CN105574437B - Method and device for protecting privacy information and electronic equipment - Google Patents

Method and device for protecting privacy information and electronic equipment Download PDF

Info

Publication number
CN105574437B
CN105574437B CN201511029363.9A CN201511029363A CN105574437B CN 105574437 B CN105574437 B CN 105574437B CN 201511029363 A CN201511029363 A CN 201511029363A CN 105574437 B CN105574437 B CN 105574437B
Authority
CN
China
Prior art keywords
user
application program
lock
application
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201511029363.9A
Other languages
Chinese (zh)
Other versions
CN105574437A (en
Inventor
潘琦
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201511029363.9A priority Critical patent/CN105574437B/en
Publication of CN105574437A publication Critical patent/CN105574437A/en
Priority to PCT/CN2016/113298 priority patent/WO2017114476A1/en
Application granted granted Critical
Publication of CN105574437B publication Critical patent/CN105574437B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)

Abstract

The embodiment of the invention discloses a method and a device for protecting privacy information and electronic equipment. The method comprises the following steps: when a system is locked or started for the first time, receiving a system screen locking password, and if the received system screen locking password is the same as any system screen locking password in a preset system screen locking password set, entering the system according to a user scene mapped by the received system screen locking password; if the user scene is a single-instance scene, receiving an application program lock password input by a user for accessing the application program; and if the input application program lock password is the same as any application program lock password in the preset application program lock password set, opening the access to the application program according to the user account mapped by the input application program lock password. By applying the method and the device, the safety of the private information can be improved.

