CN105447365A - Control based privacy protection method and user terminal - Google Patents

Control based privacy protection method and user terminal Download PDF

Info

Publication number
CN105447365A
CN105447365A CN201510752161.0A CN201510752161A CN105447365A CN 105447365 A CN105447365 A CN 105447365A CN 201510752161 A CN201510752161 A CN 201510752161A CN 105447365 A CN105447365 A CN 105447365A
Authority
CN
China
Prior art keywords
information
authentication information
authentication
wearable device
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510752161.0A
Other languages
Chinese (zh)
Other versions
CN105447365B (en
Inventor
邹海荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510752161.0A priority Critical patent/CN105447365B/en
Publication of CN105447365A publication Critical patent/CN105447365A/en
Application granted granted Critical
Publication of CN105447365B publication Critical patent/CN105447365B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

Embodiments of the present invention relate to the technical field of communication, and disclose a control based privacy protection method and a user terminal. The method comprises detecting an operating instruction for a control contained by a corresponding application; in response to the operating instruction, outputting an authentication mode selection interface, wherein the authentication mode selection interface comprises a plurality of different authentication modes; detecting a target authentication mode selected from the plurality of different authentication modes, and acquiring to-be-authenticated information corresponding to the target authentication mode; and comparing to determine whether the to-be-authenticated information is the same as a stored preset authentication information bound with the control, and if yes, executing a response event corresponding to the control. By implementing the embodiment of the present invention, the range of privacy protection can be flexibly controlled.

