CN105574437B - Method and device for protecting privacy information and electronic equipment - Google Patents
Method and device for protecting privacy information and electronic equipment Download PDFInfo
- Publication number
- CN105574437B CN105574437B CN201511029363.9A CN201511029363A CN105574437B CN 105574437 B CN105574437 B CN 105574437B CN 201511029363 A CN201511029363 A CN 201511029363A CN 105574437 B CN105574437 B CN 105574437B
- Authority
- CN
- China
- Prior art keywords
- user
- application program
- lock
- application
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000013507 mapping Methods 0.000 claims description 22
- 230000005611 electricity Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
Abstract
The embodiment of the invention discloses a method and a device for protecting privacy information and electronic equipment. The method comprises the following steps: when a system is locked or started for the first time, receiving a system screen locking password, and if the received system screen locking password is the same as any system screen locking password in a preset system screen locking password set, entering the system according to a user scene mapped by the received system screen locking password; if the user scene is a single-instance scene, receiving an application program lock password input by a user for accessing the application program; and if the input application program lock password is the same as any application program lock password in the preset application program lock password set, opening the access to the application program according to the user account mapped by the input application program lock password. By applying the method and the device, the safety of the private information can be improved.
Description
Technical field
The present invention relates to computer information safety technique more particularly to a kind of method, apparatus and electricity for protecting privacy information
Sub- equipment.
Background technique
With computer communication and the continuous development of Internet technology, electronic equipment using more and more common, for example,
Intelligent mobile phone, personal digital assistant, palm PC and desktop computer are more and more widely used, and with
The continuous extension of applied business, the types of applications program (APP, Application) installed in the electronic device is also more and more,
To meet user to the multifarious demand of business.Wherein, some application programs are privacy application program, for example, address list is answered
With program, short message application program, Web bank's application program, social application program, chat application etc., for this kind of privacy
Application program, user do not expect that other users browse to relevant privacy information.But since electronic equipment may be because of some
Unavoidable cause, for example, relatives, friend are around user when using privacy application program;Alternatively, by relatives, friend
It brings and at will leaies through;Alternatively, may be not intended to be obtained by other users after the loss, so as to cause the leakage of private information of user,
So that the safety of user privacy information is lower.
In order to promote the safety of user privacy information, need to the privacy application program in electronic equipment and hidden with this
The relevant privacy information of private application program takes safeguard measure appropriate, leaks to user's bring not to avoid privacy information
Just.Currently, common mode is to protect accessed privacy application program using application locks.Whenever user needs to visit
When asking privacy application program, system pops up interface for password input, accessible privacy of ability after needing user to correctly enter password
Application program.Other mode is system password lock, and only after correct coded lock inputs, user, which can just enter, is
System accesses program.
In addition a requirement source is needed in same user while two using the same application program are (or more
It is a) scene of example.Such as a certain social software, the same user has multiple accounts, one be possibly used for it is more public
Social life, and social life of another account for more secret.For these application scenarios, there are double examples/more
Case technology.Wherein, double examples/more case technologies refer to that same application can be multiple at run time in operating system
Example is run simultaneously, and is not clashed mutually between multiple examples.In this way, using double examples more case technologies, can permit
One user uses different Account Logon same applications simultaneously, and an account for logging in the application program maps an example,
So that user can select different Account Logon application programs under different scenes, corresponding different privacy uses example.
For example, the general information (non-privacy information) that an example (account) pertains only to the application program is used interchangeably, and another example
The information (privacy information) for being related to the application program more privacy uses.
But the method for protecting privacy, if user for privacy purpose open double examples more examples, but be not intended to it
His user knows him/her while having multiple accounts, and double examples/more examples with program are being used using this simultaneously, due to once
The more examples of double Shi Li are opened, the icon of two (more) a application programs will be will appear on the desktop of electronic equipment, used to allow
Family starts different examples by different icon entrances, and other users is enabled to know that the user uses multiple accounts at the same time
Family can not preferably protect user to wish more reconditely to use these to know that multiple accounts are used in the user
The demand of privacy account.For example, the scene in relatives, friend around user, can not be shown in system double examples/
More examples are turned on, and example (such as desktop only one program icon entrance) only are presented to user, the example is corresponding
It is logged in regular account;And for the scene that user stays alone, then by user, visible (for example desktop goes out two (multiple) examples simultaneously
Existing two program icon entrances), allow user to use regular account and secret Account Logon simultaneously, to preferably protect its hidden
Private.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method, apparatus and electronic equipment for protecting privacy information, promoted hidden
The safety of personal letter breath.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, the embodiment of the present invention provides a kind of method for protecting privacy information, comprising:
In system screen locking or when starting for the first time, receive system screen-lock password, if the received system screen-lock password with
Any system screen-lock password is identical in pre-set system screen locking code-set, maps according to the received system screen-lock password
User's scene enter system;
If user's scene is single example scenario, the application program lock cipher of user's access application input is received;
If any in the application program lock cipher of the input and pre-set application locks code-set apply journey
Sequence lock cipher is identical, and the visit to the application program is opened according to the user account that the application program lock cipher of the input maps
It asks.