Description

A kind of method, apparatus and electronic equipment for protecting privacy information
Technical field
The present invention relates to computer information safety technique more particularly to a kind of method, apparatus and electricity for protecting privacy information Sub- equipment.
Background technique
With computer communication and the continuous development of Internet technology, electronic equipment using more and more common, for example, Intelligent mobile phone, personal digital assistant, palm PC and desktop computer are more and more widely used, and with The continuous extension of applied business, the types of applications program (APP, Application) installed in the electronic device is also more and more, To meet user to the multifarious demand of business.Wherein, some application programs are privacy application program, for example, address list is answered With program, short message application program, Web bank's application program, social application program, chat application etc., for this kind of privacy Application program, user do not expect that other users browse to relevant privacy information.But since electronic equipment may be because of some Unavoidable cause, for example, relatives, friend are around user when using privacy application program;Alternatively, by relatives, friend It brings and at will leaies through;Alternatively, may be not intended to be obtained by other users after the loss, so as to cause the leakage of private information of user, So that the safety of user privacy information is lower.
In order to promote the safety of user privacy information, need to the privacy application program in electronic equipment and hidden with this The relevant privacy information of private application program takes safeguard measure appropriate, leaks to user's bring not to avoid privacy information Just.Currently, common mode is to protect accessed privacy application program using application locks.Whenever user needs to visit When asking privacy application program, system pops up interface for password input, accessible privacy of ability after needing user to correctly enter password Application program.Other mode is system password lock, and only after correct coded lock inputs, user, which can just enter, is System accesses program.
In addition a requirement source is needed in same user while two using the same application program are (or more It is a) scene of example.Such as a certain social software, the same user has multiple accounts, one be possibly used for it is more public Social life, and social life of another account for more secret.For these application scenarios, there are double examples/more Case technology.Wherein, double examples/more case technologies refer to that same application can be multiple at run time in operating system Example is run simultaneously, and is not clashed mutually between multiple examples.In this way, using double examples more case technologies, can permit One user uses different Account Logon same applications simultaneously, and an account for logging in the application program maps an example, So that user can select different Account Logon application programs under different scenes, corresponding different privacy uses example. For example, the general information (non-privacy information) that an example (account) pertains only to the application program is used interchangeably, and another example The information (privacy information) for being related to the application program more privacy uses.
But the method for protecting privacy, if user for privacy purpose open double examples more examples, but be not intended to it His user knows him/her while having multiple accounts, and double examples/more examples with program are being used using this simultaneously, due to once The more examples of double Shi Li are opened, the icon of two (more) a application programs will be will appear on the desktop of electronic equipment, used to allow Family starts different examples by different icon entrances, and other users is enabled to know that the user uses multiple accounts at the same time Family can not preferably protect user to wish more reconditely to use these to know that multiple accounts are used in the user The demand of privacy account.For example, the scene in relatives, friend around user, can not be shown in system double examples/ More examples are turned on, and example (such as desktop only one program icon entrance) only are presented to user, the example is corresponding It is logged in regular account;And for the scene that user stays alone, then by user, visible (for example desktop goes out two (multiple) examples simultaneously Existing two program icon entrances), allow user to use regular account and secret Account Logon simultaneously, to preferably protect its hidden Private.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method, apparatus and electronic equipment for protecting privacy information, promoted hidden The safety of personal letter breath.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, the embodiment of the present invention provides a kind of method for protecting privacy information, comprising:
In system screen locking or when starting for the first time, receive system screen-lock password, if the received system screen-lock password with Any system screen-lock password is identical in pre-set system screen locking code-set, maps according to the received system screen-lock password User's scene enter system;
If user's scene is single example scenario, the application program lock cipher of user's access application input is received;
If any in the application program lock cipher of the input and pre-set application locks code-set apply journey Sequence lock cipher is identical, and the visit to the application program is opened according to the user account that the application program lock cipher of the input maps It asks.
Optionally, after the reception system screen-lock password, if the received system screen-lock password with set in advance Before any system screen-lock password is identical in the system screen locking code-set set, this method can also include:
Judge whether system opens secret protection, if if so, execute the received system screen-lock password with The identical step of any system screen-lock password in pre-set system screen locking code-set;
If it is not, judging whether the received system screen-lock password logs in pre-set non-intimacy protection system Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection System.
Optionally, the unlatching privacy is arranged by the privacy settings interface of system or pre-set hiding Entry Interface Protection.
Optionally, the unlatching secret protection is arranged by pre-set hiding Entry Interface includes:
Pre-set character is inputted in pre-set third party application interface the unlatching privacy is arranged Protection.
Optionally, described to input pre-set character in pre-set third party application interface and include:
Setting dialing application program dials pre-set special number, alternatively, being arranged in calculator application The middle pre-set spcial character of input.
Optionally, if in the application program lock cipher of the input and pre-set application locks code-set Any application program lock cipher is identical, and the user account unlatching mapped according to the application program lock cipher of the input is answered described Include: with the access of program
If the application program lock cipher of the input is answered with single example in pre-set application locks code-set It is identical with program lock cipher, the access to the application program is opened according to the user account of single example scenario mapping, is hidden double Example/more examples content.
Optionally, if in the application program lock cipher of the input and pre-set application locks code-set Any application program lock cipher is identical, and the user account unlatching mapped according to the application program lock cipher of the input is answered described Include: with the access of program
