy by some function setting in application class software.After privacy information is labeled as inaccessible, follow-uply would not show this privacy information when restarting this application program, thus the private information of protection user.
In step S207, open described application program and show the display interface not comprising described privacy information.
Concrete, due to authorization information authentication failed, privacy information is marked as inaccessible, now opens described application program, and shows the display interface not comprising described privacy information, thus can protect the privacy information of user.
In step S208, open described application program and show the display interface comprising described default privacy information.
Concrete, if determine in step S202, the encrypted state of application program is unencryption, show user and this application program of unencryption, now start this application program in a normal way, namely open described application program and show the display interface comprising described default privacy information.It should be noted that, now due to this application program of user's unencryption, may not there is private data in this application program.
In addition, if authorization information is proved to be successful in step S205, show to be now legal access, now also the private data of correspondence can be displayed, therefore also can start application program in a normal way, namely open described application program and show the display interface comprising described default privacy information.
Above-mentioned known; applied program processing method in the embodiment of the present invention, when detecting the request of access of application programs, if the encrypted state of application program is for encrypt; then obtain authorization information; when failing the authentication, then the private data in described application program is labeled as unavailable, thus hides the private data in described application program; and then can according to the private data of the demand protection user of user; avoid being checked by other people, enhance security, improve Consumer's Experience.
Figure 3 shows that the process flow diagram of a kind of applied program processing method the 3rd embodiment that the embodiment of the present invention provides.In present embodiment, this applied program processing method comprises step S301-S309.Wherein, in the present embodiment, in the second embodiment shown in S301-S305 and Fig. 2, the step of S201-S205 is identical, and in the present embodiment, in the second embodiment shown in S308-S309 and Fig. 2, the step of S207-S208 is identical, is not repeated herein.
In step S301, when receiving the request of access of application program, resolve the module information that described application program is corresponding.
In step s 302, judge whether there is encryption identification in described module information.
In step S303, gather biological information.
In step s 304, authorization information is generated according to described biological information.
In step S305, judge whether described authorization information mates with the enciphered message preset.
In step S306, obtain the module information that privacy information that described application program presets is corresponding, wherein, described default privacy information comprises private data and privacy function.
Concrete, do not mate with enciphered message in authorization information, during authentication failed, show that current access is unauthorized, therefore now need the privacy information protecting this application program.Now, the module information that privacy information that this application program presets is corresponding is obtained.Wherein, privacy information comprises private data and privacy function.Privacy information can be pre-set by user, and some data of application program, some function, some interface, in the process using application program, can be set to private data by user.
In step S307, lock the module information that described default privacy information is corresponding.
Concrete, module information corresponding for privacy information is locked, makes the follow-up privacy information cannot accessing correspondence, thus realize the object of protection user privacy information.Be understandable that, if input validation information being proved to be successful when subsequent user opens this application program again, now module information corresponding for privacy information can be unlocked.
In step S308, open described application program and show the display interface not comprising described privacy information.
In step S309, open described application program and show the display interface comprising described default privacy information.
Above-mentioned known; applied program processing method in the embodiment of the present invention, when detecting the request of access of application programs, if the encrypted state of application program is for encrypt; then obtain authorization information; when failing the authentication, then the private data in described application program is labeled as unavailable, thus hides the private data in described application program; and then can according to the private data of the demand protection user of user; avoid being checked by other people, enhance security, improve Consumer's Experience.
The structural representation of a kind of terminal first embodiment that Fig. 4 provides for the embodiment of the present invention.This terminal can be smart mobile phone, panel computer, computer, e-book or other Wearable device etc., and described terminal can realize various different function by set up applications.In the present embodiment, be encrypted by application programs, when opening application program, user's input validation information can be pointed out, if checking is not passed through, then can hide the privacy information of this application program, thus reach the object of the demand protection privacy according to user.Be understandable that, in order to obtain authorization information, described terminal can be provided with fingerprint sensor, vocal print sensor, first-class device of making a video recording, be respectively used to identify the biological characteristic such as fingerprint, vocal print, iris.This terminal comprises: acquisition module 401, receiver module 402, mark module 403 and first start module 404.
Acquisition module 401, for when receiving the request of access of application program, obtains the encrypted state of described application program.