Optionally, after the reception system screen-lock password, if the received system screen-lock password with set in advance
Before any system screen-lock password is identical in the system screen locking code-set set, this method can also include:
Judge whether system opens secret protection, if if so, execute the received system screen-lock password with
The identical step of any system screen-lock password in pre-set system screen locking code-set;
If it is not, judging whether the received system screen-lock password logs in pre-set non-intimacy protection system
Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection
System.
Optionally, the unlatching privacy is arranged by the privacy settings interface of system or pre-set hiding Entry Interface
Protection.
Optionally, the unlatching secret protection is arranged by pre-set hiding Entry Interface includes:
Pre-set character is inputted in pre-set third party application interface the unlatching privacy is arranged
Protection.
Optionally, described to input pre-set character in pre-set third party application interface and include:
Setting dialing application program dials pre-set special number, alternatively, being arranged in calculator application
The middle pre-set spcial character of input.
Optionally, if in the application program lock cipher of the input and pre-set application locks code-set
Any application program lock cipher is identical, and the user account unlatching mapped according to the application program lock cipher of the input is answered described
Include: with the access of program
If the application program lock cipher of the input is answered with single example in pre-set application locks code-set
It is identical with program lock cipher, the access to the application program is opened according to the user account of single example scenario mapping, is hidden double
Example/more examples content.
Optionally, if in the application program lock cipher of the input and pre-set application locks code-set
Any application program lock cipher is identical, and the user account unlatching mapped according to the application program lock cipher of the input is answered described
Include: with the access of program
If double examples in the application program lock cipher of the input and pre-set application locks code-set/more
Case application programs lock cipher is identical, opens according to double examples/more example scenarios mapping user account to the application program
Access, to user show people of unread information.
Optionally, the method also includes:
If user's scene is double example/more example scenarios, the request of user's access application is received;
It accesses the application program for the first time after user is in system lock screen unlocks, prompts user to input application locks close
Code, and in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
Second aspect, the embodiment of the present invention provide a kind of device for protecting privacy information, comprising: user's scene enters mould
Block, password acceptance module and single example login module, wherein
User's scene enters module, for receiving system screen-lock password in system screen locking or when starting for the first time, if received
The system screen-lock password it is identical as any system screen-lock password in pre-set system screen locking code-set, according to received
User's scene of the system screen-lock password mapping enters system;
Password acceptance module receives the application of user's access application input if user's scene is single example scenario
Program lock cipher;
Single example login module, if the application program lock cipher of the input and pre-set application program lock cipher
It concentrates any application program lock cipher identical, opens according to the user account that the application program lock cipher of the input maps to institute
State the access of application program.
Optionally, it includes: system screen locking password acceptance unit, privacy unlatching judging unit that user's scene, which enters module,
And user's scene enters unit, wherein
Password acceptance unit, for receiving system screen-lock password in system screen locking or when starting for the first time;
Privacy opens judging unit, for judging whether system opens secret protection, if so, user's scene is notified to enter
Unit;
If it is not, judging whether the received system screen-lock password logs in pre-set non-intimacy protection system
Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection
System;
User's scene enters unit, if the received system screen-lock password and pre-set system screen locking code-set
Middle any system screen-lock password is identical, enters system according to user's scene of the received system screen-lock password mapping.
Optionally, the unlatching privacy is arranged by the privacy settings interface of system or pre-set hiding Entry Interface
Protection.
Optionally, the unlatching secret protection is arranged by pre-set hiding Entry Interface includes:
Pre-set character is inputted in pre-set third party application interface the unlatching privacy is arranged
Protection.
Optionally, described to input pre-set character in pre-set third party application interface and include:
Setting dialing application program dials pre-set special number, alternatively, being arranged in calculator application
The middle pre-set spcial character of input.
Optionally, single example login module includes: single case application programs lock cipher judging unit and single example
Access unit, wherein
Single case application programs lock cipher judging unit, if the application program lock cipher of the input with it is pre-set
Single case application programs lock cipher in application locks code-set is identical, notification sheet example access unit;
Single example access unit, the user account for mapping according to single example scenario open the visit to the application program
It asks, hides the content of double example/more examples.
Optionally, single example login module further include: double case application programs lock cipher judging units and double realities
Example access unit, wherein
Double case application programs lock cipher judging units, if the application program lock cipher of the input with it is pre-set
Double examples/multiple case application programs lock cipher in application locks code-set is identical, notifies double example access units;
Double example access units, for opening according to double examples/more example scenarios mapping user account to the application
The access of program shows people of unread information to user.
Optionally, described device further include:
Double example login modules receive user's access application if user's scene is double example/more example scenarios
Request;
It accesses the application program for the first time after user is in system lock screen unlocks, prompts user to input application locks close
Code, and in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, and the electronic equipment includes: shell, processor, deposits
Reservoir, circuit board and power circuit, wherein circuit board is placed in the space interior that shell surrounds, processor and memory setting
On circuit boards;Power circuit, for each circuit or the device power supply for above-mentioned electronic equipment;Memory is for storing and can hold
Line program code;Processor is run and executable program code pair by reading the executable program code stored in memory
The program answered, the method for executing aforementioned any protection privacy information.