Description

A kind of method for secret protection based on control and user terminal
Technical field
The present invention relates to communication technique field, be specifically related to a kind of method for secret protection based on control and user terminal.
Background technology
At present, people are more and more higher for the concern of secret protection, and a lot of application that therefore user terminal such as mobile phone, panel computer is installed both provide the function of secret protection.But find in practice; existing application secret protection is all whole application locked substantially; the violence way of this single solution for diverse problems is in fact not necessarily appropriate; under certain page, such as, only just there is the privacy of user in certain application; and user also just hopes that page of protection; if whole application is locked, then can the adding users complexity that uses this to apply.
Summary of the invention
In order to solve above-mentioned technological deficiency, the embodiment of the invention discloses a kind of secret protection method based on control and user terminal, the scope of secret protection can be controlled neatly.
Embodiment of the present invention first aspect discloses a kind of method for secret protection based on control, comprising:
Detect the operational order of the control that application programs comprises;
Respond described operational order, authentication output way selection interface; Described authentication mode selects interface to comprise several different authentication mode;
Detect the target authentication mode chosen from described several different authentication mode, and gather information to be certified corresponding to described target authentication mode;
Contrast described information to be certified whether identical with the default authentication information of the described control bundle of storage, if identical, perform the response events that described control is corresponding.
As the optional embodiment of one, after the information to be certified that described collection described target authentication mode is corresponding, and the described information to be certified of described contrast whether identical with the default authentication information of the described control bundle of storage before, described method also comprises:
Send first to cloud platform and obtain request with reference to authentication information, described first obtains request with reference to authentication information comprises the identity information of described application program and the identification information of described control;
Receive the first message that described in described cloud platform response, the first reference authentication information acquisition request returns, described first message comprises first of the described control bundle that described application program comprises with reference to authentication information;
Send second to keeping the wearable device of communication connection and obtain request with reference to authentication information, described second obtains request with reference to authentication information comprises the identity information of described application program and the identification information of described control;
Receive the second message that the described second reference authentication information acquisition request of described wearable device response returns, described second message comprises second of the described control bundle that described application program comprises with reference to authentication information;
Judge that whether first of described control bundle is identical with reference to authentication information with second of described control bundle with reference to authentication information, if identical, store first of described control bundle as the default authentication information of described control bundle with reference to authentication information with reference to second of authentication information or described control bundle.
As the optional embodiment of one, described first message comprises the first wearable device mark that described cloud platform is specified, described second message comprises the self identification of described wearable device, then after the described information to be certified of contrast is identical with the default authentication information of the described control bundle of storage, and before response events corresponding to the described control of described execution, described method also comprises:
Judge that whether the described first wearable device mark that described cloud platform is specified is consistent with the self identification of described wearable device, if unanimously, the step of the response events that the described control of the execution described in execution is corresponding.
As the optional embodiment of one, described method also comprises:
If judge that the described first wearable device mark that described cloud platform is specified is inconsistent with the self identification of described wearable device, export information, the identity that described information is used for described wearable device is illegal.
As the optional embodiment of one, described several different authentication mode comprises the combination of any one or several in cipher authentication mode, finger print identifying mode, voiceprint mode and iris authentication mode.
Embodiment of the present invention second aspect discloses a kind of user terminal, comprising:
First detecting unit, for detecting the operational order of the control that application programs comprises;
Output unit, for responding described operational order, authentication output way selection interface; Described authentication mode selects interface to comprise several different authentication mode;
Second detecting unit, for detecting the target authentication mode chosen from described several different authentication mode;
Collecting unit, for gathering information to be certified corresponding to described target authentication mode;
Whether contrast unit is identical with the default authentication information of the described control bundle of storage for contrasting described information to be certified;
Event execution unit, for when the comparing result of described contrast unit is identical, performs the response events that described control is corresponding.
As the optional embodiment of one, described user terminal also comprises:
Interactive unit, for gather information to be certified corresponding to described target authentication mode at described collecting unit after, send first to cloud platform and obtain request with reference to authentication information, described first obtains request with reference to authentication information comprises the identity information of described application program and the identification information of described control; Receive the first message that described in described cloud platform response, the first reference authentication information acquisition request returns, described first message comprises first of the described control bundle that described application program comprises with reference to authentication information;
And, described interactive unit, also for obtaining request to keeping the wearable device of communication connection to send second with reference to authentication information, described second obtains request with reference to authentication information comprises the identity information of described application program and the identification information of described control; And receive the second message that the described second reference authentication information acquisition request of described wearable device response returns, described second message comprises second of the described control bundle that described application program comprises with reference to authentication information;
First judging unit, for judging that whether first of described control bundle is identical with reference to authentication information with second of described control bundle with reference to authentication information;