If double examples in the application program lock cipher of the input and pre-set application locks code-set/more Case application programs lock cipher is identical, opens according to double examples/more example scenarios mapping user account to the application program Access, to user show people of unread information.
Optionally, the method also includes:
If user's scene is double example/more example scenarios, the request of user's access application is received;
It accesses the application program for the first time after user is in system lock screen unlocks, prompts user to input application locks close Code, and in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
Second aspect, the embodiment of the present invention provide a kind of device for protecting privacy information, comprising: user's scene enters mould Block, password acceptance module and single example login module, wherein
User's scene enters module, for receiving system screen-lock password in system screen locking or when starting for the first time, if received The system screen-lock password it is identical as any system screen-lock password in pre-set system screen locking code-set, according to received User's scene of the system screen-lock password mapping enters system;
Password acceptance module receives the application of user's access application input if user's scene is single example scenario Program lock cipher;
Single example login module, if the application program lock cipher of the input and pre-set application program lock cipher It concentrates any application program lock cipher identical, opens according to the user account that the application program lock cipher of the input maps to institute State the access of application program.
Optionally, it includes: system screen locking password acceptance unit, privacy unlatching judging unit that user's scene, which enters module, And user's scene enters unit, wherein
Password acceptance unit, for receiving system screen-lock password in system screen locking or when starting for the first time;
Privacy opens judging unit, for judging whether system opens secret protection, if so, user's scene is notified to enter Unit;
If it is not, judging whether the received system screen-lock password logs in pre-set non-intimacy protection system Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection System;
User's scene enters unit, if the received system screen-lock password and pre-set system screen locking code-set Middle any system screen-lock password is identical, enters system according to user's scene of the received system screen-lock password mapping.
Optionally, the unlatching privacy is arranged by the privacy settings interface of system or pre-set hiding Entry Interface Protection.
Optionally, the unlatching secret protection is arranged by pre-set hiding Entry Interface includes:
Pre-set character is inputted in pre-set third party application interface the unlatching privacy is arranged Protection.
Optionally, described to input pre-set character in pre-set third party application interface and include:
Setting dialing application program dials pre-set special number, alternatively, being arranged in calculator application The middle pre-set spcial character of input.
Optionally, single example login module includes: single case application programs lock cipher judging unit and single example Access unit, wherein
Single case application programs lock cipher judging unit, if the application program lock cipher of the input with it is pre-set Single case application programs lock cipher in application locks code-set is identical, notification sheet example access unit;
Single example access unit, the user account for mapping according to single example scenario open the visit to the application program It asks, hides the content of double example/more examples.
Optionally, single example login module further include: double case application programs lock cipher judging units and double realities Example access unit, wherein
Double case application programs lock cipher judging units, if the application program lock cipher of the input with it is pre-set Double examples/multiple case application programs lock cipher in application locks code-set is identical, notifies double example access units;
Double example access units, for opening according to double examples/more example scenarios mapping user account to the application The access of program shows people of unread information to user.
Optionally, described device further include:
Double example login modules receive user's access application if user's scene is double example/more example scenarios Request;
It accesses the application program for the first time after user is in system lock screen unlocks, prompts user to input application locks close Code, and in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, and the electronic equipment includes: shell, processor, deposits Reservoir, circuit board and power circuit, wherein circuit board is placed in the space interior that shell surrounds, processor and memory setting On circuit boards;Power circuit, for each circuit or the device power supply for above-mentioned electronic equipment;Memory is for storing and can hold Line program code;Processor is run and executable program code pair by reading the executable program code stored in memory The program answered, the method for executing aforementioned any protection privacy information.
It is provided in an embodiment of the present invention protection privacy information method, apparatus and electronic equipment, in conjunction with system screen-lock password, And/or application program lock cipher realizes that different user's scenes is presented in different entrances, user for privacy purpose without Wish that the fact that oneself use multiple accounts, multiple examples at the same time is seen or known to other users, it is defeated using different entrances Enter corresponding system screen-lock password, and/or, application program lock cipher can be in user's scene thus when user needs It is switched between different instances scene, the protection of data and the protection of privacy can be well realized, can protected well The privacy information of user, privacy information is highly-safe, can effectively meet the needs of user is to privacy information safety.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the method flow schematic diagram that the embodiment of the present invention protects privacy information;
Fig. 2 is the apparatus structure schematic diagram that the embodiment of the present invention protects privacy information;
Fig. 3 is the structural schematic diagram of electronic equipment one embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described in detail with reference to the accompanying drawing.
It will be appreciated that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its Its embodiment, shall fall within the protection scope of the present invention.
Fig. 1 is the method flow schematic diagram that the embodiment of the present invention protects privacy information.Referring to Fig. 1, this method comprises:
Step 11, in system screen locking or when starting for the first time, system screen-lock password is received, if the received system screen locking Password is identical as any system screen-lock password in pre-set system screen locking code-set, close according to the received system screen locking User's scene of code mapping enters system;
In this step, restart after user's shutdown, alternatively, being executed after user carries out system screen locking to electronic equipment When unlock, system screen locking password box is provided in system interface, user inputs corresponding system screen locking in system screen locking password box After password, triggering carries out system lock screen unlocks or enters the operating process of system.