It is provided in an embodiment of the present invention protection privacy information method, apparatus and electronic equipment, in conjunction with system screen-lock password,
And/or application program lock cipher realizes that different user's scenes is presented in different entrances, user for privacy purpose without
Wish that the fact that oneself use multiple accounts, multiple examples at the same time is seen or known to other users, it is defeated using different entrances
Enter corresponding system screen-lock password, and/or, application program lock cipher can be in user's scene thus when user needs
It is switched between different instances scene, the protection of data and the protection of privacy can be well realized, can protected well
The privacy information of user, privacy information is highly-safe, can effectively meet the needs of user is to privacy information safety.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the method flow schematic diagram that the embodiment of the present invention protects privacy information;
Fig. 2 is the apparatus structure schematic diagram that the embodiment of the present invention protects privacy information;
Fig. 3 is the structural schematic diagram of electronic equipment one embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described in detail with reference to the accompanying drawing.
It will be appreciated that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its
Its embodiment, shall fall within the protection scope of the present invention.
Fig. 1 is the method flow schematic diagram that the embodiment of the present invention protects privacy information.Referring to Fig. 1, this method comprises:
Step 11, in system screen locking or when starting for the first time, system screen-lock password is received, if the received system screen locking
Password is identical as any system screen-lock password in pre-set system screen locking code-set, close according to the received system screen locking
User's scene of code mapping enters system;
In this step, restart after user's shutdown, alternatively, being executed after user carries out system screen locking to electronic equipment
When unlock, system screen locking password box is provided in system interface, user inputs corresponding system screen locking in system screen locking password box
After password, triggering carries out system lock screen unlocks or enters the operating process of system.
In the embodiment of the present invention, other than pre-set system screen locking code-set, it is additionally provided with non-secret protection system
System login password, system screen locking code-set correspond to user's scene, and non-intimacy protection system login password corresponds to non-secret protection field
Scape, system screen locking code-set include two or more system screen-lock passwords, and each system screen-lock password maps a user
Scene.That is, scene includes: user's scene and non-secret protection scene, wherein user's scene includes: single example field
Scape and double examples/more example scenarios, system screen locking code-set include two systems screen-lock password, system screen-lock password mapping
Single example scenario, another system screen-lock password map double example/more example scenarios, i.e. system screen locking code-set includes single example system
Screen-lock password of uniting and double examples/more instance systems screen-lock password.In this way, being in the different scenes in user's scene in user
When, current scene can be changed by way of system screen locking, for example, user is when other users are on the scene, it is hidden in order to be promoted
The safety of personal letter breath, avoiding other users from knowing user tool, there are two accounts, can be by two accounts of current privacy mode
Double examples at family/more example scenarios carry out system screen locking, then, then input corresponding single example scenario single instance system screen locking it is close
Yard, single example scenario of system is entered after progress system lock screen unlocks, so as to effectively prevent other users to know the user
There are two accounts for tool;And after other users are left, then by the way that single example scenario of current privacy mode is carried out system screen locking,
Then, then the double examples/more instance systems screen-lock password for corresponding to double example/more example scenarios is inputted, carries out system lock screen unlocks
Afterwards, the double examples/more example scenarios that can enter system are started not by the different icons entrance of the same application of displaying
With example, thus by different accounts using same program, for example, into after double examples/more example scenarios of system, with micro-
For letter, user can see two wechat icons simultaneously, while can star two wechat examples, to log in two wechats
Account, and can independently be communicated respectively with the user in two wechat accounts.In this way, can be entered by system screen locking
The system of secret protection, the system that user enters secret protection by different system screen-lock passwords, the system screen locking can be by
Different system screen-lock passwords are unlocked.
In the embodiment of the present invention, user enters system by single instance system screen-lock password, by taking wechat as an example, only display one
A wechat example, i.e., single example scenario;Enter system by double examples/more instance systems screen-lock password, while display two is micro-
Reliable example, i.e., double example scenarios.
In the embodiment of the present invention, as an alternative embodiment, after entering double example/more example scenarios, can in desktop,
Each privacy application program of examples double for unlatching, shows two icons of the privacy application program, and for not set
Application program shows an application icon.
As an alternative embodiment, after the reception system screen-lock password, if the received system screen locking is close
Before code is identical as any system screen-lock password in pre-set system screen locking code-set, this method can also include:
Judge whether system opens secret protection, if if so, execute the received system screen-lock password with
The identical step of any system screen-lock password in pre-set system screen locking code-set;
If it is not, judging whether the received system screen-lock password logs in pre-set non-intimacy protection system
Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection
System.
In this step, user can be arranged whether open secret protection in the electronic device in advance, if user setting
Secret protection is opened, just needs the user's scene with secret protection entered to judge user, and can be entered single real
Example scene or double examples/more example scenarios;If the not set secret protection of user closes secret protection, according to existing skill
Art process is handled, that is, judges whether the received system screen-lock password logs in pre-set non-intimacy protection system
Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection
System.For example, the corresponding association content of double examples/more example scenarios always may be used in the system of the non-secret protection of entrance
With visible by any user, wherein association content is for providing user's entrance for entering double example/more example scenarios, comprising:
Desktop icons, system notice, the historical record (Recent) for using application program recently etc..For another example when application program is locked
It is unlocked again after firmly, alternatively, system solves screen locking after entering system screen locking again, desktop icons, use application at system notice recently
Historical record of program etc. is associated with content can be visible by user.