Storage unit, for when the judged result of described first judging unit is identical, stores first of described control bundle as the default authentication information of described control bundle with reference to authentication information with reference to second of authentication information or described control bundle.
As the optional embodiment of one, described first message comprises the first wearable device mark that described cloud platform is specified, and described second message comprises the self identification of described wearable device, and described user terminal also comprises:
Second judging unit, for after the described information to be certified of described contrast unit contrast is identical with the default authentication information of the described control bundle of storage; Judge that whether the described first wearable device mark that described cloud platform is specified is consistent with the self identification of described wearable device;
Described event execution unit, specifically for when the comparing result of described contrast unit is identical, and when the judged result of described second judging unit is consistent, performs the response events that described control is corresponding.
As the optional embodiment of one:
Described output unit, time also for judging that at described second judging unit the described first wearable device mark that described cloud platform is specified is inconsistent with the self identification of described wearable device, export information, the identity that described information is used for described wearable device is illegal.
As the optional embodiment of one, described several different authentication mode comprises the combination of any one or several in cipher authentication mode, finger print identifying mode, voiceprint mode and iris authentication mode.
Compared with prior art, the embodiment of the present invention has following beneficial effect:
User terminal is after the operational order control that application programs comprises being detected, the authentication mode comprising several different authentication mode can be exported and select interface, after user terminal detects the target authentication mode that user chooses from this several different authentication mode, the information to be certified that target authentication mode is corresponding can be gathered, and when contrasting information to be certified and being identical with the default authentication information of this control bundle of storage, the response events that this control is corresponding can be performed.Visible, implement the embodiment of the present invention, can the part control in whole application be locked, and without the need to locking whole application, thus the scope of secret protection can be controlled neatly.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a kind of secret protection method based on control disclosed in the embodiment of the present invention;
Fig. 2 is the disclosed another kind of schematic flow sheet based on the secret protection method of control of the embodiment of the present invention;
Fig. 3 is the disclosed another kind of schematic flow sheet based on the secret protection method of control of the embodiment of the present invention;
Fig. 4 is the structural representation of a kind of user terminal disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention;
Fig. 6 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of secret protection method based on control and user terminal, the scope of secret protection can be controlled neatly.Below be described in detail respectively.
Refer to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of method for secret protection based on control disclosed in the embodiment of the present invention.As shown in Figure 1, can should comprise the following steps based on the method for secret protection of control.
101, user terminal detects the operational order of the control that application programs comprises.
In the embodiment of the present invention, user terminal can comprise personal digital assistant (PersonalDigitalAssistant, PDA), mobile internet device (MobileInternetDevice, MID), all kinds of electronics with touch-screen such as Intelligent worn device (as intelligent watch, Intelligent bracelet), the embodiment of the present invention is not construed as limiting.
In the embodiment of the present invention, user terminal can detect control that user's application programs comprises (as photograph album apply the some private photo album linking button comprised, social application comprises shares button etc.) carry out clicking, double-click, longly to press, the operation such as slip time input operational order.
102, user terminal responds this operational order, authentication output way selection interface, and wherein, authentication mode selects interface to comprise several different authentication mode.
In the embodiment of the present invention, the several different authentication mode that authentication mode selects interface to comprise can comprise the combination of any one or several in cipher authentication mode, finger print identifying mode, voiceprint mode and iris authentication mode, and the embodiment of the present invention is not construed as limiting.
103, user terminal detects the target authentication mode chosen from above-mentioned several different authentication mode, and gathers information to be certified corresponding to target authentication mode.
In the embodiment of the present invention, the quantity of the target authentication mode that the user that user terminal detects chooses from above-mentioned several different authentication mode can for multiple.For example, the target authentication mode that the user that user terminal detects chooses from above-mentioned several different authentication mode can comprise cipher authentication mode and finger print identifying mode, correspondingly, the information to be certified that the user terminal target authentication mode that can collect is corresponding can comprise password to be certified and fingerprint to be certified.Again for example, the target authentication mode that the user that user terminal detects chooses from above-mentioned several different authentication mode can comprise finger print identifying mode and iris authentication mode, correspondingly, the information to be certified that the user terminal target authentication mode that can collect is corresponding can comprise fingerprint to be certified and iris to be certified.
104, whether user terminal to contrast information to be certified identical with the default authentication information of this control bundle of storage, if coupling, performs step 105; Otherwise, process ends.
In the embodiment of the present invention, for example, when the information to be certified that the target authentication mode that user terminal collects is corresponding can comprise password to be certified and fingerprint to be certified, whether user terminal can contrast password to be certified identical with the preset password of this control bundle of storage, and whether can contrast fingerprint to be certified identical with the preset fingerprint of this control bundle of storage, if it is identical with the preset password of this control bundle of storage to contrast password to be certified, and it is identical with the preset fingerprint of this control bundle of storage to contrast fingerprint to be certified, then user terminal can determine that information to be certified is identical with the default authentication information of this control bundle of storage.Otherwise, if it is not identical with the preset password of this control bundle of storage to contrast password to be certified, and/or, contrast fingerprint to be certified not identical with the preset fingerprint of this control bundle of storage, then user terminal can determine that information to be certified is not identical with the default authentication information of this control bundle of storage.
In one embodiment, this control is when first time uses, and user can arrange the default authentication information of binding for this control.