Concrete, first acquisition module 401 detects the request of access whether receiving application programs, such as, whether be there is the single-click operation of the icon of application programs, judge whether to receive request of access by detecting.When receiving request of access, acquisition module 401 obtains the encrypted state of this application program.Wherein, encrypted state is divided into and encrypts and unencryption.Whether application program encrypts is pre-set by user, and in present embodiment, important application program can be encrypted by user, class of such as chatting, picture category, Net silver class etc.When application programs is encrypted, user can be pointed out to arrange corresponding enciphered message, and wherein, enciphered message comprises: character information, finger print information, voiceprint and iris information.
Receiver module 402, for when the encrypted state of described application program is for encrypting, receives the authorization information of input.
Concrete, if the encrypted state of described application program is for encrypt, then receiver module 402 points out user's input validation information, and receives the authorization information of user's input.In the present embodiment, receiver module 402 points out user's input validation information can remind by the dialog box on display interface or by voice message.The authorization information of user's input can be common character type information, such as English or digital etc.; Also can be biological characteristic class authorization information, such as fingerprint, vocal print, iris etc.Be understandable that, terminal can by fingerprint sensor gather user finger print information, by the voiceprint of vocal print sensor or microphone collection user, can be gathered the iris information of user by camera.
The privacy information preset in described application program, for when described authorization information authentication failed, is labeled as inaccessible by mark module 403.
Concrete, judge whether described authorization information mates with enciphered message, if do not mate with enciphered message, then represents authentication failed.Now, the privacy information preset in application program is labeled as inaccessible by mark module 403.In the present embodiment, user can arrange privacy information in advance in the application, and privacy information comprises private data and privacy function.Such as, some chat record in chat class software can be set to privacy by user; Can be privacy by some function setting in application class software.
First starts module 404 for opening described application program and showing the display interface not comprising described privacy information.
Concrete, due to authorization information authentication failed, privacy information is marked as inaccessible, and now the first startup module 404 opens described application program, and shows the display interface not comprising described privacy information, thus can protect the privacy information of user.
Above-mentioned known; terminal in the embodiment of the present invention, when detecting the request of access of application programs, if the encrypted state of application program is for encrypt; then obtain authorization information; when failing the authentication, then the private data in described application program is labeled as unavailable, thus hides the private data in described application program; and then can according to the private data of the demand protection user of user; avoid being checked by other people, enhance security, improve Consumer's Experience.
The structural representation of a kind of terminal second embodiment that Fig. 5 provides for the embodiment of the present invention.The first embodiment described in comparison diagram 4, in the present embodiment, acquisition module 401 comprises further: resolution unit 4011, judging unit 4012 and determining unit 4013, and receiver module 402 comprises further: collecting unit 4021, generation unit 4022, matching unit 4023 and authentication unit 4024.
Resolution unit 4011 is for resolving module information corresponding to described application program.
Judging unit 4012 is for judging whether there is encryption identification in described module information.
Determining unit 4013, for when there is encryption identification in described module information, determines that the encrypted state of described application program is for encrypt; When there is not encryption identification in described module information, determine that the encrypted state of described application program is unencryption.
Collecting unit 4021 is for gathering biological information, and wherein, described biological information comprises at least one in finger print information, voiceprint and iris information.
Generation unit 4022 is for generating authorization information according to described biological information.
Matching unit 4023 is for judging whether described authorization information mates with the enciphered message preset, and wherein, described default enciphered message comprises finger print information, voiceprint and iris information.
Authentication unit 4024, for when described authorization information is mated with the enciphered message preset, determines that described authorization information is proved to be successful; When described authorization information is not mated with the enciphered message preset, determine described authorization information authentication failed.
The structural representation of a kind of terminal the 3rd embodiment that Fig. 6 provides for the embodiment of the present invention.The second embodiment described in comparison diagram 5, in the present embodiment, mark module 403 comprises further: acquiring unit 4031 and lock cell 4032, and described terminal also comprises: second starts module 405.
Acquiring unit 4031 is for module information corresponding to the privacy information that obtains described application program and preset, and wherein, described default privacy information comprises private data and privacy function.
Lock cell 4032 is for locking module information corresponding to described default privacy information.
Second starts module 405 for when the encrypted state of described application program is unencryption, or when described authorization information is proved to be successful, opens described application program and show the display interface comprising described default privacy information.
It should be noted that, in the embodiment of the present invention, the terminal of Fig. 4-6 is corresponding with the applied program processing method that Fig. 1-Fig. 3 shows, does not carry out repeated description at this to the concrete function of each module, unit.
Above-mentioned known; terminal in the embodiment of the present invention, when detecting the request of access of application programs, if the encrypted state of application program is for encrypt; then obtain authorization information; when failing the authentication, then the private data in described application program is labeled as unavailable, thus hides the private data in described application program; and then can according to the private data of the demand protection user of user; avoid being checked by other people, enhance security, improve Consumer's Experience.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (10)