In the embodiment of the present invention, as an alternative embodiment, whether setting opens secret protection can be by the hidden of system
Private set interface is configured.For example, opening privacy protection mode into behind privacy settings interface, system first determines whether user
It whether is provided with the system screen locking code-set of user's scene with secret protection, if not set, user is prompted to be configured,
Single instance system screen-lock password is arranged in single example scenario, and it is close that double example/more instance systems screen lockings are arranged in double examples/more example scenarios
Code.
As an alternative embodiment, system screen locking code-set is saved in SQLite database.
As another alternative embodiment, it is not intended to other users can be by looking into solve user for privacy purpose
The privacy settings interface of inquiry system, so that the fact that oneself use multiple accounts, multiple examples at the same time is known, except through being
The privacy settings interface of system can also be configured by pre-set hiding Entry Interface outside secret protection setting.
For example, user can be indicated open by inputting pre-set character in pre-set third party application interface
Open/close secret protection.Wherein, pre-set character is inputted in pre-set third party application interface, it can be with
It is to dial pre-set special number by the way that dialing application program is arranged, alternatively, by calculator application
Pre-set spcial character is inputted, if preset dialing application program was dialed pre-set before screen locking
Pre-set spcial character was inputted in special number or calculator application, once specific combination is detected, then
It can be mapped as the movement that above-mentioned privacy is opened or privacy is closed.
Step 12, if user's scene is single example scenario, the application locks of user's access application input are received
Password;
In this step, in single example scenario, the corresponding application icon of each application program, each application program image
Corresponding one or more application procedure lock (AppLocker) password is marked, each application locks (password) map the application program
A certain usage scenario, such as single example usage scenario or double/more example usage scenarios.
In mobile electronic device, application locks (password) typically to protection user privacy and use one
Technology refers in (operation) system, by special mode come so that user needs when accessing protected application program
The application program just can be correctly accessed by inputting the modes such as special password, password.In the embodiment of the present invention, application is utilized
Program lock cipher refers to if the application program opens double example/more examples and supports that user is by being arranged different application journeys
Sequence lock cipher can enter the different usage scenarios of the application program.Under single example usage scenario, what user opened only should
The access of one example of application program;Under double examples/more examples usage scenario, what user opened is the application program two
The access authority of a/multiple example, at this point, system will allow user to access two of the program/multiple examples simultaneously.Such as table
Can occur two of the application program/multiple icons on face, user is allowed to access simultaneously.
In the embodiment of the present invention, as an alternative embodiment, this method can also include:
If user's scene is double example/more example scenarios, the request of user's access application is received;
It accesses the application program for the first time after user is in system lock screen unlocks, prompts user to input application locks close
Code, and in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
In this step, if user enters double example/more example scenarios, by taking wechat as an example, occur two wechats on desktop
Icon, two wechat examples simultaneously can be seen in systems, and user clicks one of wechat icon, then enters the wechat figure
Mark corresponding account;User clicks another wechat icon, then enters the corresponding account of another wechat icon.
Step 13, if the application program lock cipher of the input with it is any in pre-set application locks code-set
Application program lock cipher is identical, opens according to the user account that the application program lock cipher of the input maps and applies journey to described
The access of sequence.
In this step, any application program lock cipher in application locks code-set maps a reality of the application program
Example, including single example and double examples/more examples.
As an alternative embodiment, if the application program lock cipher of the input and pre-set application locks are close
Any application program lock cipher is identical in code collection, the user account unlatching pair mapped according to the application program lock cipher of the input
The access of the application program includes:
If the application program lock cipher of the input is answered with single example in pre-set application locks code-set
It is identical with program lock cipher, the access to the application program is opened according to the user account of single example scenario mapping, is hidden double
Example/more examples content.
In this step, in secret protection scene (user's scene), if entering single example scenario, for example, for wechat,
Single example of corresponding wechat account can seen in system, user can example interaction corresponding with the wechat account, double examples/
The content of more examples is hidden, for example, historical record entrance, desktop icons entrance, system by using application program recently
Notice entrance is hidden by the sharing entrance of third party application, but double examples/more examples can still be run
Or it is in operating status, double examples/received information of more examples is not demonstrated, for example, the incoming call for being related to privacy, letter are set
It is set to and is not responding to (for example, not jingle bell, do not show, do not vibrate).And when user opens double example/more examples simultaneously by certain modes
Into after double examples/more example scenarios, all example/more examples double before the time are received and the information that is not demonstrated can
To be quickly presented in double example/more example scenarios, new example is reruned without user.