105, user terminal performs response events corresponding to this control.
In the embodiment of the present invention, for example, suppose that this control is that the some private photo album linking button comprised applied by photograph album, so user terminal performs response events corresponding to this control can be that user terminal jumps to this private photo album.Again for example, suppose this control be social application comprise share button, so user terminal performs response events corresponding to this control can be that user terminal performs and shares operation.In the embodiment of the present invention, when this control is menu control, it can be the menu that user terminal exports this menu control and comprises that user terminal performs response events corresponding to this control.
Visible, implement the method described by Fig. 1, user terminal is after the operational order control that application programs comprises being detected, the authentication mode comprising several different authentication mode can be exported and select interface, after user terminal detects the target authentication mode that user chooses from this several different authentication mode, the information to be certified that target authentication mode is corresponding can be gathered, and when contrasting information to be certified and being identical with the default authentication information of this control bundle of storage, the response events that this control is corresponding can be performed.Visible, implement the method described by Fig. 1, can the part control in whole application be locked, and without the need to locking whole application, thus the scope of secret protection can be controlled neatly.
Refer to Fig. 2, Fig. 2 is the disclosed another kind of schematic flow sheet based on the method for secret protection of control of the embodiment of the present invention.As shown in Figure 2, can should comprise the following steps based on the method for secret protection of control.
201, user terminal detects the operational order of the control that application programs comprises.
In the embodiment of the present invention, user terminal can detect control that user's application programs comprises (as photograph album apply the some private photo album linking button comprised, social application comprises shares button etc.) carry out rotating, the operation such as dragging time input operational order.
202, user terminal responds this operational order, authentication output way selection interface, and wherein, authentication mode selects interface to comprise several different authentication mode.
In the embodiment of the present invention, the several different authentication mode that authentication mode selects interface to comprise can comprise the combination of any one or several in cipher authentication mode, finger print identifying mode, voiceprint mode, palmprint authentication mode, face authentication mode and iris authentication mode, and the embodiment of the present invention is not construed as limiting.
203, user terminal detects the target authentication mode chosen from above-mentioned several different authentication mode, and gathers information to be certified corresponding to target authentication mode.
In the embodiment of the present invention, the quantity of the target authentication mode that the user that user terminal detects chooses from above-mentioned several different authentication mode can for multiple.For example, the target authentication mode that the user that user terminal detects chooses from above-mentioned several different authentication mode can comprise cipher authentication mode and finger print identifying mode, correspondingly, the information to be certified that the user terminal target authentication mode that can collect is corresponding can comprise password to be certified and fingerprint to be certified.Again for example, the target authentication mode that the user that user terminal detects chooses from above-mentioned several different authentication mode can comprise finger print identifying mode and iris authentication mode, correspondingly, the information to be certified that the user terminal target authentication mode that can collect is corresponding can comprise fingerprint to be certified and iris to be certified.
204, user terminal sends first to cloud platform and obtains request with reference to authentication information, and this first reference authentication information obtains request and comprises the identity information of this application program and the identification information of this control; And receive the first message that this first reference authentication information acquisition request of cloud platform response returns, this first message comprises first of this control bundle that this application program comprises with reference to authentication information.
In the embodiment of the present invention, when this application program is the application program needing to utilize user account to log in, the identity information of this application program can be used to the user account (as social account) logging in this application program usually.And the identification information of this control can be the title (as menu, sharing) of this control.First reference authentication information of this control bundle that this application program that this first message comprises comprises can be the combination of any one or several in password, fingerprint, vocal print and iris authentication mode.
205, user terminal sends second to the wearable device keeping communicating to connect and obtains request with reference to authentication information, and this second reference authentication information obtains request and comprises the identity information of this application program and the identification information of this control; And receive this wearable device and respond the second message that this second reference authentication information acquisition request returns, this second message comprises second of this control bundle that this application program comprises with reference to authentication information.
In the embodiment of the present invention, the second reference authentication information of this control bundle that this application program that this second message comprises comprises also can be the combination of any one or several in password, fingerprint, vocal print and iris authentication mode.
In the embodiment of the present invention, the execution sequence of above-mentioned steps 204 and step 205 can be exchanged, or step 204 and step 205 can executed in parallel, and the embodiment of the present invention is not construed as limiting.
206, user terminal judges that whether first of this control bundle is identical with reference to authentication information with second of this control bundle with reference to authentication information, if identical, performs step 207; Otherwise, if not identical, process ends.
207, user terminal stores first of this control bundle as the default authentication information of this control bundle with reference to authentication information with reference to second of authentication information or this control bundle.
In the embodiment of the present invention, by implementing above-mentioned step 204 ~ step 207, user without the need on the subscriber terminal in advance for this control arranges the default authentication information of binding, thus can reduce the EMS memory occupation to this user terminal, promotes Consumer's Experience.
208, whether user terminal to contrast information to be certified identical with the default authentication information of this control bundle of storage, if coupling, performs step 209; Otherwise, process ends.
209, user terminal performs response events corresponding to this control.