In the embodiment of the present invention, other than pre-set system screen locking code-set, it is additionally provided with non-secret protection system System login password, system screen locking code-set correspond to user's scene, and non-intimacy protection system login password corresponds to non-secret protection field Scape, system screen locking code-set include two or more system screen-lock passwords, and each system screen-lock password maps a user Scene.That is, scene includes: user's scene and non-secret protection scene, wherein user's scene includes: single example field Scape and double examples/more example scenarios, system screen locking code-set include two systems screen-lock password, system screen-lock password mapping Single example scenario, another system screen-lock password map double example/more example scenarios, i.e. system screen locking code-set includes single example system Screen-lock password of uniting and double examples/more instance systems screen-lock password.In this way, being in the different scenes in user's scene in user When, current scene can be changed by way of system screen locking, for example, user is when other users are on the scene, it is hidden in order to be promoted The safety of personal letter breath, avoiding other users from knowing user tool, there are two accounts, can be by two accounts of current privacy mode Double examples at family/more example scenarios carry out system screen locking, then, then input corresponding single example scenario single instance system screen locking it is close Yard, single example scenario of system is entered after progress system lock screen unlocks, so as to effectively prevent other users to know the user There are two accounts for tool;And after other users are left, then by the way that single example scenario of current privacy mode is carried out system screen locking, Then, then the double examples/more instance systems screen-lock password for corresponding to double example/more example scenarios is inputted, carries out system lock screen unlocks Afterwards, the double examples/more example scenarios that can enter system are started not by the different icons entrance of the same application of displaying With example, thus by different accounts using same program, for example, into after double examples/more example scenarios of system, with micro- For letter, user can see two wechat icons simultaneously, while can star two wechat examples, to log in two wechats Account, and can independently be communicated respectively with the user in two wechat accounts.In this way, can be entered by system screen locking The system of secret protection, the system that user enters secret protection by different system screen-lock passwords, the system screen locking can be by Different system screen-lock passwords are unlocked.
In the embodiment of the present invention, user enters system by single instance system screen-lock password, by taking wechat as an example, only display one A wechat example, i.e., single example scenario;Enter system by double examples/more instance systems screen-lock password, while display two is micro- Reliable example, i.e., double example scenarios.
In the embodiment of the present invention, as an alternative embodiment, after entering double example/more example scenarios, can in desktop, Each privacy application program of examples double for unlatching, shows two icons of the privacy application program, and for not set Application program shows an application icon.
As an alternative embodiment, after the reception system screen-lock password, if the received system screen locking is close Before code is identical as any system screen-lock password in pre-set system screen locking code-set, this method can also include:
Judge whether system opens secret protection, if if so, execute the received system screen-lock password with The identical step of any system screen-lock password in pre-set system screen locking code-set;
If it is not, judging whether the received system screen-lock password logs in pre-set non-intimacy protection system Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection System.
In this step, user can be arranged whether open secret protection in the electronic device in advance, if user setting Secret protection is opened, just needs the user's scene with secret protection entered to judge user, and can be entered single real Example scene or double examples/more example scenarios;If the not set secret protection of user closes secret protection, according to existing skill Art process is handled, that is, judges whether the received system screen-lock password logs in pre-set non-intimacy protection system Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection System.For example, the corresponding association content of double examples/more example scenarios always may be used in the system of the non-secret protection of entrance With visible by any user, wherein association content is for providing user's entrance for entering double example/more example scenarios, comprising: Desktop icons, system notice, the historical record (Recent) for using application program recently etc..For another example when application program is locked It is unlocked again after firmly, alternatively, system solves screen locking after entering system screen locking again, desktop icons, use application at system notice recently Historical record of program etc. is associated with content can be visible by user.
In the embodiment of the present invention, as an alternative embodiment, whether setting opens secret protection can be by the hidden of system Private set interface is configured.For example, opening privacy protection mode into behind privacy settings interface, system first determines whether user It whether is provided with the system screen locking code-set of user's scene with secret protection, if not set, user is prompted to be configured, Single instance system screen-lock password is arranged in single example scenario, and it is close that double example/more instance systems screen lockings are arranged in double examples/more example scenarios Code.
As an alternative embodiment, system screen locking code-set is saved in SQLite database.
As another alternative embodiment, it is not intended to other users can be by looking into solve user for privacy purpose The privacy settings interface of inquiry system, so that the fact that oneself use multiple accounts, multiple examples at the same time is known, except through being The privacy settings interface of system can also be configured by pre-set hiding Entry Interface outside secret protection setting. For example, user can be indicated open by inputting pre-set character in pre-set third party application interface Open/close secret protection.Wherein, pre-set character is inputted in pre-set third party application interface, it can be with It is to dial pre-set special number by the way that dialing application program is arranged, alternatively, by calculator application Pre-set spcial character is inputted, if preset dialing application program was dialed pre-set before screen locking Pre-set spcial character was inputted in special number or calculator application, once specific combination is detected, then It can be mapped as the movement that above-mentioned privacy is opened or privacy is closed.
Step 12, if user's scene is single example scenario, the application locks of user's access application input are received Password;
In this step, in single example scenario, the corresponding application icon of each application program, each application program image Corresponding one or more application procedure lock (AppLocker) password is marked, each application locks (password) map the application program A certain usage scenario, such as single example usage scenario or double/more example usage scenarios.