As another alternative embodiment, if the application program lock cipher of the input and pre-set application locks
Any application program lock cipher is identical in code-set, opens according to the user account that the application program lock cipher of the input maps
Access to the application program includes:
If double examples in the application program lock cipher of the input and pre-set application locks code-set/more
Case application programs lock cipher is identical, opens according to double examples/more example scenarios mapping user account to the application program
Access, to user show people of unread information.
In this step, if user enters double example/more example scenarios, the accessible double examples of user/more examples.Example
Such as, accessible double examples a, wherein example maps the regular account of user in the application program, and another example maps this and answers
With the privacy account of user in program, two accounts are mutually indepedent, are independent of each other, and can run simultaneously.In this way, table can be passed through
Single case application programs icon that face is shown starts double example/more example scenarios, double in desktop presentation so as to effectively avoid
Case application programs icon avoids other users from knowing that the user possesses more accounts, thus the privacy information of effective protection user,
Promote the safety of privacy information.
In the embodiment of the present invention, the scene of secret protection, Mei Yiying are entered by setting application locks (AppLocker)
It is protected with program by AppLocker, which can be opened by different passwords.
In the embodiment of the present invention, as another alternative embodiment, any time, once application program or system are by again
It locks, for example, user, which presses power key, puts out screen, even if being in double example scenarios before, there are two wechat icon, weights for corresponding desktop
When newly user being needed to unlock, a wechat icon is also only presented in system.Scene default in this way is exactly the scene to secret protection.
In the embodiment of the present invention, and/or, application program lock cipher realizes different entrances in conjunction with system screen-lock password
Different user's scenes is presented, is not intended to other users to see or know that oneself is used at the same time for privacy purpose in user
The fact that multiple accounts, multiple examples, using different entrance input corresponding system screen-lock password, and/or, application locks
Password is merely able to unlock the access limitation of one of example when a certain entrance unlocks the lock;And another entrance can then solve
The access limitation of two (more) a examples is opened, thus when user needs, it can be between the different instances scene in user's scene
It switches over, the protection of data and the protection of privacy can be well realized, the privacy information of user can be protected well, it is hidden
Personal letter breath is highly-safe, can effectively meet the needs of user is to privacy information safety.Further, the embodiment of the present invention
Method extends to the deeper secret protection demand of user in bis- (more) example usage scenarios, so that system screen locking is close
Code, and/or, application program lock cipher be equivalent to from unlocked merely originally for application content access limitation, extend to
And sightless limitation visible for bis- (more) multiple example contents of example can also be unlocked, that is, is increased for the application program
Whether the secret protection of multiple examples while operation is had.
Fig. 2 is the apparatus structure schematic diagram that the embodiment of the present invention protects privacy information.Referring to fig. 2, which includes: user
Scene enters module 21, password acceptance module 22 and single example login module 23, wherein
User's scene enters module 21, for system screen-lock password being received, if connect in system screen locking or when starting for the first time
The system screen-lock password received is identical as any system screen-lock password in pre-set system screen locking code-set, according to reception
The system screen-lock password mapping user's scene enter system;
In the embodiment of the present invention, scene includes: user's scene and non-secret protection scene, wherein user's scene includes:
Single example scenario and double examples/more example scenarios, system screen locking code-set include two systems screen-lock password, a system screen locking
Password maps single example scenario, and another system screen-lock password maps double example/more example scenarios, i.e. system screen locking code-set includes
Single instance system screen-lock password and double examples/more instance systems screen-lock password.
As an alternative embodiment, it includes: system screen locking password acceptance unit, privacy unlatching that user's scene, which enters module 21,
Judging unit and user's scene enter unit (not shown), wherein
Password acceptance unit, for receiving system screen-lock password in system screen locking or when starting for the first time;
Privacy opens judging unit, for judging whether system opens secret protection, if so, user's scene is notified to enter
Unit;
If it is not, judging whether the received system screen-lock password logs in pre-set non-intimacy protection system
Password is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to enter non-secret protection
System;
User's scene enters unit, if the received system screen-lock password and pre-set system screen locking code-set
Middle any system screen-lock password is identical, enters system according to user's scene of the received system screen-lock password mapping.
In the embodiment of the present invention, as an alternative embodiment, by the privacy settings interface of system or it can preset
Hiding Entry Interface the unlatching secret protection is set.
In the embodiment of the present invention, as an alternative embodiment, by being opened described in pre-set hiding Entry Interface setting
Opening secret protection includes:
Pre-set character is inputted in pre-set third party application interface the unlatching privacy is arranged
Protection.
It is described in pre-set third party application interface as an alternative embodiment in the embodiment of the present invention
Inputting pre-set character includes:
Setting dialing application program dials pre-set special number, alternatively, being arranged in calculator application
The middle pre-set spcial character of input.
Password acceptance module 22 receives answering for user's access application input if user's scene is single example scenario
With program lock cipher;
In the embodiment of the present invention, in single example scenario, the corresponding application icon of each application program, each application
Program icon corresponds to one or more application program lock cipher, and each application program lock cipher maps an example of the application program
Scene.
Single example login module 23, if the application program lock cipher of the input and pre-set application locks are close
Any application program lock cipher is identical in code collection, the user account unlatching pair mapped according to the application program lock cipher of the input
The access of the application program.