In the embodiment of the present invention, for example, suppose that this control is that the some private photo album linking button comprised applied by photograph album, so user terminal performs response events corresponding to this control can be that user terminal jumps to this private photo album.Again for example, suppose this control be social application comprise share button, so user terminal performs response events corresponding to this control can be that user terminal performs and shares operation.In the embodiment of the present invention, when this control is menu control, it can be the menu that user terminal exports this menu control and comprises that user terminal performs response events corresponding to this control.
Visible, implement the method described by Fig. 2, user terminal can lock the part control in whole application, and without the need to locking whole application, thus the scope of secret protection can be controlled neatly.
Refer to Fig. 3, Fig. 3 is the disclosed another kind of schematic flow sheet based on the method for secret protection of control of the embodiment of the present invention.As shown in Figure 3, can should comprise the following steps based on the method for secret protection of control.
Wherein, step 301 ~ step 303 is identical with the step 201 in preceding embodiment ~ step 203, and the embodiment of the present invention does not repeat herein.
304, user terminal sends first to cloud platform and obtains request with reference to authentication information, and this first reference authentication information obtains request and comprises the identity information of this application program and the identification information of this control; And receive the first message that this first reference authentication information acquisition request of cloud platform response returns, this first message comprises first of this control bundle that this application program comprises with reference to authentication information, and comprise the first wearable device mark that cloud platform specifies.
In the embodiment of the present invention, when this application program is the application program needing to utilize user account to log in, the identity information of this application program can be used to the user account logging in this application program usually.And the identification information of this control can be the title (as menu, sharing) of this control.First reference authentication information of this control bundle that this application program that this first message comprises comprises can be the combination of any one or several in password, fingerprint, vocal print and iris authentication mode.
In the embodiment of the present invention, the first wearable device mark that cloud platform is specified can be the subscriber identity information of the wearable device that cloud platform is specified.
305, user terminal sends second to the wearable device keeping communicating to connect and obtains request with reference to authentication information, and this second reference authentication information obtains request and comprises the identity information of this application program and the identification information of this control; And receive this wearable device and respond the second message that this second reference authentication information acquisition request returns, this second message comprises second of this control bundle that this application program comprises with reference to authentication information, and comprises the self identification of wearable device.
In the embodiment of the present invention, the second reference authentication information of this control bundle that this application program that this second message comprises comprises also can be the combination of any one or several in password, fingerprint, vocal print and iris authentication mode.
In the embodiment of the present invention, the self identification of wearable device also can be the subscriber identity information of wearable device.
In the embodiment of the present invention, the execution sequence of above-mentioned steps 304 and step 305 can be exchanged, or step 304 and step 305 can executed in parallel, and the embodiment of the present invention is not construed as limiting.
306, user terminal judges that whether first of this control bundle is identical with reference to authentication information with second of this control bundle with reference to authentication information, if identical, performs step 307; Otherwise, if not identical, process ends.
307, user terminal stores first of this control bundle as the default authentication information of this control bundle with reference to authentication information with reference to second of authentication information or this control bundle.
In the embodiment of the present invention, by implementing above-mentioned step 304 ~ step 307, user without the need on the subscriber terminal in advance for this control arranges the default authentication information of binding, thus can reduce the EMS memory occupation to this user terminal, promotes Consumer's Experience.
308, whether user terminal to contrast information to be certified identical with the default authentication information of this control bundle of storage, if coupling, performs step 309; Otherwise, process ends.
309, user terminal judges that whether the first wearable device mark that the cloud platform that the first message comprises is specified is consistent with the self identification of the wearable device of the second message, if unanimously, performs step 310; Otherwise, if judge that the first wearable device mark that cloud platform is specified is inconsistent with the self identification of this wearable device, perform step 311.
310, user terminal performs response events corresponding to this control, and process ends.
311, user terminal exports information, and process ends; Wherein, this information is illegal for the identity of wearable device.
In the embodiment of the present invention, user terminal can keep communication connection with multiple different wearable device, when user terminal judges that the first wearable device mark that cloud platform that the first message comprises specifies is inconsistent with the self identification of the wearable device of the second message, illustrate that the identity of the current wearable device that keep communication connection, that send the second message of user terminal is illegal, now, user terminal is without the need to performing response events corresponding to this control.Obviously, this mode can promote the security that user terminal performs response events corresponding to this control effectively.
Visible, implement the method described by Fig. 3, user terminal can lock the part control in whole application, and without the need to locking whole application, thus the scope of secret protection can be controlled neatly, safely.
Refer to Fig. 4, Fig. 4 is the structural representation of a kind of user terminal disclosed in the embodiment of the present invention.Wherein, the user terminal described by Fig. 4 can comprise all kinds of electronics with touch-screen such as PDA, MID, Intelligent worn device (as intelligent watch, Intelligent bracelet), and the embodiment of the present invention is not construed as limiting.As shown in Figure 4, this user terminal can comprise:
First detecting unit 401, for detecting the operational order of the control that application programs comprises;
Output unit 402, for responding the operational order that the first detecting unit 401 detects, authentication output way selection interface; Wherein, authentication mode selects interface can comprise several different authentication mode; Such as, several different authentication mode can comprise the combination of any one or several in cipher authentication mode, finger print identifying mode, voiceprint mode and iris authentication mode;
Second detecting unit 403, for detecting the target authentication mode chosen from the several different authentication mode of output unit 402 output;
Collecting unit 404, for gathering information to be certified corresponding to target authentication mode that the second detecting unit 403 detects;
Whether contrast unit 405 is identical with the default authentication information of the control bundle of storage for contrasting the information to be certified that collecting unit 404 collects;
Event execution unit 406, for when the comparing result of contrast unit 405 is identical, performs the response events that this control is corresponding.