1. an applied program processing method, is characterized in that, comprising:
When receiving the request of access of application program, obtain the encrypted state of described application program;
If the encrypted state of described application program is for encrypt, then receive the authorization information of input;
If described authorization information authentication failed, then the privacy information preset in described application program is labeled as inaccessible;
Open described application program and show the display interface not comprising described privacy information.
2. applied program processing method as claimed in claim 1, it is characterized in that, the encrypted state of the described application program of described acquisition, comprising:
Resolve the module information that described application program is corresponding;
Judge whether there is encryption identification in described module information;
If so, then determine that the encrypted state of described application program is for encrypt;
If not, then determine that the encrypted state of described application program is unencryption.
3. applied program processing method as claimed in claim 2, is characterized in that, the described authorization information receiving input, comprising:
Gather biological information, wherein, described biological information comprises at least one in finger print information, voiceprint and iris information;
Authorization information is generated according to described biological information;
Judge whether described authorization information mates with the enciphered message preset, and wherein, described default enciphered message comprises finger print information, voiceprint and iris information;
If so, then determine that described authorization information is proved to be successful;
If not, then described authorization information authentication failed is determined.
4. applied program processing method as claimed in claim 3, is characterized in that, described the privacy information preset in described application program is labeled as inaccessible, comprising:
Obtain the module information that privacy information that described application program presets is corresponding, wherein, described default privacy information comprises private data and privacy function;
Lock the module information that described default privacy information is corresponding.
5. the applied program processing method as described in claim 3 or 4, is characterized in that, also comprises:
If the encrypted state of described application program is unencryption, or
If described authorization information is proved to be successful, then opens described application program and show the display interface comprising described default privacy information.
6. a terminal, is characterized in that, comprising:
Acquisition module, for when receiving the request of access of application program, obtains the encrypted state of described application program;
Receiver module, for when the encrypted state of described application program is for encrypting, receives the authorization information of input;
Mark module, for when described authorization information authentication failed, is labeled as inaccessible by the privacy information preset in described application program;
First starts module, for opening described application program and showing the display interface not comprising described privacy information.
7. terminal as claimed in claim 6, it is characterized in that, described acquisition module comprises:
Resolution unit, for resolving module information corresponding to described application program;
Judging unit, for judging whether there is encryption identification in described module information;
Determining unit, for when there is encryption identification in described module information, determines that the encrypted state of described application program is for encrypt;
When there is not encryption identification in described module information, determine that the encrypted state of described application program is unencryption.
8. terminal as claimed in claim 7, it is characterized in that, described receiver module comprises:
Collecting unit, for gathering biological information, wherein, described biological information comprises at least one in finger print information, voiceprint and iris information;
Generation unit, for generating authorization information according to described biological information;
Matching unit, for judging whether described authorization information mates with the enciphered message preset, and wherein, described default enciphered message comprises finger print information, voiceprint and iris information;
Authentication unit, for when described authorization information is mated with the enciphered message preset, determines that described authorization information is proved to be successful; When described authorization information is not mated with the enciphered message preset, determine described authorization information authentication failed.
9. terminal as claimed in claim 8, it is characterized in that, described mark module comprises:
Acquiring unit, for obtaining module information corresponding to privacy information that described application program presets, wherein, described default privacy information comprises private data and privacy function;
Lock cell, for locking module information corresponding to described default privacy information.
10. terminal as claimed in claim 8 or 9, is characterized in that, also comprise:
Second starts module, for when the encrypted state of described application program is unencryption, or when described authorization information is proved to be successful, opens described application program and shows the display interface comprising described default privacy information.
CN201510883068.3A 2015-12-03 2015-12-03 Application processing method and terminal Pending CN105447357A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510883068.3A CN105447357A (en) 2015-12-03 2015-12-03 Application processing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510883068.3A CN105447357A (en) 2015-12-03 2015-12-03 Application processing method and terminal