In mobile electronic device, application locks (password) typically to protection user privacy and use one Technology refers in (operation) system, by special mode come so that user needs when accessing protected application program The application program just can be correctly accessed by inputting the modes such as special password, password.In the embodiment of the present invention, application is utilized Program lock cipher refers to if the application program opens double example/more examples and supports that user is by being arranged different application journeys Sequence lock cipher can enter the different usage scenarios of the application program.Under single example usage scenario, what user opened only should The access of one example of application program;Under double examples/more examples usage scenario, what user opened is the application program two The access authority of a/multiple example, at this point, system will allow user to access two of the program/multiple examples simultaneously.Such as table Can occur two of the application program/multiple icons on face, user is allowed to access simultaneously.
In the embodiment of the present invention, as an alternative embodiment, this method can also include:
If user's scene is double example/more example scenarios, the request of user's access application is received;
It accesses the application program for the first time after user is in system lock screen unlocks, prompts user to input application locks close Code, and in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
In this step, if user enters double example/more example scenarios, by taking wechat as an example, occur two wechats on desktop Icon, two wechat examples simultaneously can be seen in systems, and user clicks one of wechat icon, then enters the wechat figure Mark corresponding account;User clicks another wechat icon, then enters the corresponding account of another wechat icon.
Step 13, if the application program lock cipher of the input with it is any in pre-set application locks code-set Application program lock cipher is identical, opens according to the user account that the application program lock cipher of the input maps and applies journey to described The access of sequence.
In this step, any application program lock cipher in application locks code-set maps a reality of the application program Example, including single example and double examples/more examples.
As an alternative embodiment, if the application program lock cipher of the input and pre-set application locks are close Any application program lock cipher is identical in code collection, the user account unlatching pair mapped according to the application program lock cipher of the input The access of the application program includes:
If the application program lock cipher of the input is answered with single example in pre-set application locks code-set It is identical with program lock cipher, the access to the application program is opened according to the user account of single example scenario mapping, is hidden double Example/more examples content.
In this step, in secret protection scene (user's scene), if entering single example scenario, for example, for wechat, Single example of corresponding wechat account can seen in system, user can example interaction corresponding with the wechat account, double examples/ The content of more examples is hidden, for example, historical record entrance, desktop icons entrance, system by using application program recently Notice entrance is hidden by the sharing entrance of third party application, but double examples/more examples can still be run Or it is in operating status, double examples/received information of more examples is not demonstrated, for example, the incoming call for being related to privacy, letter are set It is set to and is not responding to (for example, not jingle bell, do not show, do not vibrate).And when user opens double example/more examples simultaneously by certain modes Into after double examples/more example scenarios, all example/more examples double before the time are received and the information that is not demonstrated can To be quickly presented in double example/more example scenarios, new example is reruned without user.
As another alternative embodiment, if the application program lock cipher of the input and pre-set application locks Any application program lock cipher is identical in code-set, opens according to the user account that the application program lock cipher of the input maps Access to the application program includes:
If double examples in the application program lock cipher of the input and pre-set application locks code-set/more Case application programs lock cipher is identical, opens according to double examples/more example scenarios mapping user account to the application program Access, to user show people of unread information.
In this step, if user enters double example/more example scenarios, the accessible double examples of user/more examples.Example Such as, accessible double examples a, wherein example maps the regular account of user in the application program, and another example maps this and answers With the privacy account of user in program, two accounts are mutually indepedent, are independent of each other, and can run simultaneously.In this way, table can be passed through Single case application programs icon that face is shown starts double example/more example scenarios, double in desktop presentation so as to effectively avoid Case application programs icon avoids other users from knowing that the user possesses more accounts, thus the privacy information of effective protection user, Promote the safety of privacy information.
In the embodiment of the present invention, the scene of secret protection, Mei Yiying are entered by setting application locks (AppLocker) It is protected with program by AppLocker, which can be opened by different passwords.
In the embodiment of the present invention, as another alternative embodiment, any time, once application program or system are by again It locks, for example, user, which presses power key, puts out screen, even if being in double example scenarios before, there are two wechat icon, weights for corresponding desktop When newly user being needed to unlock, a wechat icon is also only presented in system.Scene default in this way is exactly the scene to secret protection.
In the embodiment of the present invention, and/or, application program lock cipher realizes different entrances in conjunction with system screen-lock password Different user's scenes is presented, is not intended to other users to see or know that oneself is used at the same time for privacy purpose in user The fact that multiple accounts, multiple examples, using different entrance input corresponding system screen-lock password, and/or, application locks Password is merely able to unlock the access limitation of one of example when a certain entrance unlocks the lock;And another entrance can then solve The access limitation of two (more) a examples is opened, thus when user needs, it can be between the different instances scene in user's scene It switches over, the protection of data and the protection of privacy can be well realized, the privacy information of user can be protected well, it is hidden Personal letter breath is highly-safe, can effectively meet the needs of user is to privacy information safety.Further, the embodiment of the present invention Method extends to the deeper secret protection demand of user in bis- (more) example usage scenarios, so that system screen locking is close Code, and/or, application program lock cipher be equivalent to from unlocked merely originally for application content access limitation, extend to And sightless limitation visible for bis- (more) multiple example contents of example can also be unlocked, that is, is increased for the application program Whether the secret protection of multiple examples while operation is had.
Fig. 2 is the apparatus structure schematic diagram that the embodiment of the present invention protects privacy information.Referring to fig. 2, which includes: user Scene enters module 21, password acceptance module 22 and single example login module 23, wherein