In the embodiment of the present invention, the first detecting unit 401 can detect control that user's application programs comprises (as photograph album apply the some private photo album linking button comprised, social application comprises shares button etc.) carry out clicking, double-click, longly to press, the operation such as slip time input operational order.
In the embodiment of the present invention, the quantity of the target authentication mode that the user that the second detecting unit 403 detects chooses from above-mentioned several different authentication mode can for multiple.For example, the target authentication mode that the user that second detecting unit 403 detects chooses from above-mentioned several different authentication mode can comprise cipher authentication mode and finger print identifying mode, correspondingly, the information to be certified that the collecting unit 404 target authentication mode that can collect is corresponding can comprise password to be certified and fingerprint to be certified.Again for example, the target authentication mode that the user that second detecting unit 403 detects chooses from above-mentioned several different authentication mode can comprise finger print identifying mode and iris authentication mode, correspondingly, the information to be certified that the collecting unit 404 target authentication mode that can collect is corresponding can comprise fingerprint to be certified and iris to be certified.
In the embodiment of the present invention, for example, suppose that this control is that the some private photo album linking button comprised applied by photograph album, so event execution unit 406 performs response events corresponding to this control can be jump to this private photo album.Again for example, suppose this control be social application comprise share button, so event execution unit 406 performs response events corresponding to this control can be perform to share operation.In the embodiment of the present invention, when this control is menu control, it can be the menu that this menu control of output comprises that event execution unit 406 performs response events corresponding to this control.
Visible, implement the user terminal described by Fig. 4, can the part control in whole application be locked, and without the need to locking whole application, thus the scope of secret protection can be controlled neatly.
See also Fig. 5, Fig. 5 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention.Wherein, the user terminal shown in Fig. 5 is that user terminal is as shown in Figure 4 optimized and obtains.Compared with the user terminal shown in Fig. 4, the user terminal shown in Fig. 5 can also comprise:
Interactive unit 407, for gather information to be certified corresponding to target authentication mode at collecting unit 404 after, send first to cloud platform and obtain request with reference to authentication information, this first reference authentication information obtains request and comprises the identity information of this application program and the identification information of this control; And receive the first message that this first reference authentication information acquisition request of cloud platform response returns, this first message comprises first of this control bundle that this application program comprises with reference to authentication information;
And interactive unit 407, also obtains request for sending second to the wearable device keeping communicating to connect with reference to authentication information, and this second reference authentication information obtains request and comprises the identity information of this application program and the identification information of this control; And receive this wearable device and respond the second message that this second reference authentication information acquisition request returns, this second message comprises second of this control bundle that this application program comprises with reference to authentication information;
First judging unit 408, for judging that whether first of this control bundle is identical with reference to authentication information with second of this control bundle with reference to authentication information;
Storage unit 409, for when the judged result of the first judging unit 408 is identical, stores first of this control bundle as the default authentication information of this control bundle with reference to authentication information with reference to second of authentication information or this control bundle.
Correspondingly, whether contrasting unit 405, can to contrast the default authentication information of the control bundle that information to be certified that collecting unit 404 collects stores with storage unit 409 identical.
In the embodiment of the present invention, by implementing above-mentioned interactive unit 405, first judging unit 408 and storage unit 409, user without the need on the subscriber terminal in advance for this control arranges the default authentication information of binding, thus can reduce the EMS memory occupation to this user terminal, promotes Consumer's Experience.
In the embodiment of the present invention, the first above-mentioned message can comprise the first wearable device mark that cloud platform is specified, and the second message can comprise the self identification of wearable device.Correspondingly, see also Fig. 6, Fig. 6 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention.Wherein, the user terminal shown in Fig. 6 is that user terminal is as shown in Figure 5 optimized and obtains.Compared with the user terminal shown in Fig. 5, the user terminal shown in Fig. 6 can also comprise:
Second judging unit 410, for contrast unit 405 contrast information to be certified identical with the default authentication information of the control bundle of storage after; Judge that whether the first wearable device mark that cloud platform is specified is consistent with the self identification of the wearable device that the second message comprises;
Correspondingly, event execution unit 406 specifically for when the comparing result of contrast unit 405 is identical, and when the judged result of the second judging unit 410 is consistent, performs the response events that control is corresponding.
As the optional embodiment of one, when output unit 402 is also for judging that at the second judging unit 410 self identification of the wearable device that the first wearable device mark that cloud platform is specified comprises with the second message is inconsistent, export information, this information is illegal for the identity of the wearable device sending the second message.
Visible, implement the user terminal described by Fig. 6, can the part control in whole application be locked, and without the need to locking whole application, thus the scope of secret protection can be controlled neatly, safely.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is that the hardware that can carry out instruction relevant by program has come, this program can be stored in a computer-readable recording medium, storage medium comprises ROM (read-only memory) (Read-OnlyMemory, ROM), random access memory (RandomAccessMemory, RAM), programmable read only memory (ProgrammableRead-onlyMemory, PROM), Erasable Programmable Read Only Memory EPROM (ErasableProgrammableReadOnlyMemory, EPROM), disposable programmable ROM (read-only memory) (One-timeProgrammableRead-OnlyMemory, OTPROM), the electronics formula of erasing can make carbon copies ROM (read-only memory) (Electrically-ErasableProgrammableRead-OnlyMemory, EEPROM), read-only optical disc (CompactDiscRead-OnlyMemory, or other optical disc memorys CD-ROM), magnetic disk memory, tape memory, or can be used in any other medium computer-readable carrying or store data.
Above a kind of method for secret protection based on control disclosed in the embodiment of the present invention and user terminal are described in detail, apply specific case herein to set forth principle of the present invention and embodiment, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (10)