In the embodiment of the present invention, as an alternative embodiment, single example login module 23 includes: single case application programs lock
Password judging unit and single example access unit (not shown), wherein
Single case application programs lock cipher judging unit, if the application program lock cipher of the input with it is pre-set
Single case application programs lock cipher in application locks code-set is identical, notification sheet example access unit;
Single example access unit, the user account for mapping according to single example scenario open the visit to the application program
It asks, hides the content of double example/more examples.
As another alternative embodiment, single example login module 23 further include: double case application programs lock cipher judgements are single
First and double example access units, wherein
Double case application programs lock cipher judging units, if the application program lock cipher of the input with it is pre-set
Double examples/multiple case application programs lock cipher in application locks code-set is identical, notifies double example access units;
Double example access units, for opening according to double examples/more example scenarios mapping user account to the application
The access of program shows people of unread information to user.
As an alternative embodiment, the device further include:
Double example login modules 24 receive user's access application if user's scene is double example/more example scenarios
Request;
It accesses the application program for the first time after user is in system lock screen unlocks, prompts user to input application locks close
Code, and in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
The embodiment of the present invention also provides a kind of electronic equipment, and the electronic equipment includes dress described in aforementioned any embodiment
It sets.
Fig. 3 is the structural schematic diagram of electronic equipment one embodiment of the present invention, may be implemented to implement shown in Fig. 1-2 of the present invention
The process of example, as shown in figure 3, above-mentioned electronic equipment may include: shell 31, processor 32, memory 33, circuit board 34 and electricity
Source circuit 35, wherein circuit board 34 is placed in the space interior that shell 31 surrounds, and processor 32 and memory 33 are arranged in circuit
On plate 34;Power circuit 35, for each circuit or the device power supply for above-mentioned electronic equipment;Memory 33 is for storing and can hold
Line program code;Processor 32 is run and executable program generation by reading the executable program code stored in memory 33
The corresponding program of code, for executing the method for protecting privacy information described in aforementioned any embodiment.
Processor 32 to the specific implementation procedures of above-mentioned steps and processor 32 by operation executable program code come
The step of further executing may refer to the description of Fig. 1-2 illustrated embodiment of the present invention, and details are not described herein.
The electronic equipment exists in a variety of forms, including but not limited to:
(1) mobile communication equipment: the characteristics of this kind of equipment is that have mobile communication function, and to provide speech, data
Communication is main target.This Terminal Type includes: smart phone (such as iPhone), multimedia handset, functional mobile phone and low
Hold mobile phone etc..
(2) super mobile personal computer equipment: this kind of equipment belongs to the scope of personal computer, there is calculating and processing function
Can, generally also have mobile Internet access characteristic.This Terminal Type includes: PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device: this kind of equipment can show and play multimedia content.Such equipment include: audio,
Video player (such as iPod), handheld device, e-book and intelligent toy and portable car-mounted navigation equipment.
(4) server: providing the equipment of the service of calculating, and the composition of server includes that processor, hard disk, memory, system are total
Line etc., server is similar with general computer architecture, but due to needing to provide highly reliable service, in processing energy
Power, stability, reliability, safety, scalability, manageability etc. are more demanding.
(5) other electronic equipments with data interaction function.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (RandomAccess
Memory, RAM) etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by those familiar with the art, all answers
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (13)
1. a kind of method for protecting privacy information, which is characterized in that this method comprises:
In system screen locking or when starting for the first time, system screen-lock password is received, if the received system screen-lock password and in advance
Any system screen-lock password is identical in the system screen locking code-set of setting, according to the use of the received system screen-lock password mapping
Family scene enters system;
If user's scene is single example scenario, the application program lock cipher of user's access application input is received;
If any application locks in the application program lock cipher of the input and pre-set application locks code-set
Password is identical, and the access to the application program is opened according to the user account that the application program lock cipher of the input maps;
After the reception system screen-lock password, if the received system screen-lock password and pre-set system screen locking
Before any system screen-lock password is identical in code-set, this method further include:
Judge whether system opens secret protection, if if so, executing the received system screen-lock password and in advance
The identical step of any system screen-lock password in the system screen locking code-set of setting;
If it is not, judge the received system screen-lock password whether with pre-set non-intimacy protection system login password
It is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to be into non-secret protection
System;
If any in the application program lock cipher of the input and pre-set application locks code-set apply journey
Sequence lock cipher is identical, and the visit to the application program is opened according to the user account that the application program lock cipher of the input maps
It asks and includes:
If single exemplary application journey in the application program lock cipher of the input and pre-set application locks code-set
Sequence lock cipher is identical, the access according to the user account unlatching of single example scenario mapping to the application program, and hiding double examples/
The content of more examples;
After the content for hiding double examples or more examples, double examples/more examples can still run or in operation
State.
2. the method according to claim 1, wherein passing through the privacy settings interface or pre-set hidden of system
It hides Entry Interface and the unlatching secret protection is set.
3. according to the method described in claim 2, it is characterized in that, by being opened described in pre-set hiding Entry Interface setting
Opening secret protection includes:
Pre-set character is inputted in pre-set third party application interface the unlatching secret protection is arranged.