User's scene enters module 21, for system screen-lock password being received, if connect in system screen locking or when starting for the first time The system screen-lock password received is identical as any system screen-lock password in pre-set system screen locking code-set, according to reception The system screen-lock password mapping user's scene enter system;
In the embodiment of the present invention, scene includes: user's scene and non-secret protection scene, wherein user's scene includes: Single example scenario and double examples/more example scenarios, system screen locking code-set include two systems screen-lock password, a system screen locking Password maps single example scenario, and another system screen-lock password maps double example/more example scenarios, i.e. system screen locking code-set includes Single instance system screen-lock password and double examples/more instance systems screen-lock password.
As an alternative embodiment, it includes: system screen locking password acceptance unit, privacy unlatching that user's scene, which enters module 21, Judging unit and user's scene enter unit (not shown), wherein
Password acceptance unit, for receiving system screen-lock password in system screen locking or when starting for the first time;
Privacy opens judging unit, for judging whether system opens secret protection, if so, user's scene is notified to enter Unit;
If it is not, judging whether the received system screen-lock password logs in pre-set non-intimacy protection system Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection System;
User's scene enters unit, if the received system screen-lock password and pre-set system screen locking code-set Middle any system screen-lock password is identical, enters system according to user's scene of the received system screen-lock password mapping.
In the embodiment of the present invention, as an alternative embodiment, by the privacy settings interface of system or it can preset Hiding Entry Interface the unlatching secret protection is set.
In the embodiment of the present invention, as an alternative embodiment, by being opened described in pre-set hiding Entry Interface setting Opening secret protection includes:
Pre-set character is inputted in pre-set third party application interface the unlatching privacy is arranged Protection.
It is described in pre-set third party application interface as an alternative embodiment in the embodiment of the present invention Inputting pre-set character includes:
Setting dialing application program dials pre-set special number, alternatively, being arranged in calculator application The middle pre-set spcial character of input.
Password acceptance module 22 receives answering for user's access application input if user's scene is single example scenario With program lock cipher;
In the embodiment of the present invention, in single example scenario, the corresponding application icon of each application program, each application Program icon corresponds to one or more application program lock cipher, and each application program lock cipher maps an example of the application program Scene.
Single example login module 23, if the application program lock cipher of the input and pre-set application locks are close Any application program lock cipher is identical in code collection, the user account unlatching pair mapped according to the application program lock cipher of the input The access of the application program.
In the embodiment of the present invention, as an alternative embodiment, single example login module 23 includes: single case application programs lock Password judging unit and single example access unit (not shown), wherein
Single case application programs lock cipher judging unit, if the application program lock cipher of the input with it is pre-set Single case application programs lock cipher in application locks code-set is identical, notification sheet example access unit;
Single example access unit, the user account for mapping according to single example scenario open the visit to the application program It asks, hides the content of double example/more examples.
As another alternative embodiment, single example login module 23 further include: double case application programs lock cipher judgements are single First and double example access units, wherein
Double case application programs lock cipher judging units, if the application program lock cipher of the input with it is pre-set Double examples/multiple case application programs lock cipher in application locks code-set is identical, notifies double example access units;
Double example access units, for opening according to double examples/more example scenarios mapping user account to the application The access of program shows people of unread information to user.
As an alternative embodiment, the device further include:
Double example login modules 24 receive user's access application if user's scene is double example/more example scenarios Request;
It accesses the application program for the first time after user is in system lock screen unlocks, prompts user to input application locks close Code, and in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
The embodiment of the present invention also provides a kind of electronic equipment, and the electronic equipment includes dress described in aforementioned any embodiment It sets.
Fig. 3 is the structural schematic diagram of electronic equipment one embodiment of the present invention, may be implemented to implement shown in Fig. 1-2 of the present invention The process of example, as shown in figure 3, above-mentioned electronic equipment may include: shell 31, processor 32, memory 33, circuit board 34 and electricity Source circuit 35, wherein circuit board 34 is placed in the space interior that shell 31 surrounds, and processor 32 and memory 33 are arranged in circuit On plate 34;Power circuit 35, for each circuit or the device power supply for above-mentioned electronic equipment;Memory 33 is for storing and can hold Line program code;Processor 32 is run and executable program generation by reading the executable program code stored in memory 33 The corresponding program of code, for executing the method for protecting privacy information described in aforementioned any embodiment.
Processor 32 to the specific implementation procedures of above-mentioned steps and processor 32 by operation executable program code come The step of further executing may refer to the description of Fig. 1-2 illustrated embodiment of the present invention, and details are not described herein.
The electronic equipment exists in a variety of forms, including but not limited to:
(1) mobile communication equipment: the characteristics of this kind of equipment is that have mobile communication function, and to provide speech, data Communication is main target.This Terminal Type includes: smart phone (such as iPhone), multimedia handset, functional mobile phone and low Hold mobile phone etc..
(2) super mobile personal computer equipment: this kind of equipment belongs to the scope of personal computer, there is calculating and processing function Can, generally also have mobile Internet access characteristic.This Terminal Type includes: PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device: this kind of equipment can show and play multimedia content.Such equipment include: audio, Video player (such as iPod), handheld device, e-book and intelligent toy and portable car-mounted navigation equipment.
(4) server: providing the equipment of the service of calculating, and the composition of server includes that processor, hard disk, memory, system are total Line etc., server is similar with general computer architecture, but due to needing to provide highly reliable service, in processing energy Power, stability, reliability, safety, scalability, manageability etc. are more demanding.
(5) other electronic equipments with data interaction function.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (RandomAccess Memory, RAM) etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by those familiar with the art, all answers It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (13)