1. based on a method for secret protection for control, it is characterized in that, comprising:
Detect the operational order of the control that application programs comprises;
Respond described operational order, authentication output way selection interface; Described authentication mode selects interface to comprise several different authentication mode;
Detect the target authentication mode chosen from described several different authentication mode, and gather information to be certified corresponding to described target authentication mode;
Contrast described information to be certified whether identical with the default authentication information of the described control bundle of storage, if identical, perform the response events that described control is corresponding.
2. method for secret protection according to claim 1; it is characterized in that; after the information to be certified that described collection described target authentication mode is corresponding, and the described information to be certified of described contrast whether identical with the default authentication information of the described control bundle of storage before, described method also comprises:
Send first to cloud platform and obtain request with reference to authentication information, described first obtains request with reference to authentication information comprises the identity information of described application program and the identification information of described control;
Receive the first message that described in described cloud platform response, the first reference authentication information acquisition request returns, described first message comprises first of the described control bundle that described application program comprises with reference to authentication information;
Send second to keeping the wearable device of communication connection and obtain request with reference to authentication information, described second obtains request with reference to authentication information comprises the identity information of described application program and the identification information of described control;
Receive the second message that the described second reference authentication information acquisition request of described wearable device response returns, described second message comprises second of the described control bundle that described application program comprises with reference to authentication information;
Judge that whether first of described control bundle is identical with reference to authentication information with second of described control bundle with reference to authentication information, if identical, store first of described control bundle as the default authentication information of described control bundle with reference to authentication information with reference to second of authentication information or described control bundle.
3. method for secret protection according to claim 2; it is characterized in that; described first message comprises the first wearable device mark that described cloud platform is specified; described second message comprises the self identification of described wearable device; then after the described information to be certified of contrast is identical with the default authentication information of the described control bundle of storage; and before response events corresponding to the described control of described execution, described method also comprises:
Judge that whether the described first wearable device mark that described cloud platform is specified is consistent with the self identification of described wearable device, if unanimously, the step of the response events that the described control of the execution described in execution is corresponding.
4. method for secret protection according to claim 3, is characterized in that, described method also comprises:
If judge that the described first wearable device mark that described cloud platform is specified is inconsistent with the self identification of described wearable device, export information, the identity that described information is used for described wearable device is illegal.
5. the method for secret protection according to claim 1,2,3 or 4; it is characterized in that, described several different authentication mode comprises the combination of any one or several in cipher authentication mode, finger print identifying mode, voiceprint mode and iris authentication mode.
6. a user terminal, is characterized in that, comprising:
First detecting unit, for detecting the operational order of the control that application programs comprises;
Output unit, for responding described operational order, authentication output way selection interface; Described authentication mode selects interface to comprise several different authentication mode;
Second detecting unit, for detecting the target authentication mode chosen from described several different authentication mode;
Collecting unit, for gathering information to be certified corresponding to described target authentication mode;
Whether contrast unit is identical with the default authentication information of the described control bundle of storage for contrasting described information to be certified;
Event execution unit, for when the comparing result of described contrast unit is identical, performs the response events that described control is corresponding.
7. user terminal according to claim 6, is characterized in that, described user terminal also comprises:
Interactive unit, for gather information to be certified corresponding to described target authentication mode at described collecting unit after, send first to cloud platform and obtain request with reference to authentication information, described first obtains request with reference to authentication information comprises the identity information of described application program and the identification information of described control; Receive the first message that described in described cloud platform response, the first reference authentication information acquisition request returns, described first message comprises first of the described control bundle that described application program comprises with reference to authentication information;
And, described interactive unit, also for obtaining request to keeping the wearable device of communication connection to send second with reference to authentication information, described second obtains request with reference to authentication information comprises the identity information of described application program and the identification information of described control; And receive the second message that the described second reference authentication information acquisition request of described wearable device response returns, described second message comprises second of the described control bundle that described application program comprises with reference to authentication information;
First judging unit, for judging that whether first of described control bundle is identical with reference to authentication information with second of described control bundle with reference to authentication information;
Storage unit, for when the judged result of described first judging unit is identical, stores first of described control bundle as the default authentication information of described control bundle with reference to authentication information with reference to second of authentication information or described control bundle.
8. user terminal according to claim 7, is characterized in that, described first message comprises the first wearable device mark that described cloud platform is specified, and described second message comprises the self identification of described wearable device, and described user terminal also comprises:
Second judging unit, for after the described information to be certified of described contrast unit contrast is identical with the default authentication information of the described control bundle of storage; Judge that whether the described first wearable device mark that described cloud platform is specified is consistent with the self identification of described wearable device;
Described event execution unit, specifically for when the comparing result of described contrast unit is identical, and when the judged result of described second judging unit is consistent, performs the response events that described control is corresponding.
9. user terminal according to claim 8, is characterized in that:
Described output unit, time also for judging that at described second judging unit the described first wearable device mark that described cloud platform is specified is inconsistent with the self identification of described wearable device, export information, the identity that described information is used for described wearable device is illegal.
10. the user terminal according to claim 6,7,8 or 9, is characterized in that, described several different authentication mode comprises the combination of any one or several in cipher authentication mode, finger print identifying mode, voiceprint mode and iris authentication mode.
CN201510752161.0A 2015-11-04 2015-11-04 A kind of method for secret protection and user terminal based on control Active CN105447365B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510752161.0A CN105447365B (en) 2015-11-04 2015-11-04 A kind of method for secret protection and user terminal based on control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510752161.0A CN105447365B (en) 2015-11-04 2015-11-04 A kind of method for secret protection and user terminal based on control