4. according to the method described in claim 3, it is characterized in that, described in pre-set third party application interface
Inputting pre-set character includes:
Setting dialing application program dials pre-set special number, alternatively, setting is defeated in calculator application
Enter pre-set spcial character.
5. method according to any one of claims 1 to 4, which is characterized in that if the application program of the input
Lock cipher is identical as any application program lock cipher in pre-set application locks code-set, according to the application of the input
The user account of program lock cipher mapping is opened includes: to the access of the application program
If double examples/more examples in the application program lock cipher of the input and pre-set application locks code-set
Application program lock cipher is identical, opens the visit to the application program according to double examples/more example scenarios mapping user account
It asks, shows people of unread information to user.
6. method according to any one of claims 1 to 4, which is characterized in that the method also includes:
If user's scene is double example/more example scenarios, the request of user's access application is received;
It accesses the application program for the first time after user is in system lock screen unlocks, user is prompted to input application program lock cipher,
And in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
7. a kind of device for protecting privacy information, which is characterized in that the device includes: that user's scene enters module, password acceptance
Module and single example login module, wherein
User's scene enters module, for system screen-lock password being received, if received institute in system screen locking or when starting for the first time
It is identical as any system screen-lock password in pre-set system screen locking code-set to state system screen-lock password, according to received described
User's scene of system screen-lock password mapping enters system;
Password acceptance module receives the application program of user's access application input if user's scene is single example scenario
Lock cipher;
Single example login module, if in the application program lock cipher of the input and pre-set application locks code-set
Any application program lock cipher is identical, and the user account unlatching mapped according to the application program lock cipher of the input is answered described
With the access of program;
It includes: system screen locking password acceptance unit, privacy unlatching judging unit and user that user's scene, which enters module,
Scape enters unit, wherein
System screen locking password acceptance unit, for receiving system screen-lock password in system screen locking or when starting for the first time;
Privacy opens judging unit, for judging whether system opens secret protection, if so, user's scene is notified to enter list
Member;
If it is not, judge the received system screen-lock password whether with pre-set non-intimacy protection system login password
It is identical, if so, into the system of non-secret protection;If not, prompt user re-enters to be into non-secret protection
System;
User's scene enters unit, if appointed in the received system screen-lock password and pre-set system screen locking code-set
One system screen-lock password is identical, enters system according to user's scene of the received system screen-lock password mapping;
The list example login module includes: single case application programs lock cipher judging unit and single example access unit,
In,
Single case application programs lock cipher judging unit, if the application program lock cipher of the input and pre-set application
Single case application programs lock cipher in procedure lock code-set is identical, notification sheet example access unit;
Single example access unit, the user account for mapping according to single example scenario open the access to the application program,
Hide the content of double example/more examples;
After the content for hiding double examples or more examples, double examples/more examples can still run or in operation
State.
8. device according to claim 7, which is characterized in that by the privacy settings interface of system or pre-set hidden
It hides Entry Interface and the unlatching secret protection is set.
9. device according to claim 8, which is characterized in that by being opened described in pre-set hiding Entry Interface setting
Opening secret protection includes:
Pre-set character is inputted in pre-set third party application interface the unlatching secret protection is arranged.
10. device according to claim 9, which is characterized in that described at pre-set third party application interface
The pre-set character of middle input includes:
Setting dialing application program dials pre-set special number, alternatively, setting is defeated in calculator application
Enter pre-set spcial character.
11. device according to claim 7, which is characterized in that the list example login module further include: double exemplary applications
Program lock cipher judging unit and double example access units, wherein
Double case application programs lock cipher judging units, if the application program lock cipher of the input and pre-set application
Double examples/multiple case application programs lock cipher in procedure lock code-set is identical, notifies double example access units;
Double example access units, for opening according to double examples/more example scenarios mapping user account to the application program
Access, to user show people of unread information.
12. according to the described in any item devices of claim 7 to 11, which is characterized in that described device further include:
Double example login modules receive asking for user's access application if user's scene is double example/more example scenarios
It asks;
It accesses the application program for the first time after user is in system lock screen unlocks, user is prompted to input application program lock cipher,
And in the case where user inputs correct situation, system will allow user to access multiple examples of the application program.