1. a kind of method for protecting privacy information, which is characterized in that this method comprises:
In system screen locking or when starting for the first time, system screen-lock password is received, if the received system screen-lock password and in advance Any system screen-lock password is identical in the system screen locking code-set of setting, according to the use of the received system screen-lock password mapping Family scene enters system;
If user's scene is single example scenario, the application program lock cipher of user's access application input is received;
If any application locks in the application program lock cipher of the input and pre-set application locks code-set Password is identical, and the access to the application program is opened according to the user account that the application program lock cipher of the input maps;
After the reception system screen-lock password, if the received system screen-lock password and pre-set system screen locking Before any system screen-lock password is identical in code-set, this method further include:
Judge whether system opens secret protection, if if so, executing the received system screen-lock password and in advance The identical step of any system screen-lock password in the system screen locking code-set of setting;
If it is not, judge the received system screen-lock password whether with pre-set non-intimacy protection system login password It is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to be into non-secret protection System;
If any in the application program lock cipher of the input and pre-set application locks code-set apply journey Sequence lock cipher is identical, and the visit to the application program is opened according to the user account that the application program lock cipher of the input maps It asks and includes:
If single exemplary application journey in the application program lock cipher of the input and pre-set application locks code-set Sequence lock cipher is identical, the access according to the user account unlatching of single example scenario mapping to the application program, and hiding double examples/ The content of more examples;
After the content for hiding double examples or more examples, double examples/more examples can still run or in operation State.
2. the method according to claim 1, wherein passing through the privacy settings interface or pre-set hidden of system It hides Entry Interface and the unlatching secret protection is set.
3. according to the method described in claim 2, it is characterized in that, by being opened described in pre-set hiding Entry Interface setting Opening secret protection includes:
Pre-set character is inputted in pre-set third party application interface the unlatching secret protection is arranged.
4. according to the method described in claim 3, it is characterized in that, described in pre-set third party application interface Inputting pre-set character includes:
Setting dialing application program dials pre-set special number, alternatively, setting is defeated in calculator application Enter pre-set spcial character.
5. method according to any one of claims 1 to 4, which is characterized in that if the application program of the input Lock cipher is identical as any application program lock cipher in pre-set application locks code-set, according to the application of the input The user account of program lock cipher mapping is opened includes: to the access of the application program
If double examples/more examples in the application program lock cipher of the input and pre-set application locks code-set Application program lock cipher is identical, opens the visit to the application program according to double examples/more example scenarios mapping user account It asks, shows people of unread information to user.
6. method according to any one of claims 1 to 4, which is characterized in that the method also includes:
If user's scene is double example/more example scenarios, the request of user's access application is received;
It accesses the application program for the first time after user is in system lock screen unlocks, user is prompted to input application program lock cipher, And in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
7. a kind of device for protecting privacy information, which is characterized in that the device includes: that user's scene enters module, password acceptance Module and single example login module, wherein
User's scene enters module, for system screen-lock password being received, if received institute in system screen locking or when starting for the first time It is identical as any system screen-lock password in pre-set system screen locking code-set to state system screen-lock password, according to received described User's scene of system screen-lock password mapping enters system;
Password acceptance module receives the application program of user's access application input if user's scene is single example scenario Lock cipher;
Single example login module, if in the application program lock cipher of the input and pre-set application locks code-set Any application program lock cipher is identical, and the user account unlatching mapped according to the application program lock cipher of the input is answered described With the access of program;
It includes: system screen locking password acceptance unit, privacy unlatching judging unit and user that user's scene, which enters module, Scape enters unit, wherein
System screen locking password acceptance unit, for receiving system screen-lock password in system screen locking or when starting for the first time;
Privacy opens judging unit, for judging whether system opens secret protection, if so, user's scene is notified to enter list Member;
If it is not, judge the received system screen-lock password whether with pre-set non-intimacy protection system login password It is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to be into non-secret protection System;
User's scene enters unit, if appointed in the received system screen-lock password and pre-set system screen locking code-set One system screen-lock password is identical, enters system according to user's scene of the received system screen-lock password mapping;
The list example login module includes: single case application programs lock cipher judging unit and single example access unit, In,
Single case application programs lock cipher judging unit, if the application program lock cipher of the input and pre-set application Single case application programs lock cipher in procedure lock code-set is identical, notification sheet example access unit;
Single example access unit, the user account for mapping according to single example scenario open the access to the application program, Hide the content of double example/more examples;
After the content for hiding double examples or more examples, double examples/more examples can still run or in operation State.
8. device according to claim 7, which is characterized in that by the privacy settings interface of system or pre-set hidden It hides Entry Interface and the unlatching secret protection is set.
9. device according to claim 8, which is characterized in that by being opened described in pre-set hiding Entry Interface setting Opening secret protection includes:
Pre-set character is inputted in pre-set third party application interface the unlatching secret protection is arranged.
10. device according to claim 9, which is characterized in that described at pre-set third party application interface The pre-set character of middle input includes:
Setting dialing application program dials pre-set special number, alternatively, setting is defeated in calculator application Enter pre-set spcial character.
11. device according to claim 7, which is characterized in that the list example login module further include: double exemplary applications Program lock cipher judging unit and double example access units, wherein
Double case application programs lock cipher judging units, if the application program lock cipher of the input and pre-set application Double examples/multiple case application programs lock cipher in procedure lock code-set is identical, notifies double example access units;
Double example access units, for opening according to double examples/more example scenarios mapping user account to the application program Access, to user show people of unread information.
12. according to the described in any item devices of claim 7 to 11, which is characterized in that described device further include:
Double example login modules receive asking for user's access application if user's scene is double example/more example scenarios It asks;
It accesses the application program for the first time after user is in system lock screen unlocks, user is prompted to input application program lock cipher, And in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
13. a kind of electronic equipment, which is characterized in that the electronic equipment includes: shell, processor, memory, circuit board and electricity Source circuit, wherein circuit board is placed in the space interior that shell surrounds, and processor and memory setting are on circuit boards;Power supply Circuit, for each circuit or the device power supply for above-mentioned electronic equipment;Memory is for storing executable program code;Processing Device runs program corresponding with executable program code by reading the executable program code stored in memory, for holding The method of privacy information is protected described in the aforementioned any claim 1-6 of row.
CN201511029363.9A 2015-12-31 2015-12-31 Method and device for protecting privacy information and electronic equipment Expired - Fee Related CN105574437B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201511029363.9A CN105574437B (en) 2015-12-31 2015-12-31 Method and device for protecting privacy information and electronic equipment
PCT/CN2016/113298 WO2017114476A1 (en) 2015-12-31 2016-12-29 Method and device for protecting privacy information and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511029363.9A CN105574437B (en) 2015-12-31 2015-12-31 Method and device for protecting privacy information and electronic equipment