Publications (2)

Publication Number Publication Date
CN105447365A true CN105447365A (en) 2016-03-30
CN105447365B CN105447365B (en) 2018-05-29

Family

ID=55557533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510752161.0A Active CN105447365B (en) 2015-11-04 2015-11-04 A kind of method for secret protection and user terminal based on control

Country Status (1)

Country Link
CN (1) CN105447365B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302451A (en) * 2016-08-15 2017-01-04 北京小米移动软件有限公司 The method and device of resource acquisition
CN108346061A (en) * 2018-02-12 2018-07-31 苏州朗动网络科技有限公司 Corporate authentication method, apparatus, computer equipment and storage medium
CN108540293A (en) * 2018-05-03 2018-09-14 山东浪潮通软信息科技有限公司 A kind of identity identifying method and device
CN109446773A (en) * 2018-09-29 2019-03-08 维沃移动通信有限公司 A kind of verification mode reminding method and terminal device
CN109857505A (en) * 2019-01-31 2019-06-07 Oppo广东移动通信有限公司 Execution method, apparatus, terminal and the storage medium of operation
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090320105A1 (en) * 2008-06-18 2009-12-24 International Business Machines Corporation Authentication of user interface elements in a web 2.0 environment
CN101977219A (en) * 2010-10-19 2011-02-16 中兴通讯股份有限公司 Method and device for protecting widget application
CN105022652A (en) * 2015-08-03 2015-11-04 武汉风奥软件技术有限公司 Website data encryption system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090320105A1 (en) * 2008-06-18 2009-12-24 International Business Machines Corporation Authentication of user interface elements in a web 2.0 environment
CN101977219A (en) * 2010-10-19 2011-02-16 中兴通讯股份有限公司 Method and device for protecting widget application
CN105022652A (en) * 2015-08-03 2015-11-04 武汉风奥软件技术有限公司 Website data encryption system and method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302451A (en) * 2016-08-15 2017-01-04 北京小米移动软件有限公司 The method and device of resource acquisition
CN108346061A (en) * 2018-02-12 2018-07-31 苏州朗动网络科技有限公司 Corporate authentication method, apparatus, computer equipment and storage medium
CN108540293A (en) * 2018-05-03 2018-09-14 山东浪潮通软信息科技有限公司 A kind of identity identifying method and device
CN108540293B (en) * 2018-05-03 2021-07-27 浪潮通用软件有限公司 Identity authentication method and device
CN109446773A (en) * 2018-09-29 2019-03-08 维沃移动通信有限公司 A kind of verification mode reminding method and terminal device
CN109857505A (en) * 2019-01-31 2019-06-07 Oppo广东移动通信有限公司 Execution method, apparatus, terminal and the storage medium of operation
WO2020156313A1 (en) * 2019-01-31 2020-08-06 Oppo广东移动通信有限公司 Operation execution method and device, terminal, and storage medium
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment

Also Published As

Publication number Publication date
CN105447365B (en) 2018-05-29

Similar Documents

Publication Publication Date Title
CN105447365A (en) Control based privacy protection method and user terminal
US8126506B2 (en) System and method for securely managing data stored on mobile devices, such as enterprise mobility data
EP2442601B1 (en) Method and system for automatically logging in client
CN105205374A (en) Application program encrypting method and user terminal
CN104951208B (en) A kind of control method and mobile terminal of application program
CN103701977B (en) Portable electronic equipment, communication system and information authentication method
EP2492819B1 (en) Method and apparatus for protecting information based on data card
WO2017008676A1 (en) Application authority configuration method and apparatus, and electronic device
CN105303086A (en) Application starting method and terminal
CN106096425A (en) System permission starting method, device and equipment
CN104217151A (en) Locking method for application of intelligent terminal and intelligent terminal
CN105045085A (en) Control method of smart watch and the smart watch
CN103745148A (en) Information protection method based on fingerprint recognition and mobile terminal
CN104243165A (en) Intelligent movable terminal privacy protection system and method based on intelligent bracelet
CN104375836A (en) Method and device for showing lock screen window
CN110399748A (en) A kind of screenshot method and device based on image recognition
CN104915599A (en) Application program monitoring method and terminal
CN102368230A (en) Mobile memory and access control method thereof as well as system
CN106096450A (en) A kind of application program freezing method and mobile terminal
CN105159475B (en) A kind of characters input method and device
CN106599115B (en) Data protection method, device and terminal
CN105577911A (en) Terminal management method and terminal
WO2018107727A1 (en) Method and device for information processing, and terminal
CN105262823A (en) Method, apparatus and system for controlling terminal
CN105404802A (en) Authority configuration method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.