Publications (1)

Publication Number Publication Date
CN105447357A true CN105447357A (en) 2016-03-30

Family

ID=55557526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510883068.3A Pending CN105447357A (en) 2015-12-03 2015-12-03 Application processing method and terminal

Country Status (1)

Country Link
CN (1) CN105447357A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529238A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Information protection method and mobile terminal
CN107480596A (en) * 2017-07-18 2017-12-15 广东欧珀移动通信有限公司 Bio-identification mode control method and Related product
WO2018058373A1 (en) * 2016-09-28 2018-04-05 达闼科技(北京)有限公司 Control method and apparatus for electronic device, and electronic device
CN108574781A (en) * 2018-05-17 2018-09-25 东莞市华睿电子科技有限公司 A kind of image processing method applied to instant communication client session log
CN108881116A (en) * 2017-05-11 2018-11-23 阿里巴巴集团控股有限公司 Show the implementation method and device of sensitive information
CN109815667A (en) * 2018-12-27 2019-05-28 维沃移动通信有限公司 Display methods and terminal device
WO2019127467A1 (en) * 2017-12-29 2019-07-04 华为技术有限公司 Data access method and device
CN111552698A (en) * 2020-04-21 2020-08-18 重庆富民银行股份有限公司 SQL version control system and method for solving environmental difference
CN113704797A (en) * 2021-09-06 2021-11-26 成都中科创达软件有限公司 Program encryption method and device, electronic equipment and storage medium

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018058373A1 (en) * 2016-09-28 2018-04-05 达闼科技(北京)有限公司 Control method and apparatus for electronic device, and electronic device
CN106529238A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Information protection method and mobile terminal
CN108881116A (en) * 2017-05-11 2018-11-23 阿里巴巴集团控股有限公司 Show the implementation method and device of sensitive information
CN107480596A (en) * 2017-07-18 2017-12-15 广东欧珀移动通信有限公司 Bio-identification mode control method and Related product
CN107480596B (en) * 2017-07-18 2021-04-16 Oppo广东移动通信有限公司 Biometric pattern control method and related product
WO2019127467A1 (en) * 2017-12-29 2019-07-04 华为技术有限公司 Data access method and device
CN110651270A (en) * 2017-12-29 2020-01-03 华为技术有限公司 Data access method and device
CN110651270B (en) * 2017-12-29 2023-11-10 华为技术有限公司 Data access method and device
CN108574781A (en) * 2018-05-17 2018-09-25 东莞市华睿电子科技有限公司 A kind of image processing method applied to instant communication client session log
CN109815667A (en) * 2018-12-27 2019-05-28 维沃移动通信有限公司 Display methods and terminal device
CN111552698A (en) * 2020-04-21 2020-08-18 重庆富民银行股份有限公司 SQL version control system and method for solving environmental difference
CN113704797A (en) * 2021-09-06 2021-11-26 成都中科创达软件有限公司 Program encryption method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105447357A (en) Application processing method and terminal
CN101529366B (en) Identification and visualization of trusted user interface objects
EP3343831B1 (en) Identity authentication method and apparatus
US9531710B2 (en) Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication
US8254572B2 (en) Secure provisioning of a portable device using a representation of a key
CN103279411B (en) Enter the method and system of application program based on fingerprint recognition
EP2843569A1 (en) Method and apparatus for accessing application
EP2835997B1 (en) Cell phone data encryption method and decryption method
JP2008047085A (en) Data security system, apparatus and method using usb device
KR20150087205A (en) Secure communication architecture
CN111800273B (en) Information processing method, electronic device, and storage medium
US20160085981A1 (en) Secure mobile phone document storage application
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN112243000B (en) Application data processing method and device, computer equipment and storage medium
US9756044B2 (en) Establishment of communication connection between mobile device and secure element
KR20070024100A (en) Network security system by using image key input and its method
WO2016165537A1 (en) Method for controlling intelligent terminal and apparatus for controlling intelligent terminal
KR101630462B1 (en) Apparatus and Method for Securing a Keyboard
TW201738802A (en) A removable security device and a method to prevent unauthorized exploitation and control access to files
CN116011042A (en) Data storage method, device, system, computer equipment and storage medium
CN106161365B (en) Data processing method and device and terminal
CN114969777A (en) File access control method and device, electronic equipment and storage medium
JP2007188307A (en) Data file monitor apparatus
CN113672886A (en) Prompting method and device
GB2556625A (en) Secure enrolment of biometric data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160330