Publications (2)

Publication Number Publication Date
CN105574437A CN105574437A (en) 2016-05-11
CN105574437B true CN105574437B (en) 2019-03-19

Family

ID=55884551

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511029363.9A Expired - Fee Related CN105574437B (en) 2015-12-31 2015-12-31 Method and device for protecting privacy information and electronic equipment

Country Status (2)

Country Link
CN (1) CN105574437B (en)
WO (1) WO2017114476A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701414B (en) * 2015-12-31 2018-09-21 北京金山安全软件有限公司 Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment
CN105574437B (en) * 2015-12-31 2019-03-19 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment
WO2017201692A1 (en) * 2016-05-25 2017-11-30 北京小米移动软件有限公司 Application encryption method and device
CN106372530A (en) * 2016-08-29 2017-02-01 广东欧珀移动通信有限公司 Method for viewing privacy data and device
CN106874045A (en) * 2017-01-20 2017-06-20 北京奇虎科技有限公司 A kind of startup method of application program, device and mobile terminal
CN107133507A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy services system access method, device and mobile terminal
CN109219003B (en) * 2018-08-22 2022-02-22 Oppo广东移动通信有限公司 Information encryption method and device, storage medium and electronic equipment
CN109583227B (en) * 2018-10-30 2020-08-07 中国科学院信息工程研究所 Privacy information protection method, device and system
CN109725950B (en) * 2018-12-29 2022-02-22 武汉斗鱼网络科技有限公司 Method, device and storage medium for realizing single-instance operation of client
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761078A (en) * 2013-11-02 2014-04-30 希姆通信息技术(上海)有限公司 Unlocking method and system for intelligent terminal
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140013548A (en) * 2012-07-25 2014-02-05 삼성전자주식회사 User terminal apparatus and control method thereof
CN104182662B (en) * 2014-08-22 2017-10-17 广东欧珀移动通信有限公司 Hiding and deployment method, system and the mobile terminal of hide application program
CN105574437B (en) * 2015-12-31 2019-03-19 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761078A (en) * 2013-11-02 2014-04-30 希姆通信息技术(上海)有限公司 Unlocking method and system for intelligent terminal
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords

Also Published As

Publication number Publication date
WO2017114476A1 (en) 2017-07-06
CN105574437A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN105574437B (en) Method and device for protecting privacy information and electronic equipment
CN105701414B (en) Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment
US9967245B2 (en) User authentication using unique hidden identifiers
US9131377B2 (en) Method and apparatus for unlocking operating system
CA2969493C (en) System and method for enabling secure authentication
CN104008313A (en) Protecting method and device of privacy information
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN102685106A (en) Safety verification method and equipment
CN101282535A (en) Method and apparatus for protecting mobile terminal private information
US9697346B2 (en) Method and apparatus for identifying and associating devices using visual recognition
CN108337210A (en) Equipment configuration method and device, system
US10666793B1 (en) Secure call center communications
CN101808094A (en) Identity authentication system and method
CN104753677A (en) Password hierarchical control method and system
US20110085474A1 (en) Terminal device, signature generation server, simple id management system, simple id management method, and program
US9398450B2 (en) Mobile survey tools with added security
Young et al. BadVoice: Soundless voice-control replay attack on modern smartphones
CN103384254A (en) Application account login method, server, client and system
CN103036852A (en) Method and device for achieving network login
CN109617703B (en) Key management method and device, electronic equipment and storage medium
CN105335631A (en) Method and device for configuring login information, and mobile terminal
US20150088521A1 (en) Speech server, speech method, recording medium, speech system, speech terminal, and mobile terminal
CN106341379A (en) Information processing method, device and system
CN103678969A (en) Lock releasing method of electronic device, and apparatus thereof
CN106127006A (en) The user management method of a kind of mobile terminal and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190319