13. a kind of electronic equipment, which is characterized in that the electronic equipment includes: shell, processor, memory, circuit board and electricity
Source circuit, wherein circuit board is placed in the space interior that shell surrounds, and processor and memory setting are on circuit boards;Power supply
Circuit, for each circuit or the device power supply for above-mentioned electronic equipment;Memory is for storing executable program code;Processing
Device runs program corresponding with executable program code by reading the executable program code stored in memory, for holding
The method of privacy information is protected described in the aforementioned any claim 1-6 of row.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511029363.9A CN105574437B (en) | 2015-12-31 | 2015-12-31 | Method and device for protecting privacy information and electronic equipment |
PCT/CN2016/113298 WO2017114476A1 (en) | 2015-12-31 | 2016-12-29 | Method and device for protecting privacy information and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511029363.9A CN105574437B (en) | 2015-12-31 | 2015-12-31 | Method and device for protecting privacy information and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105574437A CN105574437A (en) | 2016-05-11 |
CN105574437B true CN105574437B (en) | 2019-03-19 |
Family
ID=55884551
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511029363.9A Expired - Fee Related CN105574437B (en) | 2015-12-31 | 2015-12-31 | Method and device for protecting privacy information and electronic equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105574437B (en) |
WO (1) | WO2017114476A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701414B (en) * | 2015-12-31 | 2018-09-21 | 北京金山安全软件有限公司 | Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment |
CN105574437B (en) * | 2015-12-31 | 2019-03-19 | 北京金山安全软件有限公司 | Method and device for protecting privacy information and electronic equipment |
WO2017201692A1 (en) * | 2016-05-25 | 2017-11-30 | 北京小米移动软件有限公司 | Application encryption method and device |
CN106372530A (en) * | 2016-08-29 | 2017-02-01 | 广东欧珀移动通信有限公司 | Method for viewing privacy data and device |
CN106874045A (en) * | 2017-01-20 | 2017-06-20 | 北京奇虎科技有限公司 | A kind of startup method of application program, device and mobile terminal |
CN107133507A (en) * | 2017-04-20 | 2017-09-05 | 北京安云世纪科技有限公司 | A kind of privacy services system access method, device and mobile terminal |
CN109219003B (en) * | 2018-08-22 | 2022-02-22 | Oppo广东移动通信有限公司 | Information encryption method and device, storage medium and electronic equipment |
CN109583227B (en) * | 2018-10-30 | 2020-08-07 | 中国科学院信息工程研究所 | Privacy information protection method, device and system |
CN109725950B (en) * | 2018-12-29 | 2022-02-22 | 武汉斗鱼网络科技有限公司 | Method, device and storage medium for realizing single-instance operation of client |
CN111125770A (en) * | 2019-12-27 | 2020-05-08 | 维沃移动通信有限公司 | Privacy protection method and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761078A (en) * | 2013-11-02 | 2014-04-30 | 希姆通信息技术(上海)有限公司 | Unlocking method and system for intelligent terminal |
CN105025165A (en) * | 2015-07-06 | 2015-11-04 | 北京乐动卓越科技有限公司 | Interface unlocking method and system corresponding to multiple passwords |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140013548A (en) * | 2012-07-25 | 2014-02-05 | 삼성전자주식회사 | User terminal apparatus and control method thereof |
CN104182662B (en) * | 2014-08-22 | 2017-10-17 | 广东欧珀移动通信有限公司 | Hiding and deployment method, system and the mobile terminal of hide application program |
CN105574437B (en) * | 2015-12-31 | 2019-03-19 | 北京金山安全软件有限公司 | Method and device for protecting privacy information and electronic equipment |
-
2015
- 2015-12-31 CN CN201511029363.9A patent/CN105574437B/en not_active Expired - Fee Related
-
2016
- 2016-12-29 WO PCT/CN2016/113298 patent/WO2017114476A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761078A (en) * | 2013-11-02 | 2014-04-30 | 希姆通信息技术(上海)有限公司 | Unlocking method and system for intelligent terminal |
CN105025165A (en) * | 2015-07-06 | 2015-11-04 | 北京乐动卓越科技有限公司 | Interface unlocking method and system corresponding to multiple passwords |
Also Published As
Publication number | Publication date |
---|---|
WO2017114476A1 (en) | 2017-07-06 |
CN105574437A (en) | 2016-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105574437B (en) | Method and device for protecting privacy information and electronic equipment | |
CN105701414B (en) | Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment | |
US9967245B2 (en) | User authentication using unique hidden identifiers | |
US9131377B2 (en) | Method and apparatus for unlocking operating system | |
CA2969493C (en) | System and method for enabling secure authentication | |
CN104008313A (en) | Protecting method and device of privacy information | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN102685106A (en) | Safety verification method and equipment | |
CN101282535A (en) | Method and apparatus for protecting mobile terminal private information | |
US9697346B2 (en) | Method and apparatus for identifying and associating devices using visual recognition | |
CN108337210A (en) | Equipment configuration method and device, system | |
US10666793B1 (en) | Secure call center communications | |
CN101808094A (en) | Identity authentication system and method | |
CN104753677A (en) | Password hierarchical control method and system | |
US20110085474A1 (en) | Terminal device, signature generation server, simple id management system, simple id management method, and program | |
US9398450B2 (en) | Mobile survey tools with added security | |
Young et al. | BadVoice: Soundless voice-control replay attack on modern smartphones | |
CN103384254A (en) | Application account login method, server, client and system | |
CN103036852A (en) | Method and device for achieving network login | |
CN109617703B (en) | Key management method and device, electronic equipment and storage medium | |
CN105335631A (en) | Method and device for configuring login information, and mobile terminal | |
US20150088521A1 (en) | Speech server, speech method, recording medium, speech system, speech terminal, and mobile terminal | |
CN106341379A (en) | Information processing method, device and system | |
CN103678969A (en) | Lock releasing method of electronic device, and apparatus thereof | |
CN106127006A (en) | The user management method of a kind of mobile terminal and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190319 |